Pablo Gallardo's Blog
My professional web log about IT, Project Management & SAP
 

Security Information and Event Management

Security information and event management (SIEM) solutions are a combination of the formerly disparate product categories of: Security Information Management (SIM) Security Event Management (SEM) SIEM and CISM Certification SIEM is a concept that is covered in questions of CISM exams, but this topic it is only treated briefly in the definitions, in “CISM Review […]

Comments { 0 }

IS Disaster Recovery Objectives

This posts is to clarify the different terms related to Information System Disaster Recovery Objectives, and their differences. These terms appear on both Certified Information System Auditor (CISA) and Certified Information Security Manager (CISM) certifications, both issued by ISACA. Objective Definitions Recovery Time Objective (RTO) is the amount of time allowed for the recovery of […]

Comments { 0 }

Share books on the internet

Flipbook is an online book that can be flip from the web browsers.   List of webs Calaméo https://www.calameo.com No flipbook. Flipsnack Flipbook generator, it means, conversor from PDF to HTML5.   Google Books https://books.google.com No flipbook. Issuu  https://issuu.com/ One of the most popular.   Scribd https://scribd.com/ Pay-to-read.   Yumpu https://www.yumpu.com/   External references “34 […]

Comments { 0 }

SNMP

Simple Network Management Protocol One of the main problems with using SNMP v1 and v2 is the cleartext “community string”that it uses to authenticate. It is easy to sniff ansd resue. Most times, the SNMP community string is shared throughout the organization’s servers and routers, maing this authenticationproblem a serious threat to security. CISM Review […]

Comments { 0 }

How to prepare CISM Exam

CISM (Certified in Information Security Manager) is a certification issued by professional association ISACA. The purpose of this post is to provide information to future exam candidates about how to pass the exam, based on my own experience. Frequently Asked Questions about the exam How long do I need to prepare the exam? This answer […]

Comments { 0 }

Common Cybersecurity Attacks

Non-exhaustive list of common Cybersecurity Attacks: Brute-force Attack Cross-Site Request Forgery (XSRF) Cross-Site Scripting (XSS) Denial of Service (DoS) Man-in-the-middle Rogue access point Session hijacking Spoofing of data packets SQL Injection   Detailed List Brute-force Attack A brute-force attack (a.k.a. brute force cracking) is the cyberattack equivalent of trying every key on your key ring, […]

Comments { 0 }

Removing Linux from a computer with Windows 10

Let’s say you have a computer that have Windows 10 as its default operating system (OS). Then you manage to install a Linux distribution (e.g., Ubuntu) alongside Windows 10. But then you change your mind and you want to restore the system as it was, only with Windows 10, removing Linux and the multi-OS selector […]

Comments { 0 }

How to make Windows 10 installation media

Visit Microsoft Media Creation Tool from this link. Download “Microsoft Media Creation Tool”. Run the tool from a Windows computer and follow these ISO creation steps: Accept Terms & Condition Select ‘Create installation media (USB flash drive, DVD, or ISO file) for another PC. Select language, architecture and edition. When askw which media to use, […]

Comments { 0 }

Register GPS Coordinates while taking a Route

The purpose of this post is to explain some ways to register the GPS coordinates while doing a route Mobile apps GPX GPX Viewer Pro y is the premium version of free app GPX Viewer. GPX Viewer Pro allows to record a route you are performing that can be later be exported. Full instructions can […]

Comments { 0 }

How to create a GPS Route from a Map

The purpose of this post is to describe the steps to design, define and create a GPS route as a file and import it to mobile applications and/or webs. Steps 1. Find the route The first step is to analyze the route you are going to take. You may need a scout phase before actually […]

Comments { 0 }
Política de privacidad