CISSP TERMS AND DEFINITIONS
Domain 1: Security & Risk Management
CIA Traid
Confidentiality
Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. Note-Encryption (At transit - TLS)(At rest -AES-256).
Integrity
Guarding against improper information modification or destruction and includes ensuring information or destruction and includes ensuring information or destruction and includes ensuring information non-repudiation and authenticity.
Availability
Ensuring timely and reliable access to and use of information by authorized users.
D.A.D
Disclosure, Alteration and Destruction
Disclosure:
Opposite of Confidentiality
Alteration:
Opposite of Integrity
Destruction:
Opposite of Availability
Achieving CIA Best Practices
- Separation of Duties
- Mandatory Vacations
- Job Rotation
- Least Privileges
- Need to know
- Need to know
- Dual Control
What is IAAAA?
- Identification: Unique user identification
- Authentication: Validation of identification
- Authorization: Verification of privileges and permissions for authenticated user
- Accountability: Only authorized users are accessing and use the system accordingly
- Auditing: Tools, processes, and activities used to achieve and maintain compliance
Plans
Type Duration Example
Strategic Plan up to 5 year Risk Assessment
Tactical Plan maximum of 1 year Project budget, staffing etc.
Operational Plan a few months Patching computers updating
AV signatures Daily network administration
Protection Mechanisms
- Layering
- Abstractions
- Data Hiding
- Encryption
What is Data Classification?
Risk Management
- No risk can be completely avoided.
- Risks can be minimized and controlled to avoid impact of damages.
- Risk management is the process of identifying, examining, measuring, mitigating, or transferring risk.
Risk Terminology
- Asset: Anything of value to the company.
- Vulnerability: A weakness; the absence of a safeguard.
- Threat: Things that could pose a risk to all or part of an asset.
- Threat Agent: The entity which carries out the attack.
- Exploit: An instance of compromise.
- Risk: The probability of a threat materializing.
Risk Management Frameworks
Preventive Ex ISO 27001:
Deterrent Ex ISO 27000:
Detective:
Corrective:
Recovery:
Risk Management Life Cycle
- Assessment
- Analysis
- Mitigation/Response
Comments
Post a Comment