Please enable JavaScript.
Coggle requires JavaScript to display documents.
ISC2, Acronyms - Coggle Diagram
ISC2
Chapter-3
Controls
(1.18)
Mod-1
Key Concepts
Overview
Control and Risk
Control Framework
Control Assessments
Defense in Depth
Least Privilege
User lifecycle management
PAM
Segregation of Duties
What is a Controls:
A safeguard or countermeasure
designed to protect the confidentiality, integrity and availability of its information and to meet a set of defined security requirements
-
Control Assessment
Risk reduction is typically dependent upon the effective function of the control
Changing environments
What if the control is impaired or ineffective
Security: frequency, scope, plan
-
-
Mod-3
Physical Controls
Key concepts
Controlling physical access
Interdependence between control types
High security areas
Secuirty zones
Physical security and risk
DC located in a high crime area
increase technical controls as well as physical controls (encrypt disks)
Some areas are sensitive, example data/research. You can zone off diff areas of the business
Linked physical security to risk management
Env Design
CPTED (crime prevention through env design)
Risk of location drives control selection
Perimeter fencing
Open green space
Physical barriers
Defensive planting
Shape physical env to support security
example - concreate monuments act as a barrier to stop vehicle access, plants to add protection, plants with thorns make it difficult for a intruder to stand near by - these are simple ideas but increase security, open green space, makes it harder for an intruder to hide
-
Biometrics
Throughput, Accuracy, Invasiveness, Alternative approaches
-
Consider finger print scanner that has 100% accuracy, but people with damaged finger prints
Security
Detect, Deter, Prevent, Correct
-Guard dogs
-Security screening
-Personnel screening
CCTV, analog vs digital
low light and infrared
Field of vision Retention and media
-
-
-
Mod-5
Chapter Review
Risk and asset value drive our use of controls
Controls must be checked to ensure they are working correctly in managing risk
Defense in depth as a model seeks to layer provide greater benefit; administrative, physical, and logical controls should be used in combination to offer the best protection
User LCM is simple conceptually, but practically can be complex to implement correctly
Privileged accounts represent a high-value target and require additional protection
Identification, authentication, authorization and auditing are separate and important concepts to be able to understand
Logs and other retention schedules require planning and agreement
Logs are made consequential only with their review
DAC allows the asset owner to directly enforce access
RBAC models access control around induvial roles
MAC enforces security through the management requests through a central agency
-
Chapter-1
Risk Mgmt
Mod-x
Risk Management
-
-
Think about the value of your assets
Does your environment affect risk?
Would a company operating in Japan face similar risks to one operating in the Middle East?
-
Chapter-4
Network Security
(2:11)
-
-
-
Mod-4
Chapter Review
There are 48 bits in the hardware or MAC addressed. The 48 bits consist of a 24-bit provider and 24-bit device identifier
Unicast means 1 device s sending to another
A hub noisy (forwards to all ports)
A switch improves performance and security a network by sending unicast frames only to the designed node
Packets are L3, switch operates at L2
-
-