storage

CISSP Establish Information and Asset Handling Requirements – Bk1D2T7

Establish Information and Asset Handling Requirements There are combinations of physical, administrative, and technical controls that assist security professionals in establishing the asset handling requirements for sensitive information and valued assets. Procedures such as marking, handling, declassification, and storage are used to securely inventory and manage sensitive data, physical media, and computing resources. Marking and Labeling Marking is a procedure to place descriptions in plain view directly on the asset that a person can read, …

CISSP Establish Information and Asset Handling Requirements – Bk1D2T7 Read More »

ISO-27001-Annex-A.18.1.3-Protection-of-Records

ISO 27001 Annex : A.18.1.3 Protection of Records, A.18.1.4 Privacy and Protection of Personally Identifiable Information and A.18.1.5 Regulation of Cryptographic Controls

In this article explain ISO 27001 Annex : A.18.1.3 Protection of Records, A.18.1.4 Privacy and Protection of Personally Identifiable Information and A.18.1.5 Regulation of Cryptographic Controls this contols. A.18.1.3 Protection of Records Control- ISO 27001 Annex : A.18.1.3 Protection of Records Records shall, in accordance with the provisions to legislative, regulatory, contractual, and business requirements, to protect from loss, destruction, falsification, and unauthorized access and unauthorized release. Implementation Guidance- The related classification based on the …

ISO 27001 Annex : A.18.1.3 Protection of Records, A.18.1.4 Privacy and Protection of Personally Identifiable Information and A.18.1.5 Regulation of Cryptographic Controls Read More »

Discribe-the-different-types-of-Disk-and-there-characterstics

Discribe the different types of Disk and there characterstics

In thisarticle explain Discribe the different types of Disk and there characterstics & uses. Disk Drive is a digital data storage device that uses different storage mechanisms such as mechanical, electronic, magnetic, and optical to store the data. It is addressable and rewritable to support changes and modification of data. Depending on the type of media and mechanism of reading and writing the data, the different types of disk drives are as follows: Magnetic Storage …

Discribe the different types of Disk and there characterstics Read More »

Understand-the-Chain-of-Custody-and-It’s-Importance

Understand the Chain of Custody and It’s Importance

Understand the Chain of Custody and It’s Importance In this Chain of custody is a legal document that demonstrates the progression of evidence as it travels from the original evidence location to the forensic laboratory. It is a roadmap that shows how investigators collected, analyzed, and preserved the evidence. The investigators need to present this document in court. It ensures accurate auditing of the original data evidence, imaging of the source media, tracking of the …

Understand the Chain of Custody and It’s Importance Read More »

Planning-the-Search-and-Seizure-of-investigation

Planning the Search and Seizure of investigation

Planning the Search and Seizure of investigation in this investigators need to design a strategic process to conduct the search and seizure process after analyzing the crime scene. This will help them distribute tasks between the team members to complete the seizure and allow the team to use time and tools in a well-defined manner. Initial Search of the Scene Once the forensic team has arrived at the scene and unloaded their equipment, they will …

Planning the Search and Seizure of investigation Read More »

ISO-27001-Annex : A.11.2.7-Secure-Disposal-or-Re-use-of-Equipment

ISO 27001 Annex : A.11.2.7 Secure Disposal or Re-use of Equipment, A.11.2.8 Unattended User Equipment & A.11.2.9 Clear Desk and Clear Screen Policy

In this article explain ISO 27001 Annex : A.11.2.7  Secure Disposal or Re-use of Equipment, A.11.2.8 Unattended User Equipment & A.11.2.9 Clear Desk and Clear Screen Policy A.11.2.7  Secure Disposal or Re-use of Equipment Control- To avoid the removal or overriding of sensitive data and software by the disposal or reuse of any device containing storage medium, all devices must be reviewed. Implementation Guidance- Equipment should be tested to ensure that the storage media is …

ISO 27001 Annex : A.11.2.7 Secure Disposal or Re-use of Equipment, A.11.2.8 Unattended User Equipment & A.11.2.9 Clear Desk and Clear Screen Policy Read More »

Introduction to Amazon Glacier Service

Introduction to Amazon Glacier Service

Introduction to Amazon Glacier Service this is the blog topic in that you will learn S3 and Glacier Select, Amazon Glacier, Storage Pricing & Other Storage-Related Services like Amazon Elastic File System, AWS Storage Gateway, AWS Snowball etc S3 and Glacier Select AWS provides a different way to access data stored on either S3 or Glacier: Select. The feature lets you apply SQL-like queries to stored objects so that only relevant data from within objects …

Introduction to Amazon Glacier Service Read More »