{"id":8879,"date":"2023-12-30T16:41:36","date_gmt":"2023-12-30T16:41:36","guid":{"rendered":"https:\/\/sajinshivdas.com\/cybersecurity\/?p=8879"},"modified":"2024-09-19T10:12:19","modified_gmt":"2024-09-19T10:12:19","slug":"cissp-mindmap-asset-security","status":"publish","type":"post","link":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mindmap-asset-security\/","title":{"rendered":"CISSP Interactive Mindmap &#8211; Domain 2_Asset Security"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Table of Contents<\/span><\/p>\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"#Key Concepts and Terminology\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Key Concepts &amp; Terminology<\/span><\/a><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"#Key Terms &amp; Definitions\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Key Terms &amp; Definitions<\/span><\/a><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"#Key Areas\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Key Areas<\/span><\/a><\/li>\n<li><a href=\"#Asset Security_Mindmap\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Asset Security Mindmap<\/span><\/a><\/li>\n<li><a href=\"#Domain 02: Practise Tests\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Domain 02_Practice Tests<\/span><\/a><\/li>\n<li><a href=\"#Domain 02: Flashcard\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Domain 02: Flashcard<\/span><\/a><\/li>\n<li><a href=\"#Resources\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Resources<\/span><\/a><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"#credits\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Credits &amp; Disclaimer<\/span><\/a><\/li>\n<li><a href=\"#Contribution\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Contribution<\/span><\/a><\/li>\n<li><a href=\"#Related Mindmaps\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Related Mindmaps<\/span><\/a><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h1>CISSP Mindmap &#8211; Domain 02: Asset Security<\/h1>\n[\/vc_column_text][vc_column_text]A comprehensive CISSP Mindmap Series will include all 8 Domains. This collection is designed to equip prospective CISSP professionals with essential resources for exam preparation, training and reference.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div class=\"ult-spacer spacer-69df39386079a\" data-id=\"69df39386079a\" data-height=\"20\" data-height-mobile=\"20\" data-height-tab=\"20\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div><div id=\"ultimate-heading-779869df39386085f\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-779869df39386085f uvc-7228 \" data-hspacer=\"line_with_icon\" data-hline_width=\"auto\" data-hicon_type=\"selector\" data-hborder_style=\"solid\" data-hborder_height=\"3\" data-hborder_color=\"#000000\" data-icon_width=\"32\" data-hfixer=\"10\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-779869df39386085f h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"desktop:2px;\"}' ><h3 style=\"font-weight:bold;color:#3452ff;margin-bottom:5px;\">CISSP Mindmap - Domain 02<\/h3><\/div><div class=\"uvc-sub-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-779869df39386085f .uvc-sub-heading '  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:normal;margin-top:10px;margin-bottom:5px;\">\n<h5>CISSP Interactive Mindmap<\/h5>\n<\/div><div class=\"uvc-heading-spacer line_with_icon\" style=\"margin-top:5px;height:32px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon none \"  style=\"font-size:32px;display:inline-block;\">\n\t<i class=\"awesome-book\"><\/i>\n<\/div><\/div><\/div><\/div><\/div>[image_with_animation image_url=&#8221;9323&#8243; image_size=&#8221;medium_large&#8221; animation_type=&#8221;entrance&#8221; animation=&#8221;None&#8221; animation_movement_type=&#8221;transform_y&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;center&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Key Concepts and Terminology&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_wp_custommenu][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;]<div id=\"ultimate-heading-225069df393860884\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-225069df393860884 uvc-234 \" data-hspacer=\"line_only\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-225069df393860884 h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">Domain_02: Key Concepts and Terminology<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div><div id=\"advanced-tabs-desc-wrap-1054\" class=\"ult_tabs \" style=\" \" data-tabsstyle=\"style1\"\r\n data-titlebg=\"#e7ecea\" data-titlecolor=\"#74777b\" data-fullheight=\"off\"\r\n data-titlehoverbg=\"#4f90d1\" data-titlehovercolor=\"#ffffff\"\r\n data-rotatetabs=\"0\" data-responsivemode=\"Both\" data-animation=\"Slide\"\r\ndata-activetitle=\"#ffffff\" data-activeicon=\"\" data-activebg=\"#4f90d1\"  data-respmode=\"Tabs\" data-respwidth=\"400\" data-scroll = \"on\" data-activeindex=\"1\"><ul id=advanced-tabs-wrap-6185 class=\"ult_tabmenu style1 Style_6\" style=\"color:transparent;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-width:0px;\"><li class=\"ult_tab_li ult_tab_style_6  \" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\" style=\"background-color:#e7ecea;border-top-left-radius:8px;\">\r\n\t\t\t\t\t<a href=\"#1726738092277-7\" id=\"1726738092277-7\" style=\"color:#74777b;;border-color:#333333;  \" class=\"ult_a \">\r\n\t\t\t\t\t   <span class=\"ult_tab_main  Both \">\r\n\t\t\t\t\t    <span class=\"ult_tab_section\">\r\n\t\t\t\t\t  \t\t<span  data-ultimate-target='#advanced-tabs-wrap-6185 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult-responsive\" style=\"\">Asset Management<\/span>\r\n\t\t\t\t\t\t   \t<span class=\"aio-icon none ult_tab_iconright\" style=\"color:#74777b;font-size:15px;\">\r\n\t\t\t\t\t\t   \t<i class=\"   ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t\t   <\/span>\r\n\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <\/span>\r\n\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li><li class=\"ult_tab_li ult_tab_style_6  \" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\" style=\"background-color:#e7ecea;\">\r\n\t\t\t\t\t<a href=\"#1726738092825-8\" id=\"1726738092825-8\" style=\"color:#74777b;;border-color:#333333;  \" class=\"ult_a \">\r\n\t\t\t\t\t   <span class=\"ult_tab_main  Both \">\r\n\t\t\t\t\t    <span class=\"ult_tab_section\">\r\n\t\t\t\t\t  \t\t<span  data-ultimate-target='#advanced-tabs-wrap-6185 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult-responsive\" style=\"\">Data Security<\/span>\r\n\t\t\t\t\t\t   \t<span class=\"aio-icon none ult_tab_iconright\" style=\"color:#74777b;font-size:15px;\">\r\n\t\t\t\t\t\t   \t<i class=\"   ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t\t   <\/span>\r\n\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <\/span>\r\n\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li><li class=\"ult_tab_li ult_tab_style_6  \" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\" style=\"background-color:#e7ecea;\">\r\n\t\t\t\t\t<a href=\"#1726738093068-6\" id=\"1726738093068-6\" style=\"color:#74777b;;border-color:#333333;  \" class=\"ult_a \">\r\n\t\t\t\t\t   <span class=\"ult_tab_main  Both \">\r\n\t\t\t\t\t    <span class=\"ult_tab_section\">\r\n\t\t\t\t\t  \t\t<span  data-ultimate-target='#advanced-tabs-wrap-6185 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult-responsive\" style=\"\">Data Life Cycle<\/span>\r\n\t\t\t\t\t\t   \t<span class=\"aio-icon none ult_tab_iconright\" style=\"color:#74777b;font-size:15px;\">\r\n\t\t\t\t\t\t   \t<i class=\"   ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t\t   <\/span>\r\n\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <\/span>\r\n\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li><li class=\"ult_tab_li ult_tab_style_6  \" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\" style=\"background-color:#e7ecea;\">\r\n\t\t\t\t\t<a href=\"#1726738093313-2\" id=\"1726738093313-2\" style=\"color:#74777b;;border-color:#333333;  \" class=\"ult_a \">\r\n\t\t\t\t\t   <span class=\"ult_tab_main  Both \">\r\n\t\t\t\t\t    <span class=\"ult_tab_section\">\r\n\t\t\t\t\t  \t\t<span  data-ultimate-target='#advanced-tabs-wrap-6185 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult-responsive\" style=\"\">Data Classification<\/span>\r\n\t\t\t\t\t\t   \t<span class=\"aio-icon none ult_tab_iconright\" style=\"color:#74777b;font-size:15px;\">\r\n\t\t\t\t\t\t   \t<i class=\"   ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t\t   <\/span>\r\n\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <\/span>\r\n\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li><li class=\"ult_tab_li ult_tab_style_6  \" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\" style=\"background-color:#e7ecea;\">\r\n\t\t\t\t\t<a href=\"#1726738093551-8\" id=\"1726738093551-8\" style=\"color:#74777b;;border-color:#333333;  \" class=\"ult_a \">\r\n\t\t\t\t\t   <span class=\"ult_tab_main  Both \">\r\n\t\t\t\t\t    <span class=\"ult_tab_section\">\r\n\t\t\t\t\t  \t\t<span  data-ultimate-target='#advanced-tabs-wrap-6185 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult-responsive\" style=\"\">Data Security Controls<\/span>\r\n\t\t\t\t\t\t   \t<span class=\"aio-icon none ult_tab_iconright\" style=\"color:#74777b;font-size:15px;\">\r\n\t\t\t\t\t\t   \t<i class=\"   ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t\t   <\/span>\r\n\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <\/span>\r\n\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li><li class=\"ult_tab_li ult_tab_style_6  \" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\" style=\"background-color:#e7ecea;\">\r\n\t\t\t\t\t<a href=\"#1726738093780-0\" id=\"1726738093780-0\" style=\"color:#74777b;;border-color:#333333;  \" class=\"ult_a \">\r\n\t\t\t\t\t   <span class=\"ult_tab_main  Both \">\r\n\t\t\t\t\t    <span class=\"ult_tab_section\">\r\n\t\t\t\t\t  \t\t<span  data-ultimate-target='#advanced-tabs-wrap-6185 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult-responsive\" style=\"\">Media Management<\/span>\r\n\t\t\t\t\t\t   \t<span class=\"aio-icon none ult_tab_iconright\" style=\"color:#74777b;font-size:15px;\">\r\n\t\t\t\t\t\t   \t<i class=\"   ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t\t   <\/span>\r\n\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <\/span>\r\n\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li><li class=\"ult_tab_li ult_tab_style_6  \" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\" style=\"background-color:#e7ecea;\">\r\n\t\t\t\t\t<a href=\"#1726738094016-7\" id=\"1726738094016-7\" style=\"color:#74777b;;border-color:#333333;  \" class=\"ult_a \">\r\n\t\t\t\t\t   <span class=\"ult_tab_main  Both \">\r\n\t\t\t\t\t    <span class=\"ult_tab_section\">\r\n\t\t\t\t\t  \t\t<span  data-ultimate-target='#advanced-tabs-wrap-6185 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult-responsive\" style=\"\">Data Privacy<\/span>\r\n\t\t\t\t\t\t   \t<span class=\"aio-icon none ult_tab_iconright\" style=\"color:#74777b;font-size:15px;\">\r\n\t\t\t\t\t\t   \t<i class=\"   ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t\t   <\/span>\r\n\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <\/span>\r\n\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li><li class=\"ult_tab_li ult_tab_style_6  \" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\" style=\"background-color:#e7ecea;\">\r\n\t\t\t\t\t<a href=\"#1726738092575-2\" id=\"1726738092575-2\" style=\"color:#74777b;;border-color:#333333;  \" class=\"ult_a \">\r\n\t\t\t\t\t   <span class=\"ult_tab_main  Both \">\r\n\t\t\t\t\t    <span class=\"ult_tab_section\">\r\n\t\t\t\t\t  \t\t<span  data-ultimate-target='#advanced-tabs-wrap-6185 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult-responsive\" style=\"\">Information Lifecycle Management<\/span>\r\n\t\t\t\t\t\t   \t<span class=\"aio-icon none ult_tab_iconright\" style=\"color:#74777b;font-size:15px;\">\r\n\t\t\t\t\t\t   \t<i class=\"   ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t\t   <\/span>\r\n\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <\/span>\r\n\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li><li class=\"ult_tab_li ult_tab_style_6  \" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\" style=\"background-color:#e7ecea;\">\r\n\t\t\t\t\t<a href=\"#1726738094296-1\" id=\"1726738094296-1\" style=\"color:#74777b;;border-color:#333333;  \" class=\"ult_a \">\r\n\t\t\t\t\t   <span class=\"ult_tab_main  Both \">\r\n\t\t\t\t\t    <span class=\"ult_tab_section\">\r\n\t\t\t\t\t  \t\t<span  data-ultimate-target='#advanced-tabs-wrap-6185 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult-responsive\" style=\"\">Data Sovereignty<\/span>\r\n\t\t\t\t\t\t   \t<span class=\"aio-icon none ult_tab_iconright\" style=\"color:#74777b;font-size:15px;\">\r\n\t\t\t\t\t\t   \t<i class=\"   ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t\t   <\/span>\r\n\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <\/span>\r\n\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li><li class=\"ult_tab_li ult_tab_style_6  \" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\" style=\"background-color:#e7ecea;\">\r\n\t\t\t\t\t<a href=\"#1726738094759-2\" id=\"1726738094759-2\" style=\"color:#74777b;;border-color:#333333;  \" class=\"ult_a \">\r\n\t\t\t\t\t   <span class=\"ult_tab_main  Both \">\r\n\t\t\t\t\t    <span class=\"ult_tab_section\">\r\n\t\t\t\t\t  \t\t<span  data-ultimate-target='#advanced-tabs-wrap-6185 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult-responsive\" style=\"\">Access Management<\/span>\r\n\t\t\t\t\t\t   \t<span class=\"aio-icon none ult_tab_iconright\" style=\"color:#74777b;font-size:15px;\">\r\n\t\t\t\t\t\t   \t<i class=\"   ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t\t   <\/span>\r\n\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <\/span>\r\n\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li><li class=\"ult_tab_li ult_tab_style_6  \" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\" style=\"background-color:#e7ecea;border-top-right-radius:8px;\">\r\n\t\t\t\t\t<a href=\"#1726739083823-10-4\" id=\"1726739083823-10-4\" style=\"color:#74777b;;border-color:#333333;  \" class=\"ult_a \">\r\n\t\t\t\t\t   <span class=\"ult_tab_main  Both \">\r\n\t\t\t\t\t    <span class=\"ult_tab_section\">\r\n\t\t\t\t\t  \t\t<span  data-ultimate-target='#advanced-tabs-wrap-6185 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult-responsive\" style=\"\">Data Disposal<\/span>\r\n\t\t\t\t\t\t   \t<span class=\"aio-icon none ult_tab_iconright\" style=\"color:#74777b;font-size:15px;\">\r\n\t\t\t\t\t\t   \t<i class=\"   ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t\t   <\/span>\r\n\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <\/span>\r\n\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li><\/ul><div  data-ultimate-target='#advanced-tabs-desc-wrap-1054 .ult_tabcontent .ult_tab_min_contain  p'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' class=\"ult_tabcontent ult-responsive style1\" style=\"border-style:none; border-radius:3px;color:#74777b;\"><div class=\"ult_tab_min_contain \" >\n\t\t\t<div  class=\"ult_tabitemname\"  >\n\t\t\t\t<div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Asset Inventory<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Maintaining a detailed inventory of all information assets, including hardware, software, data, and personnel.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Asset Ownership<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Identifying and assigning owners for each asset, who are responsible for ensuring appropriate protection.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Asset Classification<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Categorizing assets based on their value, sensitivity, and impact on the organization if compromised (e.g., public, confidential, secret).<\/span><\/span><\/li>\n<\/ul>\n <\/div>\n\t\t\t<\/div>\n\t\t\t<div  class=\"ult_tabitemname\"  >\n\t\t\t\t<div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Data States<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Recognizing the three states of data: at rest, in transit, and in use.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Data Retention<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Policies governing how long data should be retained and when it should be securely disposed of.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Data Masking and Obfuscation<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Techniques to obscure data, reducing exposure of sensitive information while maintaining its utility.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\n\t\t\t<\/div>\n\t\t\t<div  class=\"ult_tabitemname\"  >\n\t\t\t\t<div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<p style=\"margin: 0in; font-family: Calibri; font-size: 11pt; text-align: center;\"><strong><span style=\"color: #000000;\">Understanding the data life cycle phases<\/span><\/strong><\/p>\n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Create<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Data creation or acquisition.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Store<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Safe storage of data, ensuring integrity and confidentiality.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Use<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Proper access control and handling during usage.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Share<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Controlled sharing or distribution.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Archive<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Long-term retention for reference or compliance.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Destroy<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Secure disposal when no longer needed.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\n\t\t\t<\/div>\n\t\t\t<div  class=\"ult_tabitemname\"  >\n\t\t\t\t<div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Classification Levels<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Categorizing data based on its sensitivity (e.g., public, internal, confidential, highly confidential).<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Labeling<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Applying appropriate labels indicating the classification of data.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\n\t\t\t<\/div>\n\t\t\t<div  class=\"ult_tabitemname\"  >\n\t\t\t\t<div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Encryption<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Protecting data in transit and at rest using cryptographic methods.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Access Control<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Mechanisms to enforce who can access data, such as role-based access control (RBAC).<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Data Leakage Prevention (DLP)<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Tools and policies to prevent unauthorized data transfer or exposure.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\n\t\t\t<\/div>\n\t\t\t<div  class=\"ult_tabitemname\"  >\n\t\t\t\t<div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Media Sanitization<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Techniques for securely erasing data from storage media.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Media Storage<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Policies for the secure handling and storage of media containing sensitive data.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\n\t\t\t<\/div>\n\t\t\t<div  class=\"ult_tabitemname\"  >\n\t\t\t\t<div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Personally Identifiable Information (PII)<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Understanding regulations and protections for PII.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Data Masking<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Techniques used to protect PII or sensitive data by replacing it with functional, but not real, data.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\n\t\t\t<\/div>\n\t\t\t<div  class=\"ult_tabitemname\"  >\n\t\t\t\t<div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"color: #000000;\"><strong>Policies governing the handling, storage, and destruction of information based on its classification.<\/strong><\/span><\/li>\n<\/ul>\n <\/div>\n\t\t\t<\/div>\n\t\t\t<div  class=\"ult_tabitemname\"  >\n\t\t\t\t<div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"color: #000000;\"><strong>Understanding the impact of legal jurisdictions on data storage and handling.<\/strong><\/span><\/li>\n<\/ul>\n <\/div>\n\t\t\t<\/div>\n\t\t\t<div  class=\"ult_tabitemname\"  >\n\t\t\t\t<div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Least Privilege<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Ensuring users and systems have the minimum access required to perform their functions.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Data Owner<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> The entity responsible for data management, classification, and protection.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Data Custodian<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> The individual or team responsible for the safe custody, transport, and implementation of security policies for data.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\n\t\t\t<\/div>\n\t\t\t<div  class=\"ult_tabitemname\"  >\n\t\t\t\t<div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"color: #000000;\"><strong>Sanitization<\/strong>: Methods like clearing, purging, and destroying data to ensure it cannot be recovered.<\/span><\/li>\n<\/ul>\n <\/div>\n\t\t\t<\/div><\/div><\/div><\/div><div class=\"ult_acord advanced-tabs-desc-wrap-1054\">\r\n   <div class=\"ult-tabto-accordion \" style=\"width:;\"\r\n    data-titlecolor=\"#74777b\"  data-titlebg=\"#e7ecea\"\r\n     data-titlehoverbg=\"#4f90d1\" data-titlehovercolor=\"#ffffff\" data-animation=\"Slide\"\r\n     data-activetitle=\"#ffffff\" data-activeicon=\"\" data-activebg=\"#4f90d1\" data-scroll = \"on\" data-activeindex=\"1\" >\r\n     <dl><dt class=\"\">\r\n        \t<a class=\"ult-tabto-actitle withBorder ult_a\" id=\"1726738092277-7\" style=\"color:#74777b;border-color:#333333;;background-color:#e7ecea;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;\" href=\"#1726738092277-7\">\r\n        \t\t<i class=\"accordion-icon\"><\/i>\r\n        \t\t\t<span class=\"ult_tab_main ult_ac_mainBoth\">\r\n\t\t\t\t\t   <span  data-ultimate-target='#advanced-tabs-wrap-6185 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult_acordian-text ult-responsive\" style=\";color:inherit \" >Asset Management<\/span>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <div class=\"aio-icon none \" style=\"color:#74777b;font-size:15px;\" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\">\r\n\t\t\t\t\t   <i class=\"    ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t   <\/div>\r\n\t\t\t\t\t<\/a><\/dt>\r\n            \t\t<dd class=\"ult-tabto-accordionItem ult-tabto-accolapsed\">\r\n\t\t\t            <div class=\"ult-tabto-acontent\" style=\"border-style:none; border-radius:3px;color:#74777b;\">\r\n\t\t\t               <div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Asset Inventory<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Maintaining a detailed inventory of all information assets, including hardware, software, data, and personnel.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Asset Ownership<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Identifying and assigning owners for each asset, who are responsible for ensuring appropriate protection.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Asset Classification<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Categorizing assets based on their value, sensitivity, and impact on the organization if compromised (e.g., public, confidential, secret).<\/span><\/span><\/li>\n<\/ul>\n <\/div>\r\n\t\t\t            <\/div>\r\n        \t<\/dd><dt class=\"\">\r\n        \t<a class=\"ult-tabto-actitle withBorder ult_a\" id=\"1726738092825-8\" style=\"color:#74777b;border-color:#333333;;background-color:#e7ecea;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;\" href=\"#1726738092825-8\">\r\n        \t\t<i class=\"accordion-icon\"><\/i>\r\n        \t\t\t<span class=\"ult_tab_main ult_ac_mainBoth\">\r\n\t\t\t\t\t   <span  data-ultimate-target='#advanced-tabs-wrap-6185 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult_acordian-text ult-responsive\" style=\";color:inherit \" >Data Security<\/span>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <div class=\"aio-icon none \" style=\"color:#74777b;font-size:15px;\" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\">\r\n\t\t\t\t\t   <i class=\"    ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t   <\/div>\r\n\t\t\t\t\t<\/a><\/dt>\r\n            \t\t<dd class=\"ult-tabto-accordionItem ult-tabto-accolapsed\">\r\n\t\t\t            <div class=\"ult-tabto-acontent\" style=\"border-style:none; border-radius:3px;color:#74777b;\">\r\n\t\t\t               <div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Data States<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Recognizing the three states of data: at rest, in transit, and in use.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Data Retention<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Policies governing how long data should be retained and when it should be securely disposed of.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Data Masking and Obfuscation<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Techniques to obscure data, reducing exposure of sensitive information while maintaining its utility.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\r\n\t\t\t            <\/div>\r\n        \t<\/dd><dt class=\"\">\r\n        \t<a class=\"ult-tabto-actitle withBorder ult_a\" id=\"1726738093068-6\" style=\"color:#74777b;border-color:#333333;;background-color:#e7ecea;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;\" href=\"#1726738093068-6\">\r\n        \t\t<i class=\"accordion-icon\"><\/i>\r\n        \t\t\t<span class=\"ult_tab_main ult_ac_mainBoth\">\r\n\t\t\t\t\t   <span  data-ultimate-target='#advanced-tabs-wrap-6185 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult_acordian-text ult-responsive\" style=\";color:inherit \" >Data Life Cycle<\/span>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <div class=\"aio-icon none \" style=\"color:#74777b;font-size:15px;\" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\">\r\n\t\t\t\t\t   <i class=\"    ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t   <\/div>\r\n\t\t\t\t\t<\/a><\/dt>\r\n            \t\t<dd class=\"ult-tabto-accordionItem ult-tabto-accolapsed\">\r\n\t\t\t            <div class=\"ult-tabto-acontent\" style=\"border-style:none; border-radius:3px;color:#74777b;\">\r\n\t\t\t               <div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<p style=\"margin: 0in; font-family: Calibri; font-size: 11pt; text-align: center;\"><strong><span style=\"color: #000000;\">Understanding the data life cycle phases<\/span><\/strong><\/p>\n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Create<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Data creation or acquisition.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Store<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Safe storage of data, ensuring integrity and confidentiality.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Use<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Proper access control and handling during usage.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Share<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Controlled sharing or distribution.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Archive<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Long-term retention for reference or compliance.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Destroy<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Secure disposal when no longer needed.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\r\n\t\t\t            <\/div>\r\n        \t<\/dd><dt class=\"\">\r\n        \t<a class=\"ult-tabto-actitle withBorder ult_a\" id=\"1726738093313-2\" style=\"color:#74777b;border-color:#333333;;background-color:#e7ecea;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;\" href=\"#1726738093313-2\">\r\n        \t\t<i class=\"accordion-icon\"><\/i>\r\n        \t\t\t<span class=\"ult_tab_main ult_ac_mainBoth\">\r\n\t\t\t\t\t   <span  data-ultimate-target='#advanced-tabs-wrap-6185 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult_acordian-text ult-responsive\" style=\";color:inherit \" >Data Classification<\/span>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <div class=\"aio-icon none \" style=\"color:#74777b;font-size:15px;\" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\">\r\n\t\t\t\t\t   <i class=\"    ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t   <\/div>\r\n\t\t\t\t\t<\/a><\/dt>\r\n            \t\t<dd class=\"ult-tabto-accordionItem ult-tabto-accolapsed\">\r\n\t\t\t            <div class=\"ult-tabto-acontent\" style=\"border-style:none; border-radius:3px;color:#74777b;\">\r\n\t\t\t               <div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Classification Levels<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Categorizing data based on its sensitivity (e.g., public, internal, confidential, highly confidential).<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Labeling<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Applying appropriate labels indicating the classification of data.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\r\n\t\t\t            <\/div>\r\n        \t<\/dd><dt class=\"\">\r\n        \t<a class=\"ult-tabto-actitle withBorder ult_a\" id=\"1726738093551-8\" style=\"color:#74777b;border-color:#333333;;background-color:#e7ecea;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;\" href=\"#1726738093551-8\">\r\n        \t\t<i class=\"accordion-icon\"><\/i>\r\n        \t\t\t<span class=\"ult_tab_main ult_ac_mainBoth\">\r\n\t\t\t\t\t   <span  data-ultimate-target='#advanced-tabs-wrap-6185 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult_acordian-text ult-responsive\" style=\";color:inherit \" >Data Security Controls<\/span>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <div class=\"aio-icon none \" style=\"color:#74777b;font-size:15px;\" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\">\r\n\t\t\t\t\t   <i class=\"    ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t   <\/div>\r\n\t\t\t\t\t<\/a><\/dt>\r\n            \t\t<dd class=\"ult-tabto-accordionItem ult-tabto-accolapsed\">\r\n\t\t\t            <div class=\"ult-tabto-acontent\" style=\"border-style:none; border-radius:3px;color:#74777b;\">\r\n\t\t\t               <div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Encryption<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Protecting data in transit and at rest using cryptographic methods.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Access Control<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Mechanisms to enforce who can access data, such as role-based access control (RBAC).<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Data Leakage Prevention (DLP)<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Tools and policies to prevent unauthorized data transfer or exposure.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\r\n\t\t\t            <\/div>\r\n        \t<\/dd><dt class=\"\">\r\n        \t<a class=\"ult-tabto-actitle withBorder ult_a\" id=\"1726738093780-0\" style=\"color:#74777b;border-color:#333333;;background-color:#e7ecea;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;\" href=\"#1726738093780-0\">\r\n        \t\t<i class=\"accordion-icon\"><\/i>\r\n        \t\t\t<span class=\"ult_tab_main ult_ac_mainBoth\">\r\n\t\t\t\t\t   <span  data-ultimate-target='#advanced-tabs-wrap-6185 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult_acordian-text ult-responsive\" style=\";color:inherit \" >Media Management<\/span>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <div class=\"aio-icon none \" style=\"color:#74777b;font-size:15px;\" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\">\r\n\t\t\t\t\t   <i class=\"    ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t   <\/div>\r\n\t\t\t\t\t<\/a><\/dt>\r\n            \t\t<dd class=\"ult-tabto-accordionItem ult-tabto-accolapsed\">\r\n\t\t\t            <div class=\"ult-tabto-acontent\" style=\"border-style:none; border-radius:3px;color:#74777b;\">\r\n\t\t\t               <div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Media Sanitization<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Techniques for securely erasing data from storage media.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Media Storage<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Policies for the secure handling and storage of media containing sensitive data.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\r\n\t\t\t            <\/div>\r\n        \t<\/dd><dt class=\"\">\r\n        \t<a class=\"ult-tabto-actitle withBorder ult_a\" id=\"1726738094016-7\" style=\"color:#74777b;border-color:#333333;;background-color:#e7ecea;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;\" href=\"#1726738094016-7\">\r\n        \t\t<i class=\"accordion-icon\"><\/i>\r\n        \t\t\t<span class=\"ult_tab_main ult_ac_mainBoth\">\r\n\t\t\t\t\t   <span  data-ultimate-target='#advanced-tabs-wrap-6185 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult_acordian-text ult-responsive\" style=\";color:inherit \" >Data Privacy<\/span>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <div class=\"aio-icon none \" style=\"color:#74777b;font-size:15px;\" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\">\r\n\t\t\t\t\t   <i class=\"    ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t   <\/div>\r\n\t\t\t\t\t<\/a><\/dt>\r\n            \t\t<dd class=\"ult-tabto-accordionItem ult-tabto-accolapsed\">\r\n\t\t\t            <div class=\"ult-tabto-acontent\" style=\"border-style:none; border-radius:3px;color:#74777b;\">\r\n\t\t\t               <div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Personally Identifiable Information (PII)<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Understanding regulations and protections for PII.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Data Masking<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Techniques used to protect PII or sensitive data by replacing it with functional, but not real, data.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\r\n\t\t\t            <\/div>\r\n        \t<\/dd><dt class=\"\">\r\n        \t<a class=\"ult-tabto-actitle withBorder ult_a\" id=\"1726738092575-2\" style=\"color:#74777b;border-color:#333333;;background-color:#e7ecea;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;\" href=\"#1726738092575-2\">\r\n        \t\t<i class=\"accordion-icon\"><\/i>\r\n        \t\t\t<span class=\"ult_tab_main ult_ac_mainBoth\">\r\n\t\t\t\t\t   <span  data-ultimate-target='#advanced-tabs-wrap-6185 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult_acordian-text ult-responsive\" style=\";color:inherit \" >Information Lifecycle Management<\/span>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <div class=\"aio-icon none \" style=\"color:#74777b;font-size:15px;\" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\">\r\n\t\t\t\t\t   <i class=\"    ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t   <\/div>\r\n\t\t\t\t\t<\/a><\/dt>\r\n            \t\t<dd class=\"ult-tabto-accordionItem ult-tabto-accolapsed\">\r\n\t\t\t            <div class=\"ult-tabto-acontent\" style=\"border-style:none; border-radius:3px;color:#74777b;\">\r\n\t\t\t               <div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"color: #000000;\"><strong>Policies governing the handling, storage, and destruction of information based on its classification.<\/strong><\/span><\/li>\n<\/ul>\n <\/div>\r\n\t\t\t            <\/div>\r\n        \t<\/dd><dt class=\"\">\r\n        \t<a class=\"ult-tabto-actitle withBorder ult_a\" id=\"1726738094296-1\" style=\"color:#74777b;border-color:#333333;;background-color:#e7ecea;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;\" href=\"#1726738094296-1\">\r\n        \t\t<i class=\"accordion-icon\"><\/i>\r\n        \t\t\t<span class=\"ult_tab_main ult_ac_mainBoth\">\r\n\t\t\t\t\t   <span  data-ultimate-target='#advanced-tabs-wrap-6185 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult_acordian-text ult-responsive\" style=\";color:inherit \" >Data Sovereignty<\/span>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <div class=\"aio-icon none \" style=\"color:#74777b;font-size:15px;\" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\">\r\n\t\t\t\t\t   <i class=\"    ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t   <\/div>\r\n\t\t\t\t\t<\/a><\/dt>\r\n            \t\t<dd class=\"ult-tabto-accordionItem ult-tabto-accolapsed\">\r\n\t\t\t            <div class=\"ult-tabto-acontent\" style=\"border-style:none; border-radius:3px;color:#74777b;\">\r\n\t\t\t               <div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"color: #000000;\"><strong>Understanding the impact of legal jurisdictions on data storage and handling.<\/strong><\/span><\/li>\n<\/ul>\n <\/div>\r\n\t\t\t            <\/div>\r\n        \t<\/dd><dt class=\"\">\r\n        \t<a class=\"ult-tabto-actitle withBorder ult_a\" id=\"1726738094759-2\" style=\"color:#74777b;border-color:#333333;;background-color:#e7ecea;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;\" href=\"#1726738094759-2\">\r\n        \t\t<i class=\"accordion-icon\"><\/i>\r\n        \t\t\t<span class=\"ult_tab_main ult_ac_mainBoth\">\r\n\t\t\t\t\t   <span  data-ultimate-target='#advanced-tabs-wrap-6185 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult_acordian-text ult-responsive\" style=\";color:inherit \" >Access Management<\/span>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <div class=\"aio-icon none \" style=\"color:#74777b;font-size:15px;\" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\">\r\n\t\t\t\t\t   <i class=\"    ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t   <\/div>\r\n\t\t\t\t\t<\/a><\/dt>\r\n            \t\t<dd class=\"ult-tabto-accordionItem ult-tabto-accolapsed\">\r\n\t\t\t            <div class=\"ult-tabto-acontent\" style=\"border-style:none; border-radius:3px;color:#74777b;\">\r\n\t\t\t               <div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Least Privilege<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Ensuring users and systems have the minimum access required to perform their functions.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Data Owner<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> The entity responsible for data management, classification, and protection.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Data Custodian<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> The individual or team responsible for the safe custody, transport, and implementation of security policies for data.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\r\n\t\t\t            <\/div>\r\n        \t<\/dd><dt class=\"\">\r\n        \t<a class=\"ult-tabto-actitle withBorder ult_a\" id=\"1726739083823-10-4\" style=\"color:#74777b;border-color:#333333;;background-color:#e7ecea;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;\" href=\"#1726739083823-10-4\">\r\n        \t\t<i class=\"accordion-icon\"><\/i>\r\n        \t\t\t<span class=\"ult_tab_main ult_ac_mainBoth\">\r\n\t\t\t\t\t   <span  data-ultimate-target='#advanced-tabs-wrap-6185 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult_acordian-text ult-responsive\" style=\";color:inherit \" >Data Disposal<\/span>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <div class=\"aio-icon none \" style=\"color:#74777b;font-size:15px;\" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\">\r\n\t\t\t\t\t   <i class=\"    ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t   <\/div>\r\n\t\t\t\t\t<\/a><\/dt>\r\n            \t\t<dd class=\"ult-tabto-accordionItem ult-tabto-accolapsed\">\r\n\t\t\t            <div class=\"ult-tabto-acontent\" style=\"border-style:none; border-radius:3px;color:#74777b;\">\r\n\t\t\t               <div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li style=\"font-family: Calibri; font-size: 11pt;\"><span style=\"color: #000000;\"><strong>Sanitization<\/strong>: Methods like clearing, purging, and destroying data to ensure it cannot be recovered.<\/span><\/li>\n<\/ul>\n <\/div>\r\n\t\t\t            <\/div>\r\n        \t<\/dd>\r\n    \t<\/dl>\r\n    <!--<div class=\"extraborder\" style=\"background-color:#4f90d1\"><\/div>-->\r\n<\/div>\r\n\r\n<\/div>[\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Key Terms &amp; Definitions&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_wp_custommenu][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;]<div id=\"ultimate-heading-927769df393861c4c\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-927769df393861c4c uvc-1533 \" data-hspacer=\"line_only\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-927769df393861c4c h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">Domain_02: Key Terms &amp; Definitions<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]\n<ul>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Asset Classification<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">: Asset classification involves protecting them according to their value to the company. The owners of a company&#8217;s assets know their value best and should protect them.<\/span><\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Classification<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\">: Classification arranges values in a hierarchical fashion. The most valuable classes to an organization are confidential, followed by proprietary, while the least valuable classes are public. Classes are selected by various organizations according to their requirements. Organizations utilize several classification schemes, therefore it&#8217;s not a good idea to commit any one to memory.<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Security Label<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\">: Security Labels are used to correlate security attributes with an information object&#8217;s data structure. Labels are read by the system to determine data classification and protection.<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Security Marking<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\">: Security marking is similar to security label,\u00a0Method for assigning security properties to objects in a human-readable format. Labels are read to comprehend data classification and protection.<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Data Owner \/ Controller<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\">: The data owner, or data controller, is the most important role because they protect the data. The owner will define the categorization for data and the owner is then accountable for ensuring the data is safeguarded correctly.<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Data Custodian<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\">: Data custodians manage data technically. Custodians ensure data security, availability, capacity, backups, and restoration. They handle data technicalities.<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Crypto shredding<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\">: Crypto shredding involves encrypting data with an effective algorithm like AES 256 and destroying every duplicate of the encryption key. Crypto shredded and unrecoverable data is achieved by destroying the encryption key. Shredding crypto is between purging and clearing. The data cannot be recovered if the key is never recovered, brute forced, or the algorithm is not flawed. It was cleaned up. If any of those are true, the data may be recovered and was cleared.<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Digital Rights Management<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\">: Digital Rights Management (DRM) protects digital media copyright holders. DRM methods encrypt films, music files, eBooks, etc., allowing control over who may play them, how often, on what device, and whether they can be printed. Copyright holders can create and enforce usage rules with DRM technologies.<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Data Loss Prevention<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\">: Data Loss Prevention (DLP) solutions protect sensitive data against loss, abuse, and unauthorized access. Companies can identify, monitor, and secure data in use, motion, and rest using DLP systems. Data classification is essential for DLP systems. DLP systems can&#8217;t prevent all data from leaking or being exploited, thus organizations need data classification to identify sensitive data.<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Mantrap<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\">: Preventive 2-door physical control. Each door requires separate form of authentication<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Bollard<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\">: A post designed to stop a car, typically in front of building entrances<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Smart Car<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\">d: Physical access control device with integrated circuit<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Tailgating<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\">: Following an authorized person into a building without providing credentials<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Object Rescu<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\">e: The act of recovering information from previously used objects (files, tapes, etc.)<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Deleting<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\">: Removes the entry from the FAT and marks the blocks unallocated (data remains)<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Formatting<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\">: Destroys the FAT and creates new one (data remains)<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Overwriting<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\">: Writes over every character of a file or disk (more secure)<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Shredding<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\">\/<\/span><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Wiping<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\">: Overwrites file data before removing the FAT entry<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Degaussing<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\">: Destroys the integrity of magnetic media through using a strong magnetic field<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Destruction<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\">: Physically damages the media itself (incinerating, pulverizing, acid bath, etc.)<\/span><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; bg_color=&#8221;#ffffff&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Key Areas&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;mountains&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div id=\"ultimate-heading-309869df393861c67\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-309869df393861c67 uvc-5122 \" data-hspacer=\"line_only\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-309869df393861c67 h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">Domain_02: Key Areas<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]\n<ul>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Information and Asset Classification<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Ownership and Control of Assets<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Privacy Protection<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Data Security Controls<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Handling and Retention Policies<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Physical Security<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Asset Management<\/span><\/li>\n<li lang=\"en-US\" style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Information and Asset Ownership<\/span><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Asset Security_Mindmap&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div id=\"ultimate-heading-814769df393861c84\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-814769df393861c84 uvc-6955 \" data-hspacer=\"line_only\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-814769df393861c84 h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">Domain 02 - Asset Security_Mindmap<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_raw_html]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[\/vc_raw_html][nectar_btn size=&#8221;small&#8221; open_new_tab=&#8221;true&#8221; button_style=&#8221;regular&#8221; button_color_2=&#8221;Accent-Color&#8221; icon_family=&#8221;none&#8221; text=&#8221;Full Screen&#8221; url=&#8221;https:\/\/sajinshivdas.com\/cybersecurity\/cissp_mindmap_domain-02\/&#8221;]\r\n\t\t\t<div class=\"ult_dual_button  ult-adjust-bottom-margin to-center  \"  data-response=\"on\" id=\"ult_btn_778308094\">\r\n\r\n\t\t\t<div id=\"dualbtn-2197\" class=\"ulitmate_dual_buttons ult-dual-btn ult_main_dualbtn \" data-bcolor=\"#333333\"data-bhcolor=\"\">\r\n\r\n\t\t\t<div class=\"ult_dualbutton-wrapper btn-inline place-template bt1 \"><a href=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/12\/Domain_02_Asset-Security_pdf.zip\" target=\"_blank\" rel=\"noopener\"  class=\"ult_ivan_button round-square with-icon icon-before with-text place-template ult_dual1\" style=\";margin-right:px;;background-color:#ffffff !important;; border-color:#333333;border-style:;border-width:0px;border-radius:px;;\">\r\n\t\t\t<span class=\"ult-dual-btn-1 Style 1\" style=\"\"  data-bgcolor=\"#ffffff\" data-bghovercolor=\"#bcbcbc\" data-icon_color=\"#333333\" data-icon_hover_color=\"#333333\" data-textcolor=\"#333333\" data-texthovercolor=\"#333333\" data-iconbgcolor=\"transperent\" data-iconbghovercolor=\"transperent\" data-iconborder=\"transperent\" data-iconhoverborder=\"transperent\" >\r\n\t\t\t<span class=\"icon-simple icon-left1 ult_btn1span \"  style=\"; \">\n<span class=\"aio-icon btn1icon none \"  style=\"color:#333333;font-size:32px;\">\n\t<i class=\"Defaults-file-pdf-o\" ><\/i>\n<\/span><\/span>\r\n\t\t\t<span class=\"text-btn ult-dual-button-title ult-responsive\"  data-ultimate-target='#dualbtn-2197 .ult-dual-button-title'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"desktop:15px;\"}'  style=\"font-weight:normal;color:#333333;\">Download PDF Format<\/span>\r\n\r\n\t\t\t<\/span>\r\n\t\t\t<\/a><span class=\"middle-text\" style=\"line-height: 1.8em;color:#ffffff;background-color:#333333;border-width:0px;\">\r\n\t\t\t<span class=\"middle-inner\"  >or<\/span>\r\n\t\t\t<\/span>\r\n\r\n\t\t\t<\/div>\r\n\r\n\t\t\t<div class=\"ult_dualbutton-wrapper btn-inline place-template btn2 \"><a href=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/12\/Domain_02_Asset-Security_Jpeg.zip\" target=\"_blank\" rel=\"noopener\"  class=\"ult_ivan_button round-square with-icon icon-after with-text place-template ult_dual2\"  style=\";background-color:#ffffff !important;;margin-left:px;;border-color:#333333;border-style:;border-width:0px;border-radius:px;\">\r\n\t\t\t<span class=\"ult-dual-btn-2 Style 1\"  data-bgcolor=\"#ffffff\" data-bghovercolor=\"#bcbcbc\" data-icon_color=\"#333333\" data-icon_hover_color=\"#333333\" data-textcolor=\"#333333\" data-texthovercolor=\"#333333\" data-iconbgcolor=\"transperent\" data-iconbghovercolor=\"transperent\" data-iconborder=\"transperent\" data-iconhoverborder=\"transperent\" >\r\n\t\t\t<span class=\"text-btn ult-dual-button-title\" style=\"font-weight:normal;color:#333333;\">Download JPG Format<\/span>\r\n\r\n\t\t\t<span class=\"icon-simple icon-right2 ult_btn1span \"  style=\"; \">\n<span class=\"aio-icon btn1icon none \"  style=\"color:#333333;font-size:32px;display:inline-block;\">\n\t<i class=\"Defaults-file-image-o file-photo-o file-picture-o\" ><\/i>\n<\/span><\/span>\r\n\t\t\t<\/span>\r\n\t\t\t<\/a><\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<\/div>[\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Domain 02: Practise Tests&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div class=\"ult-spacer spacer-69df393861d03\" data-id=\"69df393861d03\" data-height=\"10\" data-height-mobile=\"10\" data-height-tab=\"10\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div><div id=\"ultimate-heading-121069df393861d15\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-121069df393861d15 uvc-1071 \" data-hspacer=\"line_only\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-121069df393861d15 h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">Domain 02: Practise Tests<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li><a href=\"https:\/\/sajinshivdas.com\/cybersecurity\/cissp_practice-questions-option_02\/\" target=\"_blank\" rel=\"noopener\">CISSP Practice Set_01: Asset Security<\/a><\/li>\n<\/ul>\n[\/vc_column_text][image_with_animation image_url=&#8221;10545&#8243; image_size=&#8221;medium_large&#8221; animation_type=&#8221;entrance&#8221; animation=&#8221;None&#8221; animation_movement_type=&#8221;transform_y&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;center&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221;][image_with_animation image_url=&#8221;9834&#8243; image_size=&#8221;medium_large&#8221; animation_type=&#8221;entrance&#8221; animation=&#8221;None&#8221; animation_movement_type=&#8221;transform_y&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;center&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221;]<div class=\" ubtn-ctn-center \"><a class=\"ubtn-link ult-adjust-bottom-margin ubtn-center ubtn-large \" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/cissp_practice-questions-option_02\/\" target=\"_blank\" rel=\"noopener\" ><button type=\"button\" id=\"ubtn-5334\"  class=\"ubtn ult-adjust-bottom-margin ult-responsive ubtn-large ubtn-no-hover-bg  ulta-pulse  ubtn-center   tooltip-69df393861d40\"  data-hover=\"\" data-border-color=\"\" data-bg=\"#3452ff\" data-hover-bg=\"\" data-border-hover=\"\" data-shadow-hover=\"\" data-shadow-click=\"none\" data-shadow=\"\" data-shd-shadow=\"\"  data-ultimate-target='#ubtn-5334'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-family:&#039;Ubuntu&#039;;font-weight:700;border:none;background: #3452ff;color: #ffffff;\"><span class=\"ubtn-hover\" style=\"background-color:\"><\/span><span class=\"ubtn-data ubtn-text \" >Practice Set 01<\/span><\/button><\/a><\/div>[divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Domain 02: Flashcard&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div class=\"ult-spacer spacer-69df393861d84\" data-id=\"69df393861d84\" data-height=\"10\" data-height-mobile=\"10\" data-height-tab=\"10\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div><div id=\"ultimate-heading-850969df393861d96\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-850969df393861d96 uvc-3226 \" data-hspacer=\"line_only\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-850969df393861d96 h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">Domain 02: Flashcard<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li><a href=\"https:\/\/sajinshivdas.com\/cissp-flashcard_domain_02-asset-security\/\">CISSP Flashcard_01: Asset Security<\/a><\/li>\n<\/ul>\n[\/vc_column_text][image_with_animation image_url=&#8221;10058&#8243; image_size=&#8221;medium_large&#8221; animation_type=&#8221;entrance&#8221; animation=&#8221;None&#8221; animation_movement_type=&#8221;transform_y&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;center&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221;]<div class=\" ubtn-ctn-center \"><a class=\"ubtn-link ult-adjust-bottom-margin ubtn-center ubtn-large \" href=\"https:\/\/sajinshivdas.com\/cissp-flashcard_domain_02-asset-security\/\" ><button type=\"button\" id=\"ubtn-7697\"  class=\"ubtn ult-adjust-bottom-margin ult-responsive ubtn-large ubtn-no-hover-bg  ulta-pulse  ubtn-center   tooltip-69df393861dbe\"  data-hover=\"\" data-border-color=\"\" data-bg=\"#3452ff\" data-hover-bg=\"\" data-border-hover=\"\" data-shadow-hover=\"\" data-shadow-click=\"none\" data-shadow=\"\" data-shd-shadow=\"\"  data-ultimate-target='#ubtn-7697'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-family:&#039;Ubuntu&#039;;font-weight:700;border:none;background: #3452ff;color: #ffffff;\"><span class=\"ubtn-hover\" style=\"background-color:\"><\/span><span class=\"ubtn-data ubtn-text \" >Flashcard Set 01<\/span><\/button><\/a><\/div>[divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Resources&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div class=\"ult-spacer spacer-69df393861df3\" data-id=\"69df393861df3\" data-height=\"10\" data-height-mobile=\"10\" data-height-tab=\"10\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div><div id=\"ultimate-heading-74069df393861e04\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-74069df393861e04 uvc-2450 \" data-hspacer=\"line_only\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-74069df393861e04 h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">Resources<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>(ISC)2 CISSP Official Study Guide (OSG) 9th Edition<\/strong>\u00a0by Mike Chapple, James Michael Stewart, and Darril Gibson<\/span>\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Chapter 05, Pg179-218<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>CISSP All-in-One Exam Guide, Ninth Edition <\/strong>by Fernando Maymi and Shon Harris<\/span>\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Part II, Pg213-253<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>Eleventh Hour CISSP\u00ae Study Guide, Third Edition <\/strong>by Eric Conrad, Seth Misenar, Joshua Feldma<\/span>\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Domain-02, Pg33-46<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>Destination Certification &#8211; A Concise Guide <\/strong>by Rob Witcher, John Berti, Lou Hablas, Nick Mitropoulos<\/span>\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Domain-02, Pg71-96<\/span><\/li>\n<\/ul>\n<\/li>\n<li>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><strong>The Official (ISC)2 CISSP CBK Reference, 6th Edition<\/strong> by Arthur Deane and Aaron Kraus<\/p>\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Domain-02, Pg97-144<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n[\/vc_column_text]<div id=\"ultimate-heading-658669df393861e1c\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-658669df393861e1c uvc-4241 \" data-hspacer=\"line_only\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-658669df393861e1c h4'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h4 style=\"font-weight:bold;color:#3452ff;\">Books Reference<\/h4><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div><div id=\"ultimate-heading-139869df393861e30\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-139869df393861e30 uvc-1495 \" data-hspacer=\"line_only\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-139869df393861e30 h4'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h4 style=\"font-weight:bold;color:#3452ff;\">Practice Tests Reference<\/h4><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>(ISC)2 CISSP Official Practice Tests <\/strong>by Mike Chapple and David Seidl<\/span><\/li>\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>How to Think Like a Manager for the CISSP Exam <\/strong>by Luke Ahmed<\/span><\/li>\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>Boson Practice Exam<\/strong><\/span><\/li>\n<li><a href=\"https:\/\/www.studynotesandtheory.com\/signup\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>Study Notes and Theory (SNT) by Luke Ahmed<\/strong><\/span><\/a><\/li>\n<\/ul>\n[\/vc_column_text]<div id=\"ultimate-heading-880969df393861e45\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-880969df393861e45 uvc-3871 \" data-hspacer=\"line_only\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-880969df393861e45 h4'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h4 style=\"font-weight:bold;color:#3452ff;\">Videos Reference<\/h4><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>Mike Chapple\u2019s <\/strong>CISSP Cert Prep on LinkedIn Learning.<\/span><\/li>\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>Kelly Handerhan\u2019s <\/strong>CISSP Prep Course on Cybrary<\/span><\/li>\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>Destination CISSP <a href=\"https:\/\/www.youtube.com\/watch?v=hf5NwUSEkwA&amp;list=PLZKdGEfEyJhLd-pJhAD7dNbJyUgpqI4pu\">Mindmap Video<\/a><\/strong><\/span><\/li>\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>Pete Zerger&#8217;s <a href=\"https:\/\/www.youtube.com\/playlist?list=PL7XJSuT7Dq_XPK_qmYMqfiBjbtHJRWigD\">CISSP Exam Cram<\/a>\u00a0<\/strong><\/span><\/li>\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>Prabh\u2019s <a href=\"https:\/\/www.youtube.com\/playlist?list=PL0hT6hgexlYx6ofKAChVOeQCi4AkV8YXL\">Coffee Shots<\/a><\/strong><\/span><\/li>\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>Luke Ahmed&#8217;s <a href=\"https:\/\/www.studynotesandtheory.com\/signup\">Study Notes and Theory (SNT)\u00a0<\/a><\/strong><\/span><\/li>\n<\/ul>\n[\/vc_column_text][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;credits&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div id=\"ultimate-heading-908269df393861e59\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-908269df393861e59 uvc-2962 \" data-hspacer=\"line_only\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-908269df393861e59 h4'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h4 style=\"font-weight:bold;color:#3452ff;\">Credits &amp; Disclaimer<\/h4><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]<span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">We express our gratitude to the below-mentioned authors, creators, and sources which have been referred for the creation of our Interactive CISSP Mindmap &#8211; <\/span><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Mike Chapple and David Seidl (OSG), Luke Ahmed (SNT), Pete Zerger (Exam Cram), Prashant Mohan (Memory Palace) , Prabh (Coffee shots), Rob Witcher (destcert.com\/)\u00a0 and M. Waleed Khaliq (CISSP Concepts Guide).<\/span><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">This Mindmap has been meticulously created to ensure that information is shared effectively. This Mindmap aims to offer a thorough grasp of essential concepts with a dedication to assist enhanced learning experiences. We hope that this resource helps people absorb information more thoroughly, which will lead to a broader understanding of each CISSP domains and is freely available for all.<\/span>[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Contribution&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div id=\"ultimate-heading-114569df393861e6d\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-114569df393861e6d uvc-6439 \" data-hspacer=\"line_only\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-114569df393861e6d h4'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h4 style=\"font-weight:bold;color:#3452ff;\">Contribution<\/h4><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]<span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">We have already included some reference images and short notes for most of the topics so that users can more effectively refer to the content in the mindmap. If you have any information, images, or notes that can make the mindmap more effective, please feel free to share them.<\/span><\/p>\n<p><a href=\"https:\/\/github.com\/sajinshivdas\/CISSP_Interactive_Mindmap\/tree\/main\/CISSP_Domain_02\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">https:\/\/github.com\/sajinshivdas\/CISSP_Interactive_Mindmap\/tree\/main\/CISSP_Domain_02<\/span><\/a><\/p>\n<p><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">For issues and concern please feel free to raise a issue in Github link <a href=\"https:\/\/github.com\/sajinshivdas\/CISSP_Interactive_Mindmap\/issues\">https:\/\/github.com\/sajinshivdas\/CISSP_Interactive_Mindmap\/issues<\/a><\/span><\/p>\n<p><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Connect with me <a href=\"http:\/\/www.linkedin.com\/in\/sajin-shivdas\">www.linkedin.com\/in\/sajin-shivdas<\/a><\/span>[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div class=\"ult-spacer spacer-69df393861e86\" data-id=\"69df393861e86\" data-height=\"20\" data-height-mobile=\"20\" data-height-tab=\"20\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div>[vc_column_text]\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><div style='display:none;' class='shareaholic-canvas' data-app='follow_buttons' data-title='CISSP Interactive Mindmap - Domain 2_Asset Security' data-link='https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mindmap-asset-security\/' data-app-id='28704193'><\/div>\n[\/vc_column_text]<div class=\"ult-spacer spacer-69df393861eea\" data-id=\"69df393861eea\" data-height=\"20\" data-height-mobile=\"20\" data-height-tab=\"20\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div>[\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Related Mindmaps&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;.vc_custom_1706288241725{margin-bottom: 50px !important;}&#8221;]\n<h3 style=\"text-align: center;\">Related Mindmaps<\/h3>\n<p style=\"text-align: center;\"><em>\u00a0Find the related mindmaps of CISSP Domains below.<\/em><\/p>\n[\/vc_column_text][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; css=&#8221;.vc_custom_1504187365562{margin-bottom: 2% !important;}&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/4&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][fancy_box box_style=&#8221;color_box_hover&#8221; icon_family=&#8221;fontawesome&#8221; link_new_tab=&#8221;true&#8221; color=&#8221;accent-color&#8221; color_box_hover_overlay_opacity=&#8221;default&#8221; box_alignment=&#8221;center&#8221; enable_border=&#8221;true&#8221; border_radius=&#8221;default&#8221; image_loading=&#8221;default&#8221; min_height=&#8221;120&#8243; icon_fontawesome=&#8221;fa fa-shield&#8221; icon_size=&#8221;25&#8243; link_url=&#8221;https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mindmap-domain-1-security-and-risk-management\/&#8221;]\n<h5>CISSP Domain_01<\/h5>\n<p><em>Security And Risk Management.<\/em>[\/fancy_box][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/4&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][fancy_box box_style=&#8221;color_box_hover&#8221; icon_family=&#8221;fontawesome&#8221; link_new_tab=&#8221;true&#8221; color=&#8221;accent-color&#8221; color_box_hover_overlay_opacity=&#8221;default&#8221; box_alignment=&#8221;center&#8221; enable_border=&#8221;true&#8221; border_radius=&#8221;default&#8221; image_loading=&#8221;default&#8221; min_height=&#8221;120&#8243; icon_fontawesome=&#8221;fa fa-book&#8221; icon_size=&#8221;25&#8243; link_url=&#8221;https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mindmap-asset-security\/&#8221;]\n<h5>CISSP Domain_02<\/h5>\n<p><em>Asset Security.<\/em>[\/fancy_box][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/4&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][fancy_box box_style=&#8221;color_box_hover&#8221; icon_family=&#8221;fontawesome&#8221; link_new_tab=&#8221;true&#8221; color=&#8221;accent-color&#8221; color_box_hover_overlay_opacity=&#8221;default&#8221; box_alignment=&#8221;center&#8221; enable_border=&#8221;true&#8221; border_radius=&#8221;default&#8221; image_loading=&#8221;default&#8221; min_height=&#8221;120&#8243; icon_fontawesome=&#8221;fa fa-microchip&#8221; icon_size=&#8221;25&#8243; link_url=&#8221;https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\/&#8221;]\n<h5>CISSP Domain_03<\/h5>\n<p><em>Security Architecture &amp; Engineering.<\/em>[\/fancy_box][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/4&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][fancy_box box_style=&#8221;color_box_hover&#8221; icon_family=&#8221;steadysets&#8221; link_new_tab=&#8221;true&#8221; color=&#8221;accent-color&#8221; color_box_hover_overlay_opacity=&#8221;default&#8221; box_alignment=&#8221;center&#8221; enable_border=&#8221;true&#8221; border_radius=&#8221;default&#8221; image_loading=&#8221;default&#8221; min_height=&#8221;120&#8243; icon_size=&#8221;25&#8243; link_url=&#8221;https:\/\/sajinshivdas.com\/cybersecurity\/domain-4-communication-and-network-security\/&#8221; icon_steadysets=&#8221;steadysets-icon-connection-75&#8243;]\n<h5>CISSP Domain_04<\/h5>\n<p><em>Communication and Network Security.<\/em>[\/fancy_box][\/vc_column_inner][\/vc_row_inner][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; css=&#8221;.vc_custom_1504187365562{margin-bottom: 2% !important;}&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/4&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][fancy_box box_style=&#8221;color_box_hover&#8221; icon_family=&#8221;fontawesome&#8221; link_new_tab=&#8221;true&#8221; color=&#8221;accent-color&#8221; color_box_hover_overlay_opacity=&#8221;default&#8221; box_alignment=&#8221;center&#8221; enable_border=&#8221;true&#8221; border_radius=&#8221;default&#8221; image_loading=&#8221;default&#8221; min_height=&#8221;120&#8243; icon_fontawesome=&#8221;fa fa-address-card&#8221; icon_size=&#8221;25&#8243; link_url=&#8221;https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-5-identity-and-access-management\/&#8221;]\n<h5>CISSP Domain_05<\/h5>\n<p><em>Identity and Access Management.<\/em>[\/fancy_box][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/4&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][fancy_box box_style=&#8221;color_box_hover&#8221; icon_family=&#8221;fontawesome&#8221; link_new_tab=&#8221;true&#8221; color=&#8221;accent-color&#8221; color_box_hover_overlay_opacity=&#8221;default&#8221; box_alignment=&#8221;center&#8221; enable_border=&#8221;true&#8221; border_radius=&#8221;default&#8221; image_loading=&#8221;default&#8221; min_height=&#8221;120&#8243; icon_fontawesome=&#8221;fa fa-user-secret&#8221; icon_size=&#8221;25&#8243; link_url=&#8221;https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-6-security-assessment-and-testing\/&#8221;]\n<h5>CISSP Domain_06<\/h5>\n<p><em>Security Assessment and Testing<\/em>[\/fancy_box][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/4&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][fancy_box box_style=&#8221;color_box_hover&#8221; icon_family=&#8221;fontawesome&#8221; link_new_tab=&#8221;true&#8221; color=&#8221;accent-color&#8221; color_box_hover_overlay_opacity=&#8221;default&#8221; box_alignment=&#8221;center&#8221; enable_border=&#8221;true&#8221; border_radius=&#8221;default&#8221; image_loading=&#8221;default&#8221; min_height=&#8221;120&#8243; icon_fontawesome=&#8221;fa fa-user&#8221; icon_size=&#8221;25&#8243; link_url=&#8221;https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mnemonic-memorization\/&#8221;]\n<h5>CISSP Mindmap<\/h5>\n<p><em>Mnemonic &amp; Memory Mindmap<\/em>[\/fancy_box][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/4&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][fancy_box box_style=&#8221;color_box_hover&#8221; icon_family=&#8221;fontawesome&#8221; link_new_tab=&#8221;true&#8221; color=&#8221;accent-color&#8221; color_box_hover_overlay_opacity=&#8221;default&#8221; box_alignment=&#8221;center&#8221; enable_border=&#8221;true&#8221; border_radius=&#8221;default&#8221; image_loading=&#8221;default&#8221; min_height=&#8221;120&#8243; icon_size=&#8221;25&#8243; link_url=&#8221;https:\/\/sajinshivdas.com\/cybersecurity\/threats-countermeasures\/&#8221; icon_fontawesome=&#8221;fa fa-bug&#8221;]\n<h5>CISSP Mindmap<\/h5>\n<p><em>Threats &amp; Countermeasures<\/em>[\/fancy_box][\/vc_column_inner][\/vc_row_inner][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/6&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][\/vc_column_inner][vc_column_inner column_padding=&#8221;padding-2-percent&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;left-right&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; centered_text=&#8221;true&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;2\/3&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; enable_animation=&#8221;true&#8221; animation=&#8221;fade-in&#8221; animation_easing=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][nectar_gradient_text heading_tag=&#8221;h5&#8243; color=&#8221;extra-color-gradient-2&#8243; gradient_direction=&#8221;horizontal&#8221; text=&#8221;Complete Mindmaps&#8221; margin_bottom=&#8221;10&#8243;][vc_custom_heading text=&#8221;Complete list of Mindmaps related to Cybersecurity&#8221; font_container=&#8221;tag:h2|font_size:52|text_align:center|line_height:52px&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;fadeInUp&#8221;][vc_custom_heading text=&#8221;Cybersecurity Mindmaps&#8221; font_container=&#8221;tag:p|text_align:center|color:rgba(0%2C0%2C0%2C0.7)&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1707775606373{margin-top: 10px !important;margin-bottom: 10px !important;}&#8221;][nectar_btn size=&#8221;jumbo&#8221; open_new_tab=&#8221;true&#8221; button_style=&#8221;regular&#8221; button_color_2=&#8221;extra-color-gradient-2&#8243; icon_family=&#8221;default_arrow&#8221; url=&#8221;https:\/\/sajinshivdas.com\/sajins-mind-maps\/&#8221; text=&#8221;Find More&#8221; css_animation=&#8221;zoomIn&#8221; margin_top=&#8221;30&#8243;][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/6&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":9323,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[81],"tags":[],"class_list":{"0":"post-8879","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-documents-and-reference"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISSP Interactive Mindmap - Asset Security<\/title>\n<meta name=\"description\" content=\"A comprehensive CISSP Mindmap Series will include all 8 Domains. This cissp interactive mindmap Asset Security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mindmap-asset-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISSP Interactive Mindmap - Asset Security\" \/>\n<meta property=\"og:description\" content=\"A comprehensive CISSP Mindmap Series will include all 8 Domains. This cissp interactive mindmap Asset Security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mindmap-asset-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-30T16:41:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-19T10:12:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/12\/sajin_cissp_thumbnail_02.png\" \/>\n\t<meta property=\"og:image:width\" content=\"940\" \/>\n\t<meta property=\"og:image:height\" content=\"788\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sajin Shivdas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sajin Shivdas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-mindmap-asset-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-mindmap-asset-security\\\/\"},\"author\":{\"name\":\"Sajin Shivdas\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"headline\":\"CISSP Interactive Mindmap &#8211; Domain 2_Asset Security\",\"datePublished\":\"2023-12-30T16:41:36+00:00\",\"dateModified\":\"2024-09-19T10:12:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-mindmap-asset-security\\\/\"},\"wordCount\":6801,\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-mindmap-asset-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/sajin_cissp_thumbnail_02.png\",\"articleSection\":[\"Documents and Reference\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-mindmap-asset-security\\\/\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-mindmap-asset-security\\\/\",\"name\":\"CISSP Interactive Mindmap - Asset Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-mindmap-asset-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-mindmap-asset-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/sajin_cissp_thumbnail_02.png\",\"datePublished\":\"2023-12-30T16:41:36+00:00\",\"dateModified\":\"2024-09-19T10:12:19+00:00\",\"description\":\"A comprehensive CISSP Mindmap Series will include all 8 Domains. This cissp interactive mindmap Asset Security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-mindmap-asset-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-mindmap-asset-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-mindmap-asset-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/sajin_cissp_thumbnail_02.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/sajin_cissp_thumbnail_02.png\",\"width\":940,\"height\":788,\"caption\":\"CISSP Interactive Mindmap - Asset Security_01\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-mindmap-asset-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISSP Interactive Mindmap &#8211; Domain 2_Asset Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\",\"name\":\"sajinshivdas.com\",\"description\":\"Cybersecurity - Information security Resources, Articles and Latest News\",\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"alternateName\":\"Sajin Shivdas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\",\"name\":\"Sajin Shivdas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"width\":1000,\"height\":500,\"caption\":\"Sajin Shivdas\"},\"logo\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\"},\"sameAs\":[\"http:\\\/\\\/sajinshivdas.com\\\/security\",\"www.linkedin.com\\\/in\\\/sajin-shivdas\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISSP Interactive Mindmap - Asset Security","description":"A comprehensive CISSP Mindmap Series will include all 8 Domains. This cissp interactive mindmap Asset Security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mindmap-asset-security\/","og_locale":"en_US","og_type":"article","og_title":"CISSP Interactive Mindmap - Asset Security","og_description":"A comprehensive CISSP Mindmap Series will include all 8 Domains. This cissp interactive mindmap Asset Security.","og_url":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mindmap-asset-security\/","og_site_name":"Sajin Shivdas | Cybersecurity","article_published_time":"2023-12-30T16:41:36+00:00","article_modified_time":"2024-09-19T10:12:19+00:00","og_image":[{"width":940,"height":788,"url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/12\/sajin_cissp_thumbnail_02.png","type":"image\/png"}],"author":"Sajin Shivdas","twitter_misc":{"Written by":"Sajin Shivdas","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mindmap-asset-security\/#article","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mindmap-asset-security\/"},"author":{"name":"Sajin Shivdas","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"headline":"CISSP Interactive Mindmap &#8211; Domain 2_Asset Security","datePublished":"2023-12-30T16:41:36+00:00","dateModified":"2024-09-19T10:12:19+00:00","mainEntityOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mindmap-asset-security\/"},"wordCount":6801,"publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mindmap-asset-security\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/12\/sajin_cissp_thumbnail_02.png","articleSection":["Documents and Reference"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mindmap-asset-security\/","url":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mindmap-asset-security\/","name":"CISSP Interactive Mindmap - Asset Security","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mindmap-asset-security\/#primaryimage"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mindmap-asset-security\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/12\/sajin_cissp_thumbnail_02.png","datePublished":"2023-12-30T16:41:36+00:00","dateModified":"2024-09-19T10:12:19+00:00","description":"A comprehensive CISSP Mindmap Series will include all 8 Domains. This cissp interactive mindmap Asset Security.","breadcrumb":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mindmap-asset-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mindmap-asset-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mindmap-asset-security\/#primaryimage","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/12\/sajin_cissp_thumbnail_02.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/12\/sajin_cissp_thumbnail_02.png","width":940,"height":788,"caption":"CISSP Interactive Mindmap - Asset Security_01"},{"@type":"BreadcrumbList","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mindmap-asset-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sajinshivdas.com\/cybersecurity\/"},{"@type":"ListItem","position":2,"name":"CISSP Interactive Mindmap &#8211; Domain 2_Asset Security"}]},{"@type":"WebSite","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website","url":"https:\/\/sajinshivdas.com\/cybersecurity\/","name":"sajinshivdas.com","description":"Cybersecurity - Information security Resources, Articles and Latest News","publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"alternateName":"Sajin Shivdas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sajinshivdas.com\/cybersecurity\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6","name":"Sajin Shivdas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","width":1000,"height":500,"caption":"Sajin Shivdas"},"logo":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png"},"sameAs":["http:\/\/sajinshivdas.com\/security","www.linkedin.com\/in\/sajin-shivdas"]}]}},"_links":{"self":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/8879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=8879"}],"version-history":[{"count":0,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/8879\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media\/9323"}],"wp:attachment":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=8879"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/categories?post=8879"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/tags?post=8879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}