0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Due Care Vs. Due Diligence
By:
January 1, 2016

I'm sure this has been brought up numerous times, but I'm getting more and more confused. I've read so many sources on this, and they seem to radically contradict each other. Even in the Cybrary CISSP videos, there's something I'm confused about. Kelly verbally says that due diligence is the research and due care is the action. OK, but there's ...

Need Help - Dual Control Vs Split Knowledge
By:
January 1, 2016

Can anyone please help me in understanding the difference between dual control and split knowledge ? Can anyone please help me in understanding the difference between dual control and split knowledge ? https://www.studynotesandtheory.com/difference-between-split-knowledge-and-dual-control/ Simply Dual-control: two persons authenticated by supplying unique key for each with the same kind of the keys. Split-knowledge: two persons authenticated with different kinds of objects (like combo lock ...

Does Cyber Security Involve Coding?
By:
January 1, 2016

I apologize if this may seem absurd but I am new to the this industry. Currently I am starting to study for my CCNA:R&S but unsure if to get a CCNA:database or CCNA:Security. My big question is about cyber security and if it involves knowing coding? I could be indirect but honestly the coding topic seems scary to me. Thank ...

Does Computer Willnot Start Without Keyboard!!!!
By:
January 1, 2016

As mentioned in the course the computer first check (cpu and post bios rom, system timer , video card , memory , keyboard , disk driver) before starting and in missing or damage of the componentes cause beep beep sound but the desktop computer can be started without keyboard!!!! Could you clarify what you're asking here? Are you trying to understand ...

Do You Like Doing Sports?
By:
January 1, 2016

I'm really interested do you like sport. As for me I like sport, especially volley-ball. It make me feel good and I can use my energy on all power! It's realy very interesting and it make me slim! Also I play volley-ball because my growth-178 cm!:)Sometimes I play football but always watch it on TV. **I want to know what ...

Do Cybrary Certificate Hold Value?
By:
January 1, 2016

Hi. Is it certificate recognized in industry level. Since I see unique license id in the certificate when I completed a course At this point you will not find too many that will recognize the name, but that does not diminish the underlying value. Any certificate can demonstrate your teach-ability, interest in learning and desire to further your own career. So ...

Differentiate Between Mac Address?
By:
January 1, 2016

How can we differentiate between android phones mac address and PC/Laptop mac address? Is there any way through which we can easily find or search for our particular mac address and know that is this a PC/Laptop mac address or any phone mac address which is connected to our network? I'm not sure if I understand your question right. But if ...

Difference Between TLS And SSL
By:
January 1, 2016

Hi Sir , What is the Difference between TLS and SSL ? Regards Sankara Narayanan.S Hi Sir , Can you please explain the difference between forward and reverse proxies . Regards Sankara Narayanan.S The terms SSL and TLS are sometimes used interchangeably, even though they are technically different protocols. However, SSL 3.0 did serve as the basis for TLS, so the two ...

Difference Between RBAC And Mandatory Access Control
By:
January 1, 2016

Following the security+ movies I can't see the difference between role based access control and mandatory access control. In role based you need to have a role to access an object. The object specifies which roles are granted access. In mandatory you need a tag to have acces to an object. The object specifies which tags are allowed. Is the ...

Difference Between Metasploit Framework And Pro
By:
January 1, 2016

Ever since Kali 2.0 is released, I'm worried if Metasploit framework is enough for me. The Question: What is the big difference? So far I can tell is that: 1. framework is all command-line while Express and Pro are GUI based 2. in framework there is no automation, while Pro version provides one-click solution 3. framework is open source thus ...