CISSP Domain-1 Flashcards
Q:Accountability vs. Auditing
“Auditing recording a log of the events and activities related to the system and subjects
Accounting (aka accountability) reviewing log files to check for compliance and violations in order to hold subjects accountable for their actions”
confidentiality
no unautorized can access the data ,prevent disclosure of information “for data at Rest Encryption AES 256
for Data at motion Secure transmission protocol SSL TLS IPSEC
for Data in Use clean desk, shoulder surfing, screen view angle protector
PC locking (automatic and when leaving)
“
Integrity
unauthorized modification of DATA
Availability
Authorized people can access data when they need
Threats on CIA
“Cryptanalysis : attack on encryption
Social Engineering
Key logger
IoT: the going number of connected devices
may create backdoor to access another device”
Non repudation
Digital signature with my own private key
Framework
is a logical structure to ducument and organize processes ,”Intl Framework : ISO 27000
National : NIST cybersecurity framework
Regulrity : FDIC cybersecurity assestment tool (CAT)
Industry : HITRUST common security framework Health care
PCS DSS credit card industry
“
Benchmark
“information secuirty benchmark is intended
to help an org indentify their cybesecurity
capabilites and initiatives and compare those
efforts to peers or competetiors in same industry .
“
CIS Benchmark
” >Center for Internet Secuirty
>Hardening Vulnerability Checklist across all platform
>secure configuration guidance
> consensus-derived checklists”
NIST SP800
“National institute of standard and tech NIST SP 800
govt sector configuration guidelines”
NCP
“National Checklist program , us govt repository
of publically configuration checklist of different products
“
NIST cybersecurity framework
“This voluntary Framework consists of standards, guidelines,
and best practices to manage cybersecurity-related risk.”
HITRUST
“HITRUST CSF is a controls-based risk management framework that aligns with and supports the NIST Framework,widely adopted in healthcare
“
NVD
NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP).
Due Care Vs Due Deligence
“Due care is what a prudent man should do under a similar condition
Due deligence is investigation before engaging in a contact or business”
Downstream Liability
“when your organizations IT system is compromised
and they become source of attack to another systems
then it is called the downstream liability .”
Owners/Custodian/users
“Owners: part of management who will protect subset of information
Custodian : IT guys , implement solution, maintenance monitor
User: follow regular organizational policy”
Security Governance
“security governence emphasizes on securit is no only
itissues.security gooverence is the practices that are taken
to define,support and direct the secuirty efforts of an origaization.
NIST SP 8–053 and NIST800-100 are security frame work for
govt and military ,
but they can be adopted in other organizations also
security governence managed by board of directors.”
Security Management
“Security managment planning ensures that
security policies should be aligned with
the goals , mission and objectives of the organizations.
This includes design and implementing seurity based on
business cases.”
Business Case
“Documented arguent in order define a need
to make decission , its often needed before a start of a new project .It is also necessary to allocate budget.
“
Key note
“The best security plan is useless without the approval from sr management
if company does not practice due care and due deligence then
manager can be held liable for negligence and held accountable
for both asset and financial looses”
Strategic Tactical operational planning
“Strategic planning : 5 years , should include a risk assesment
Tactical Planning 1 year , planning to achieve goals set in
strategic planning , or canbe crafted adhoc based
upon unpredicted events.
Operational plans short term , monthly quarter , step by step
“
Security alignment
” align security policies with
business cases to support orginizational goals”
value delivery
“optimize investments in support of business objectives
“