Module 1 - 02-1 Flashcards
More about the CISSP security domains
Define Security posture
An organization’s ability to manage its defense of critical assets and data and react to change
What does CISSP stand for?
Certified Information Systems Security Professional (CISSP)
What are the eight CISSP Security Domains (8)?
- Security and Risk Management
- Asset Security
- Security Architecture and Engineering
- Communication and Network Security
- Identity and Access Management (IAM)
- Security Assessment and Testing
- Security Operations
- Software Development Security
What is the first (1st) CISSP Security Domain?
- Security and Risk Management
What is the second (2nd) CISSP Security Domain?
- Asset Security
What is the third (3rd) CISSP Security Domain?
- Security Architecture and Engineering
What is the fourth (4th) CISSP Security Domain?
- Communication and Network Security
What is the fifth (5th) CISSP Security Domain?
- Identity and Access Management (IAM)
What is the sixth (6th) CISSP Security Domain?
- Security Assessment and Testing
What is the seventh (7th) CISSP Security Domain?
- Security Operations
What is the eight (8th) CISSP Security Domain?
- Software Development Security
What areas does the first (1st) Security Domain, Security and Risk Management, focus on (5)?
- Defining Security Goals and Objectives,
- Risk Mitigation,
- Compliance,
- Business Continuity,
- Legal Regulations
(Professional and Organizational Ethics)
Define how Security Goals and Objectives pertains to the Security and Risk Management Domain
Organizations can reduce risks to critical assets and data like PII, or personally identifiable information
Define how Risk Mitigation pertains to the Security and Risk Management Domain
Having the right procedures and rules in place to quickly reduce the impact of a risk like a breach
Define how Compliance pertains to the Security and Risk Management Domain
The primary method used to develop an organization’s internal security policies, regulatory requirements, and independent standards
Define how Business Continuity pertains to the Security and Risk Management Domain
An organization’s ability to maintain their everyday productivity by establishing risk disaster recovery plans
Define how Legal Regulations pertains to the Security and Risk Management Domain
Following rules and expectations for ethical behavior to minimize negligence, abuse, or fraud
Define Risk Mitigation
The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach
Define Business Continuity
An organization’s ability to maintain their everyday productivity by establishing risk disaster recovery plans
What does InfoSec stand for?
Information Security
Which CISSP Security Domain does InfoSec relate to?
CISSP Security and Risk Management Security Domain
What does InfoSec refer to?
A set of processes established to secure information
What are some InfoSec design processes (5)?
- Incident response
- Vulnerability management
- Application security
- Cloud security
- Infrastructure security