{"id":1355,"date":"2021-03-06T18:08:34","date_gmt":"2021-03-06T18:08:34","guid":{"rendered":"https:\/\/blog.samarthya.me\/wps\/?p=1355"},"modified":"2021-03-08T06:42:43","modified_gmt":"2021-03-08T06:42:43","slug":"cissp-next-target","status":"publish","type":"post","link":"https:\/\/blog.samarthya.me\/wps\/2021\/03\/06\/cissp-next-target\/","title":{"rendered":"CISSP: Next target"},"content":{"rendered":"<p>I just finished my upgrade to Safe Certification and now will be going for CISSP certification. Wish my luck guys!<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-medium wp-image-1356\" src=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2021\/03\/Notes-300x98.png\" alt=\"\" width=\"300\" height=\"98\" srcset=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2021\/03\/Notes-300x98.png 300w, https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2021\/03\/Notes.png 430w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n\n\n<h2 class=\"wp-block-heading\">Some quotes<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Effective security plans anticipates change, focuses on specific and achievable objectives, potential problems, and serves as the basis of decision making.<\/li><li>Operational plans are the shortest and most frequently updated<\/li><li>Tactical plans are mid term plans and supports strategical plans.<\/li><li>Strategic plans are the long term plans (usually 5 years) and usually includes risk assessment.<\/li><li>Data classification is the primary means by which data is protected based on its need for secrecy, sensitivity and confidentiality.<\/li><li>Data classification is the process of organizing objects, subjects, items into groups of similarities (value, cost, vulnerability, risk, power, privilege)<\/li><li>Stratify the process of organizing and securing data based on assigned labels of <code>importance and sensitivity<\/code>.<\/li><li>Data classification also addresses how data is removed and destroyed.<\/li><li>Security policy is used to assign responsibilities, define acceptable risks, define roles, specify audit requirements and indicate compliance.<\/li><li>Security policy are not optional rather mandatory.<\/li><li>Three types of security policies are regulatory, advisory and informative.<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>I just finished my upgrade to Safe Certification and now will be going for CISSP certification. Wish my luck guys! Some quotes Effective security plans anticipates change, focuses on specific and achievable objectives, potential problems, and serves as the basis of decision making. Operational plans are the shortest and most frequently updated Tactical plans are [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1356,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"quote","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[34],"tags":[171,172],"class_list":["post-1355","post","type-post","status-publish","format-quote","has-post-thumbnail","hentry","category-technical","tag-cissp","tag-notes","post_format-post-format-quote"],"_links":{"self":[{"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/posts\/1355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/comments?post=1355"}],"version-history":[{"count":0,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/posts\/1355\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/media\/1356"}],"wp:attachment":[{"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/media?parent=1355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/categories?post=1355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/tags?post=1355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}