Foundations of cybersecurity_C1 Flashcards
What are the benefits of organisational security teams?
- Threat protection- Protects against external and internal threats.
- Compliance Regulation- org meets security standards required by laws and guidelines.
- Productivity- Maintain and improve business productivity.
- Expense Reduction- during data loss recovery, operation downtime and prevent fines.
- Brand Trust- data compromises lower trust and impact business.
What does CISSP stand for?
Certified Information Systems Security Professional
What are the 8 Eight CISSP Security Domains?
- Security and Risk Management
- Asset Security
- Security Architecture and Engineering
- Communications and Network Security
- Identity and Access Management (IAM)
- Security Assessment and Testing
- Security Operations
- Software Development Security
Which of the following is NOT a security domain covered in the CISSP?
a) Security and risk management
b) Asset security
c) Software development security
d) Cloud security
d) Cloud security
What is the principle of least privilege?
a) Granting users the highest level of access possible
b) Granting users only the minimum level of access necessary to perform their tasks
c) Allowing users to access any data they want d) Restricting users from accessing any data
b) Granting users only the minimum level of access necessary to perform their tasks
What is ‘Security Posture’?
An organisation’s ability to manage it’s defence of critical assets and data, and react to change
What is Risk Mitigation?
The process of having the right procedures and rules in place to quickly reduce the impact of a risk like breach
Business Continuity
An organisation’s ability to maintain their everyday productivity by establishing risk disaster recovery plans
CISSP Domain 1
Security and Risk Management involves:
-Defines security goals and objectives: reduce risks to critical assets and data like PII
-Mitigates risks processes: right procedures/rules in place to quickly reduce the impact of a risk. i.e. a breach
-Ensures compliance: used to develop an organization’s internal security policies, regulatory requirements, and independent standards.
-Establishes business continuity:
organization’s ability to maintain everyday productivity by establishing risk disaster recovery plans.
-Adheres to legal regulations: Different worldwide laws, but overall goals are similar (related to security and risk management).
-Professional and organisational ethics:
This means following rules and expectations for ethical behaviour to minimize negligence, abuse, or fraud.
Information security, or InfoSec
related CISSP domain 1 and refers to a set of processes established to secure information.
An organization may use playbooks and implement training as a part of their security and risk management program, based on their needs and perceived risk.
There are many InfoSec design processes, i.e:
Incident response
Vulnerability management
Application security
Cloud security
Infrastructure security
CISSP Domain 2:
Asset Security involves:
managing the cybersecurity processes of organizational assets
-Secures digital and physical assets:
-Stores, maintains, retains, and destroys physical and virtual data securely
-Protects PII and SPII
-Ensures data is securely handled and protected
CISSP Domain 3:
Security Architecture and Engineering involves:
managing date security-Security Architects and engineers create processes
Optimizes data security
Implements effective tools, systems, and processes
Promotes shared responsibility:
Encourages user involvement in security
What is meant by ‘Shared responsibility’ ?
all individuals within an organization take an active role in lowering risk and maintaining both physical and virtual security.
By having policies that encourage users to recognize and report security concerns, many issues can be handled quickly and effectively.
What are some of the Security Architecture and Engineering design principles:
Threat modeling
Least privilege
Defense in depth
Fail securely
Separation of duties
Keep it simple
Zero trust
Trust but verify
CISSP Domain 4
Communication and Network Security involves:
-Manages and secures physical networks and wireless communications.
-Protects data and communications on-site, in the cloud, and remotely
-Prevents vulnerabilities from insecure connections
-Discourages insecure behaviour that could be exploited by threat actors