{"id":53976,"date":"2024-04-26T23:36:26","date_gmt":"2024-04-26T23:36:26","guid":{"rendered":"http:\/\/localhost\/branding\/cmit-425-discussion-questions\/"},"modified":"2024-04-26T23:36:26","modified_gmt":"2024-04-26T23:36:26","slug":"cmit-425-discussion-questions","status":"publish","type":"post","link":"https:\/\/sheilathewriter.com\/blog\/cmit-425-discussion-questions\/","title":{"rendered":"CMIT-425-Discussion-Questions"},"content":{"rendered":"<p>Week 1 DQ 1<\/p>\n<p>Each of us have own reasons for pursuing our CISSP certification.\u00a0 Why did you choose to pursue yours?<\/p>\n<p>The reason I am looking to get my CISSP is for job security reasons and the fact that will get me in a Technical 3 level when it comes to being compliment with DOD\u2019s 8570. I also would love to have a fun job catch hackers with the F.B.I. so the CISSP will put me in the running to get one of those jobs. I also think there is a good pay raise that comes when you have a cert of this level. I was also looking into the CASP because it seem a little bit easier.<\/p>\n<p>Week 1 DQ 3<\/p>\n<p>After reading\/viewing this week&#8217;s materials, please respond to one or more of the following questions.<\/p>\n<p>After viewing the video on IT Governance, describe the IT governance model and discuss its importance in instituting a comprehensive security program. What are security blueprints?<\/p>\n<p>In your own words, describe the personnel best practices of mandatory vacation, separation of powers, principle of least privilege, and job rotation.\u00a0Give an example of where you have seen these practices applied from your own experience.<\/p>\n<p>Mandatory Vacation is when upper management has to make an employee take a few days off this. This is done for auditing purposes. If the person works and don\u2019t take any time off they could be doing things on the system that people are unaware of and the security team might need some time to examine their system to make sure everything is copasetic.<\/p>\n<p>Separation of powers or what is called separation of duty is used to compartmentalize a job or an organization. This is used to make sure one person is not a single point of failure or that one person does not have too much power. \u201cDesigned to prevent error and fraud by ensuring that at least two individuals are responsible for the separate parts of any task.\u00a0(Wigmore, 2014)\u00a0\u201d<\/p>\n<p>Principle of least privilege is to make sure that everyone only has access to what they need and have the lowest access control to folders and files and places. Most state the rule for least privilege is to deny everything and then as a person needs access start opening up rights. \u201cIf all processes ran with the smallest set of privileges needed to perform the user&#8217;s tasks.\u00a0(Merrifield, 2014)\u201d\u00a0So the first step in hardening an account is to deny all.<\/p>\n<p>Job rotation is used to make sure people don\u2019t get to relaxed in their jobs so every so often they have you do another job this is kind of a way for companies to use a checks and balance system. That way if you are doing anything wrong in your job the other person will see it and maybe report it to upper management. \u201cJob\u00a0rotation is an operational control to detect errors and frauds.\u00a0(Kokcha, 2012)\u00a0\u201d<\/p>\n<p>In my day to day life I have never had a madatory vacation because I take off a good amount of time every year. I have created user accounts before at an ole job so I totally get the process of least privlege. When creating an account they tell us to lock down the account and have the users TASO tell you what that person should have access to, I would stat that most of these accounts where on a role based system.<\/p>\n<p>\u00a0<\/p>\n<p>Works Cited<\/p>\n<p>Kokcha, R. (2012, 05 16).\u00a0Job Rotation. Retrieved from http:\/\/security.koenig-solutions.com: http:\/\/security.koenig-solutions.com\/blog-home\/job-rotation<\/p>\n<p>Merrifield, J. (2014, 10).\u00a0Using a Least-Privileged User Account\u00a0. Retrieved from http:\/\/technet.microsoft.com: http:\/\/technet.microsoft.com\/en-us\/library\/cc700846.aspx<\/p>\n<p>Wigmore, I. (2014, 01 01).\u00a0segregation of duties (SoD). Retrieved from http:\/\/whatis.techtarget.com\/: http:\/\/whatis.techtarget.com\/definition\/segregation-of-duties-SoD<\/p>\n<p>Week 2 DQ 1<\/p>\n<p>After reading\/viewing this week&#8217;s materials, please respond to one or more of the following questions.<\/p>\n<p>What are the different Access Control Models available to secure access to resources? Give an example of one that you have used in a work situation or if that is not possible, one that you\u2019ve read about.<\/p>\n<p>Identify the Access Control Categories and give an example of one that you have read about or have knowledge of from your own experience.<\/p>\n<p>Describe threats to the Access Control domain from what was covered within the reading and give an example of each.<\/p>\n<p>What are the main goals of access control and what are the best practices recommended to help in achieving them.<\/p>\n<p>What are the different Access Control Models available to secure access to resources? Give an example of one that you have used in a work situation or if that is not possible, one that you\u2019ve read about.<\/p>\n<p>RBAC which is also known as Role Based Access Control \u2013 This access control gives people access based on their role in the organization. An example of that is let\u2019s say the base commander was leaving and there was a new one coming in you would mirror the new base commander\u2019s access to the old one. I have had to do then when creating accounts in AD and group email accounts.<\/p>\n<p>DAC which is also known as Discretionary Access Control- This access control restricts access to data by placing users in different groups and giving the group access to parts of the network. Also there are data owners in the group who can change the level of access each person in the group has. An example is when someone gives another person access to their outlook email account and the owner of the account can dictate weather they won\u2019t the person to have rights to send on the behalf of the email account.<\/p>\n<p>MAC which is also known as Mandatory Access control \u2013 This access control method gives the data a sensitivity labels or classification and if the users does not have the classification level they are denied access to the data. \u201cIs a system-controlled policy restricting access to resource objects (such as data files, devices, systems, etc.) based on the level of authorization or clearance of the accessing entity, be it person, process, or device.\u00a0(Rouse, 2008)<\/p>\n<p>Works Cited<\/p>\n<p>Rouse, M. (2008, 12).\u00a0mandatory access control (MAC). Retrieved from http:\/\/searchsecurity.techtarget.com: http:\/\/searchsecurity.techtarget.com\/definition\/mandatory-access-control-MAC<\/p>\n<p>Week 2 DQ 2<\/p>\n<p>After reading\/viewing this week&#8217;s materials, please respond to one or more of the following questions.<\/p>\n<p>What are the challenges that an Identity and Access Management system helps overcome? What benefits does it provide?<\/p>\n<p>In your own words describe the four main activities that comprise the System Access Control Process. What guidelines must be followed within the Identification phase?<\/p>\n<p>Identify the Information and Access Management Technologies and describe one that you are familiar with either from your own experience or give an example of one that you\u2019ve read about.<\/p>\n<p>Describe the three factors that can be used in authentication and give at least two examples for each.<\/p>\n<p>Describe the three factors that can be used in authentication and give at least two examples for each.<\/p>\n<p>The Three factors of authentication are something you know, something you have and something that you are.<\/p>\n<p>Most networks have some type of authentication process for user\u2019s login this is to make sure the user has the correct access to the objects that they need and also this is used for Identification purposes also.<\/p>\n<p>One way to sign into the network is with a user name and pin. This is the least secure method because there are serval ways a hacker can gain access to a user name and a password. They could use social networks and guess what the password might be or they can you things like dictionary attacks or brute force to crack the password. This method is also called something you know.<\/p>\n<p>Another authentication is something you have this is a little bit more secure then something you know cause you have to physically get something that the users has such as a token or a smart card. I use a multi factor log in method at my work place and we need to have a CAC to log into the network along with a pin. Ways that people can get around this is by taken the token but or duplicating the smart chip in the CAC but these ways are much harder to do.<\/p>\n<p>The best type of single authentication would be something you are. These are things like\u201d Biometric methods provide the\u00a0something you are\u00a0factor of authentication. Some of the biometric methods that can be used are fingerprints, hand geometry, retinal or iris scans, handwriting, and voice analysis. Fingerprints and handprints are the most widely used biometric method in use today.\u00a0(Gibson, 2011)\u201d I worked at a help desk where the walk ups could come and reset there biometric log in or change the method of login in this was very interesting the processes and why the scanner works. This method is a hard way to gain access but it is not impossible. \u00a0<\/p>\n<p>\u00a0<\/p>\n<p>Works Cited<\/p>\n<p>Gibson, D. (2011, jUN 6).\u00a0Understanding the Three Factors of Authentication. Retrieved from http:\/\/www.pearsonitcertification.com: http:\/\/www.pearsonitcertification.com\/articles\/article.aspx?p=1718488<\/p>\n<p>Week 3 DQ 1<\/p>\n<p>After reading\/viewing this week&#8217;s materials, please respond to one or more of the following questions.<\/p>\n<p>Identify the malicious threat sources to physical security and their corresponding countermeasures.<\/p>\n<p>Describe the main components of a CCTV system. What are some of the concerns with CCTV deployments?<\/p>\n<p>Describe three perimeter intrusion detection systems from the physical security domain and give an example of one that you have seen deployed either at work or another location that you are familiar with.<\/p>\n<p>The main components of a CCTV system consist of cameras, transmitters, receivers, a recording system, and a monitor.\u00a0\u00a0The camera captures the data, transmits to the recording system, and then displays on the monitor. One of the concerns with the deployment of the CCTV system include the circuit not being tamperproof whereby this would allow attackers to compromises the companies CCTV system this is a problem that compromises the devices integrity and manipulating the video feed to play back recordings from another recording timeframe. Also depending on the system the feed could be easily hi jacked. Also vandalism could be another problem it CCTV faces the camera is behind a harden plastic cover but if someone mess up that cover it is hard to see though.\u00a0\u00a0Another concern would be choosing the correct lens. The lens should have the proper focal length that covers the entire area or depth of focus, and having the capability to adjust the lens. Light is another concern with the CCTV system, deploying a light-sensitive camera which \u201callows for the capture of extraordinary detail of objects and precise presentation.\u201d\u00a0(Harris, 2013)\u00a0Using the use of an auto iris lens can regulate the amount of light that enters the lens.<\/p>\n<p>Reference<\/p>\n<p>Harris, S. (2013).\u00a0Alll-in-One CISSP.\u00a0New York: McGraw-Hill.<\/p>\n<p>Week 3 DQ 2<\/p>\n<p>After reading\/viewing this week&#8217;s materials, please respond to one or more of the following questions.<\/p>\n<p>Describe the functions of hubs\/repeaters, bridges, switches, routers, and gateways. At what layers of the OSI model does each device operate?<\/p>\n<p>Describe the different Wireless standards within the 802.11 family. What is a rogue access point, and what do we have to worry about?<\/p>\n<p>Describe the differences between bus, ring and star topologies. List the various wiring standards that are available for use within these topologies.<\/p>\n<p>From the videos, pick one hacker profiled and describe the types of attacks they used in exploiting vulnerabilities of the networks that they targeted. What opening did they gain access through? How were they detected?<\/p>\n<p>HubRepeater operates at the physical layer. They repeat incoming frames without examining the MAC address in the frame.<\/p>\n<p>Bridges\u00a0connects \u201ctwo or more media segments on the same subnet, and filters traffic between both segments based on the MAC address in the frame.\u00a0They divide a network into segments to reduce traffic congestion and excessive collisions\u201d\u00a0(Harris, 2013)\u00a0by connecting two networks and passes traffic between them based only on the node address, so that traffic between nodes on one network does not appear on the other network.\u00a0\u00a0Bridges operate in the data link OSI layer.<\/p>\n<p>Switches operate at data link layer. A\u00a0multiport bridge that performs filtering based on MAC addresses\u00a0can process multiple frames simultaneously,\u00a0guaranteed bandwidth to each switch port. Switches offer guaranteed bandwidth.\u00a0(Webtycho, 2013)<\/p>\n<p>Routers assign a new address per port which allows it to connect different networks together. Also discovers information about routes and changes that take place in a \u201cnetwork through its routing protocols; and filters traffic based on ACLs and fragments packets.\u201d\u00a0(Webtycho, 2013)\u00a0Because of their network level, they can \u201ccalculate at the shortest and economical path between the sending and receiving hosts\u201d\u00a0(Harris, 2013). Routers operate in the network OSI layer.<\/p>\n<p>Gateways- can be a combination of hardware andor software that connects individual LANS to a larger network and can act like a translator. This usually involves converting different protocols. For example, a \u201cgateway could be used to convert a TCPIP packet to a NetWare IPX packet\u201d.\u00a0(Webtycho, 2013)\u00a0Gateways operate in all seven OSI layers.<\/p>\n<p>Reference<\/p>\n<p>Harris, S. (2013).\u00a0Alll-in-One CISSP.\u00a0New York: McGraw-Hill.<\/p>\n<p>Webtycho, U. (2013, October).Network Course Content Material . Adelphia, Maryland.<\/p>\n<p>Week 4 DQ 1<\/p>\n<p>After reading\/viewing this week&#8217;s materials, please respond to one or more of the following questions.<\/p>\n<p>Describe in your own words the differences between steganography, digital watermarking, and digital rights management.<\/p>\n<p>Choose three of the basic cryptosystems and give an overview of each.<\/p>\n<p>Describe the operation of a one-time pad (OTP) and give an example of a device that uses an OTP either from your own experience or from research.<\/p>\n<p>A one-time pad (OTP) uses a pad of random values, where a plaintext message that needs to be encrypted is converted into bits. The encryption process uses a binary mathematic function exclusive-OR (XOR) that is applied to two bits and when combining the bits, if both values are the same the result is 0 (1 XOR 1=0)m, but if the values are different from each other the result is 1(1 XOR 0=1). For instance when User A and User B \u201cproduce a huge number of random bits and share them secretly. When\u00a0User A\u00a0has a message to send to\u00a0User B,\u00a0User A\u00a0retrieves a number of random bits equal to the length of\u00a0User A\u2019s\u00a0message, and uses them to be the message\u2019s key.\u00a0User A\u00a0applies the exclusive or operation (xor) to the key and the message to\u00a0produce the encrypted message. The key must be exactly the same size as the message. The key must also consist of completely random bits that are kept secret from everyone except User A and User B. When User B receives the message, User B retrieves the same bits from his copy of the random bit collection. User B must retrieve the same random bits in exactly the same order that User A used them. Then User B uses the sequence of random bits to decrypt the message. User B applies the xor operation to the message and the key to retrieve the plain text.\u201d\u00a0(Cryptosmith, 2007)\u00a0An example of a device that uses the one-time pad would be a mobile phone.<\/p>\n<p>\u00a0<\/p>\n<p>Reference<\/p>\n<p>Cryptosmith, (2007).\u00a0One-Time Pads, Retrieved from: http:\/\/b.cryptosmith.com\/2007\/06\/09\/one-time-pads\/<\/p>\n<p>Week 4 DQ 2<\/p>\n<p>After reading\/viewing this week&#8217;s materials, please respond to one or more of the following questions.<\/p>\n<p>What are the strengths and weaknesses of symmetric key cryptography? Give an example of where this type of cryptography is used. What are the strengths and weaknesses of asymmetric key cryptography? Give an example of where this type of cryptography is used.<\/p>\n<p>What are the types of message integrity controls and what benefit is provided by them? Give a short description of the various secure email protocols that are referenced in the Shon Harris book and the Course Content.<\/p>\n<p>What benefit do digital signatures provide and what are their characteristics? In your own words, what does non-repudiation mean?\u00a0<\/p>\n<p>The types of message controls and their benefit include, The One-Way Hash, the benefit it provides a fingerprint of a message by taking a variable-length string and a message and produces a fixed-length value; HMAC, the benefit it provides data origin authentication and data integrity.\u00a0\u00a0A symmetric key is used and concatenated to produce a MAC value that is appended into a message and sent to the receiver; CBC-MAC, the benefit it provides is that the message is encrypted with a symmetric block cipher in CBC mode and the output of the final block of ciphertext is used as the MAC; Hashing, this has various algorithms such as MD2, MD4, MD5, SHA, HAVAL, Tiger. The benefit it provides is that it generates messages digests to detect whether modification has taken place; Digital Signature, the benefit it provides is that it encrypts the sender\u2019s private key.<\/p>\n<p>The various secure email protocols are:<\/p>\n<p>Privacy-Enhanced Mail (PEM) \u2013 an internet standard that provides secure-email over the Internet for in-house communication infrastructure that provides authentication, message integrity, encryption, and key management.<\/p>\n<p>Pretty Good Privacy (PGP) \u2013 a freeware email security program that was the first widespread public key encryption program. PGP is a complete cryptosystem that uses cryptographic protection to protect email files.<\/p>\n<p>Multipurpose Internet Mail Extension (MIME) \u2013 a technical specification that indicates how multimedia data and email attachments are to be transferred; and a mail standard that dictates how mail is formatted, encapsulated, transmitted, and opened.<\/p>\n<p>Harris, Shon.\u00a0CISSP All-in-One Exam Guide, Sixth Edition.\u00a0McGraw-Hill\/Osborne.\u00a0\u00a9 2013.\u00a0Books24x7. &lt;http:\/\/common.books24x7.com.ezproxy.umuc.edu\/toc.aspx?bookid=50527&gt;<\/p>\n<p>Week 5 DQ 1<\/p>\n<p>After reading\/viewing this week&#8217;s materials, please respond to one or more of the following questions.<\/p>\n<p>What are the steps in the business continuity planning process? Why is a clear understanding of a company\u2019s enterprise architecture critical to this process?<\/p>\n<p>Describe the steps in a Business Impact Analysis (BIA).<\/p>\n<p>What different loss criteria types can be associated with threats identified during the Business Impact Analysis process?\u00a0<\/p>\n<p>The following are the steps in the business continuity planning process. It is extremely important to have a clear understanding of the company\u2019s enterprise architecture because you have to know what you\u2019re protecting and how it would affect the organization and its stakeholders if those assets identified were damaged or destroyed.<\/p>\n<p>Develop the continuity planning policy statement.\u00a0Write a policy that provides the guidance necessary to develop a BCP, and that assigns authority to the necessary roles to carry out these tasks (Harris, 2013).<\/p>\n<p>Conduct the business impact analysis (BIA).\u00a0Identify critical functions and systems and allow the organization to prioritize them based on necessity. Identify vulnerabilities and threats, and calculate risks (Harris, 2013).<\/p>\n<p>Identify preventive controls.\u00a0Once threats are recognized, identify and implement controls and countermeasures to reduce the organization\u2019s risk level in an economical manner (Harris, 2013).<\/p>\n<p>Develop recovery strategies.\u00a0Formulate methods to ensure systems and critical functions can be brought online quickly (Harris, 2013).<\/p>\n<p>Develop the contingency plan.\u00a0Write procedures and guidelines for how the organization can still stay functional in a crippled state (Harris, 2013).<\/p>\n<p>Test the plan and conduct training and exercises.\u00a0Test the plan to identify deficiencies in the BCP, and conduct training to properly prepare individuals on their expected tasks (Harris, 2013).<\/p>\n<p>Maintain the plan.\u00a0Put in place steps to ensure the BCP is a living document that is updated regularly (Harris, 2013).<\/p>\n<p>Reference:<\/p>\n<p>Harris, S. (2013). CISSP All-In-One Exam Guide, Sixth Edition. [Books24x7 version] Available fromhttp:\/\/common.books24x7.com\/toc.aspx?bookid=50527Week 5 DQ 2<\/p>\n<p>After reading\/viewing this week&#8217;s materials, please respond to one or more of the following questions.<\/p>\n<p>Describe the differences between the hot, warm, and cold site methods of facility recovery.<\/p>\n<p>Define the full, incremental, and differential backups and describe the differences between these data backup types.<\/p>\n<p>Describe the differences between disk shadowing, electronic vaulting, and remote journaling. What is disk duplexing and how does it differ from disk mirroring?\u00a0<\/p>\n<p>Effective data recovery plans must include hot sites, warm sites and cold sites. When the capabilities of each site is considered, companies are better able to predict the recovery time following a disaster. Knowing how long it will take until systems begin running again is vital. A hot site is considered \u201cproactive\u201d. It allows a company to keep servers and a live backup site running incase a disaster occurs. This is unlike a warm or \u201cpreventive\u201d site which enables the pre-installation of a company\u2019s hardware and it allows the company to preconfigure bandwidth necessities. In a warm site, all a company would have to do is simply load software, as well as data in order to restore the business\u2019 systems. Cold sites are also referred to as \u2018recovery\u2019 sites. These sites include data center space, power and network connectivity that is available whenever a company may need it. In these facilities, a company\u2019s logistical support team would assist in the moving of hardware into the data center and get the company back up and running. This process may take an extended period of time, unlike a transition into a hot site where there would be immediate cutover if disaster were to arise. Hot sites are essential for mission critical sites (Core X Change, 2014).<\/p>\n<p>References<\/p>\n<p>Core X Change. (2014). Disaster Recovery Hot, Warm and Cold Sites: Key Differences.Colocation &amp; Connectivity by Zayo. Retrieved from https:\/\/www.corexchange.com\/blog\/disaster-recovery-hot-warm-cold-sites-key-differences<\/p>\n<p>Week 6 DQ 2<\/p>\n<p>After reading\/viewing this week&#8217;s materials, please respond to one or more of the following questions.<\/p>\n<p>What is a View-based access control in database? What is a Data warehouse? What is Online Transaction Processing (OLTP)?<\/p>\n<p>What is Change Management and how is it used to control security breaches? What is Configuration Management and how is it used to control security breaches? What is Patch management and how is it used to control security breaches?<\/p>\n<p>In a database, to control security, lock controls are implemented and tested using the ACID test. Explain the following terms for each letter within the ACID method: Atomicity, Consistency, Isolation, Durability.\u00a0<\/p>\n<p>The ACID method consist of\u00a0atomicity\u00a0which divides transactions into units of work and ensures that all modifications either take effect or none takes effect- where the database either commits or is rolled back;\u00a0consistency\u00a0is where a transaction must follow the integrity policy developed for that particular database and ensure all data are consistent in the different databases;\u00a0isolation\u00a0is where transactions execute in isolation until completed, without interacting with other transactions; and\u00a0durability\u00a0which pertains to once the transaction is verified as accurate on all systems it is committed and the databases cannot be rolled back.<\/p>\n<p>Week 7 DQ 1<\/p>\n<p>After reading\/viewing this week&#8217;s materials, please respond to one or more of the following questions.<\/p>\n<p>Describe the administrative management practices of separation of duties, job rotation, and mandatory vacations and their role within operations security.<\/p>\n<p>Describe the differences between the following sanitization methods of media control: clearing, purging, zeroization, and degaussing. What is data remanence?\u00a0<\/p>\n<p>The difference between the following sanitization methods of media control are:<\/p>\n<p>Clearing \u2013 a process of removing data from media that it is not readily retrieved using routine operating system commands or data recovery software.<\/p>\n<p>Purging \u2013method of removing the data on media making it unrecoverable even with great effort.)<\/p>\n<p>Zeroization- method of overwriting data on media with a pattern designed to ensure that the data cannot be recovered<\/p>\n<p>Degaussing \u2013 the process of magnetically scrambling the patterns on a tape or disk that represents the data stored on the disk and destroying the media through either shredding crushing, or burning-<\/p>\n<p>Data remanence is the residual physical representation of data that remains on the drive even after the data has been removed or erased.<\/p>\n<p>Week 7 DQ 2<\/p>\n<p>After reading\/viewing this week&#8217;s materials, please respond to one or more of the following questions.<\/p>\n<p>Describe the different methods of RAID. What is RAIT?<\/p>\n<p>Define the different types of trusted recovery. What is meant by the term \u201cfail secure\u201d?<\/p>\n<p>Describe three of the following attack types in the Operation Security domain: man-in-the-middle, mail bombing, war-dialing, ping-of-death, teardrop, and slamming-and-cramming\u00a0<\/p>\n<p>The different methods of RAID consist of RAID 0 which deals with data striping, RAID 1 handles mirroring, RAID 2 where data parity are created with a hamming code which identifies any errors, RAID 3 is considered the Byte-level parity, where data is striping over all the drives and the parity data is held on one drive, RAID 4 is where parity is created at the block-level, RAID 5 is where data is written in disk sector units to all the drives-this is the most widely used because of its redundancy, RAID 6 is the fault tolerance, which is a second set of parity data written to all drives, RAID 10 is where data are simultaneously mirrored and striped across several drives and can support multiple drive failures.<\/p>\n<p>Redundant Array of Independent Tapes (RAIT) is similar to RAID but it uses tape drives instead of disk drives. In RIAT data is striped in parallel to multiple tapes drives with or without redundant parity drive.<\/p>\n<p>Week 8 DQ 1<\/p>\n<p>As the course wraps up this week, please share your reflections on this course, including lessons learned.\u00a0<\/p>\n<p>What are you goals moving forward?Though a very challenging and fast-paced class, I learned quite a bit in each of the CISSP domains. It is easy to see why an exam of this level is contingent upon five years of job experience in at least two of the domains (although you can take the exam without the experience and only achieve SSCP) ((ISC)2, 2014).\u00a0<\/p>\n<p>From the perspective of taking the exam, I will likely take another couple months to circle back to each domain take more practice tests, and really focus on topics that need more attention. Though this was an eight week class, the scope of the CISSP is very large and requires a lot of attention.\u00a0<\/p>\n<p>I haven&#8217;t yet received feedback on my risk assessment paper, but I&#8217;ll say that it was a challenging yet rewarding assignment. It was great to take the topics we learned in class and directly apply them to a project, which isn&#8217;t far from what is in the real world. If I wasn&#8217;t a procrastinator, I could have easily doubled or tripled the length of this paper, given the topics I learned in this class that I wanted to apply to GFI&#8217;s, such as writing more detail about a security policy, vulnerability management, etc. I&#8217;ll have to leave that for a other courses, which I hope to be able to take.\u00a0<\/p>\n<p>All in all, this was a great class. I would have much preferred not to have taken it online, and take it in a 16 week session, but there is still a lot I&#8217;ve learned that I will be able to apply to my current job to make me a better Information Assurance Auditor.\u00a0<\/p>\n<p>Good luck to you all in your future studies!<\/p>\n<p>Works Cited<\/p>\n<p>(ISC)2. (2014).\u00a0How to Get Your CISSP Certification. Retrieved 12 14, 2014, from (ISC)2: https:\/\/www.isc2.org\/cissp-how-to-certify.aspx<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Week 1 DQ 1 Each of us have own reasons for pursuing our CISSP certification.\u00a0 Why did you choose to<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-53976","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CMIT-425-Discussion-Questions - sheilathewriter<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sheilathewriter.com\/blog\/cmit-425-discussion-questions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CMIT-425-Discussion-Questions - sheilathewriter\" \/>\n<meta property=\"og:description\" content=\"Week 1 DQ 1 Each of us have own reasons for pursuing our CISSP certification.\u00a0 Why did you choose to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sheilathewriter.com\/blog\/cmit-425-discussion-questions\/\" \/>\n<meta property=\"og:site_name\" content=\"sheilathewriter\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-26T23:36:26+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"22 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/cmit-425-discussion-questions\/\",\"url\":\"https:\/\/sheilathewriter.com\/blog\/cmit-425-discussion-questions\/\",\"name\":\"CMIT-425-Discussion-Questions - sheilathewriter\",\"isPartOf\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#website\"},\"datePublished\":\"2024-04-26T23:36:26+00:00\",\"author\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab\"},\"breadcrumb\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/cmit-425-discussion-questions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sheilathewriter.com\/blog\/cmit-425-discussion-questions\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/cmit-425-discussion-questions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sheilathewriter.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CMIT-425-Discussion-Questions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#website\",\"url\":\"https:\/\/sheilathewriter.com\/blog\/\",\"name\":\"sheilathewriter\",\"description\":\"Custom essay writing\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sheilathewriter.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/opskill.com\/propapers\"],\"url\":\"https:\/\/sheilathewriter.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CMIT-425-Discussion-Questions - sheilathewriter","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sheilathewriter.com\/blog\/cmit-425-discussion-questions\/","og_locale":"en_US","og_type":"article","og_title":"CMIT-425-Discussion-Questions - sheilathewriter","og_description":"Week 1 DQ 1 Each of us have own reasons for pursuing our CISSP certification.\u00a0 Why did you choose to","og_url":"https:\/\/sheilathewriter.com\/blog\/cmit-425-discussion-questions\/","og_site_name":"sheilathewriter","article_published_time":"2024-04-26T23:36:26+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"22 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sheilathewriter.com\/blog\/cmit-425-discussion-questions\/","url":"https:\/\/sheilathewriter.com\/blog\/cmit-425-discussion-questions\/","name":"CMIT-425-Discussion-Questions - sheilathewriter","isPartOf":{"@id":"https:\/\/sheilathewriter.com\/blog\/#website"},"datePublished":"2024-04-26T23:36:26+00:00","author":{"@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab"},"breadcrumb":{"@id":"https:\/\/sheilathewriter.com\/blog\/cmit-425-discussion-questions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sheilathewriter.com\/blog\/cmit-425-discussion-questions\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sheilathewriter.com\/blog\/cmit-425-discussion-questions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sheilathewriter.com\/blog\/"},{"@type":"ListItem","position":2,"name":"CMIT-425-Discussion-Questions"}]},{"@type":"WebSite","@id":"https:\/\/sheilathewriter.com\/blog\/#website","url":"https:\/\/sheilathewriter.com\/blog\/","name":"sheilathewriter","description":"Custom essay writing","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sheilathewriter.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/opskill.com\/propapers"],"url":"https:\/\/sheilathewriter.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts\/53976","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/comments?post=53976"}],"version-history":[{"count":0,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts\/53976\/revisions"}],"wp:attachment":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/media?parent=53976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/categories?post=53976"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/tags?post=53976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}