Please enable JavaScript.
Coggle requires JavaScript to display documents.
CISSP - Coggle Diagram
CISSP
-
Domain 05
-
-
-
-
Identification and Authentication of people, Devices and Services.
-
-
-
-
-
-
-
-
-
-
-
-
Domain 01
Senior management is responsible for all mergers, acquisitions, and divestitures.
-
RISK MANAGEMENT
risk management should be done at least once a year or any time when there is a major change in an organization
-
-
RISK ASSESSMENT
-
-
-
-
-
-
-
Here you figure out what the main risk that your company can face like networks datacenters assets etc
-
-
-
-
-
-
-
-
Domain 03
-
-
-
-
-
-
-
-
-
-
-
Cryptography
-
-
-
-
-
-
Cryptanalysis
the guy in the middle who tries to decrypt the data while the data is flowing from sender to receiver.
-
Hash
-
You calculate the hash of the data before sending the data and after receiving the data. Both hashes should be same otherwise there is some changes made by some in the middle of the flow of data.
-
-
-
-
-
-
-
-
-
-
-
-
Methods of cryptography
-
Block cipher
Process fixed-size blocks of data, usually 64 or 128 bits, to produce ciphertext.
-
-
-
-
-
-
-
-
Domain 04
OSI MODEL
Application layer 01
-
Where end users interacts with the application and the application interacts with the Network process.
-
Presentation layer 02
-
-
It is like the gift wrapping and checking if the address of the destination is correct and in understandable format or not.
Session layer 03
-
-
Hand over your gift to postal service. This is like the interaction between different postal services, maintaining a continuous process until delivery.
-
Transport layer 04
-
Provides end-to-end communication control and ensures complete data transfer. It includes error checking and data flow control.
The postal service ensures that your card will be delivered reliably, tracking its path, and ensuring it doesn't get lost.
Network layer 05
-
-
The postal service determines the best route for the card to take, perhaps sending it through various sorting centers and other countries.
-
Data link layer 06
-
Responsible for node-to-node data transfer and error detection/correction. It ensures that data is transferred reliably over the physical link.
Each local post office and sorting center handles the card, ensuring it gets to the next point correctly.
-
-
-
Physical layer 07
-
The card travels via trucks, planes, and other physical means to reach the destination.
Deals with the physical connection between devices and the transmission and reception of raw bitstreams over a physical medium.
-
-
-
-
-
-
-
-
-
-
-
-
Domain 02
-
-
-
-
-
-
-
Data Protection Method
Baseline
Low risk
Access, process, no encryption, no labelling, no monitoring
Medium risk
Access password, Symmetric encryption(one key to encrypt and decrypt), no labeling, timely monitoring
-
Data Remanence
It is defined as the residual data remaining on some sort of data after the data has been deleted or erased
-
-
-
-
-