Tag system

Data Roles

This post summarizes the roles involved in managing data in IT systems. These roles are based on USA’s NIST SP 800-18 Rev. 1 “Guide for Developing Security Plans for Federal Information Systems” or European Union’s General Data Protection Regulation (GDPR).…

How to prepare CISSP Exam

CISSP (Certified Information Systems Security Professional) is a certification granted by the organization ISC2 (International Information System Security Certification Consortium). This post explains how you can prepare the exam to apply for CISSP certification. To find more information about the…

Fingerprint Recognition

Fingerprint recognition needs to steps: Fingerprint registration Fingerprint authentication During fingerprint registration, the fingerprint image(s) are converted into what is called Fingerprints Minutiae Data (FMD). FMD is saved into the database, not the fingerprint image itself. During fingerprint authentication, fingerprint…