Category IT Security

Challenge-Response Authentication

This post explains the concept of challenge-response authentication. Concept of Challenge-Response Authentication In computer security, challenge–response authentication is a family of protocols in which one party presents a question (“challenge”) and another party must provide a valid answer (“response”) to…

How to prepare CISM Exam

CISM (Certified in Information Security Manager) is a certification issued by professional association ISACA. The purpose of this post is to provide information to future exam candidates about how to pass the exam, based on my own experience. Frequently Asked…