Please enable JavaScript.
Coggle requires JavaScript to display documents.
Section 2: Cybersecurity Concepts (Topic 4: Cybersecurity Controls…
Section 2: Cybersecurity Concepts
Topic 1: Risk
Approaches
Ad hoc
Compliance-based
Risk-based
Scenarios
Actor
Threat Type
Event
Asset & Resource
Time
Third Party
Different entities have different security cultures and risk tolerances
Risk Factors
Topic 2: Common Attack Types and Vectors
Attack Attributes
Attack Vector
Ingress
Engress
Payload
Exploit
Vulnerability
Target
Non-adversarial Threat Events
Fire, flood
Information mishandling
Incorrect privilege settings
Topic 3: Policies and Procedures
IS Policies
Specify requirements
Define roles in organization
Outline expected behaviours
Policy Life Cycle
Create
Review
Update
Approve
Compliance Document Types
Policies
Standards
Procedures
Guidelines
Policy Types
Access Control Policy
Provides proper access to internal and external stakeholders
Security Incident Response Policy
Respond to cybersecurity incidents in timely manner
Personnel Information Security Policy
Regular background checks
Information acquisition
Succession plan development
Implementation of appropriate procedures for termination
Topic 4: Cybersecurity Controls
Identity management
Directory services
Authentication services
Authorization services
User-management capilities
Provisioning and Deprovisioning
Manage passwords and access control rights
Provisioning - when user is created
Deprovisioning - when user leaves organization
Authorization and Access Restrictions
Identify and differentiate among users
Access Control Lists
Manage user groups, machines, processes and the type of access permitted
Access Lists
Filter traffic and network interfaces
Change Management
Privileged User Management
Background checks for elevated access
Additional activity logging
Use of stronger passwords
Regular review and / or removal of privileges
Configuration Management
Maintaining security of IT resources
Patch Management
Solution to programming errors