CISSP Domain 1: Security and Risk Management - Cornerstone information Security Concepts

Descripción

Certificate CISSP Mapa Mental sobre CISSP Domain 1: Security and Risk Management - Cornerstone information Security Concepts, creado por reginaldsands el 26/02/2016.
reginaldsands
Mapa Mental por reginaldsands, actualizado hace más de 1 año
reginaldsands
Creado por reginaldsands hace alrededor de 8 años
122
4

Resumen del Recurso

CISSP Domain 1: Security and Risk Management - Cornerstone information Security Concepts
  1. Cornerstone of information Security Concepts
    1. CIA Triad
      1. Confidentiality

        Nota:

        • - Its opposing force is Disclosure. - An example of a confidentiality attack would be the theft of Personally Identifiable Information - An example of Laws that govern confidentiality is Health Insurance Portability and Accountability Act (HIPAA) 
        1. Integrity

          Nota:

          • - A system "back door" will violate system integrity.
          1. Data Integrity

            Nota:

            • - it seeks to protect information from unauthorized modification
            1. System Integrity

              Nota:

              • - It seeks to protect a system
            2. Availibility

              Nota:

              • - A Denial of Service (DoS) Attack which seeks to deny the availibility of a system.
            3. DAD opposing Triad
              1. Disclosure

                Nota:

                • - unauthorized release of information
                1. Alteration
                  1. Distruction
                  2. Tension Between the Concepts
                    1. Finding balance within CIA
                    2. AAA
                      1. Identity and Authentication
                        1. identity: username

                          Nota:

                          • - identity along is weak because it has no proof - You could claim to be someone that you are not. - Identities must be unique
                          1. Authentication: password

                            Nota:

                            • - authentication is the method of proving you are who you identified yourself to be. - this can be done by giving a thing that only you posses such as a password.
                          2. Authorization

                            Nota:

                            • - describes the actions you can perform on a system once . - action may include read, write and execution permissions.
                            1. Least Privilege

                              Nota:

                              • -the user should only be granted the minimum amount of access to do there job.
                              1. Need to know

                                Nota:

                                • - it is more granular than least privilege - the user must need to know that specific piece of information before accessing it.
                              2. Accountability

                                Nota:

                                • - holding a person responsible for thier actions. - this requires that auditing and logging of data.
                                1. Non-Repuditation

                                  Nota:

                                  • - this means that a user cant deny having performed a transaction. You must have both authentication and integrity to have non repudiation.
                              3. Subjects

                                Nota:

                                • - A subject is a active entity on a data system. such as people trying to access data files. -Active programs and scripts can be considered subjects.
                                1. Object

                                  Nota:

                                  • - is any passive data with a system. such as documents, database tables and text files.
                                  1. Defense-in-Depth

                                    Nota:

                                    • - also called layered defense - a single security control can fail , but multiple controls improve the CIA of your data
                                    1. Due Care and Due Diligence
                                      1. Due Care

                                        Nota:

                                        • - is doing what a reasonable person would do. - It is also called the prudent man rule. - Expecting your staff to patch there systems is expecting them to exercise due care
                                        1. Gross Negligence

                                          Nota:

                                          • - This is the opposite of due care -
                                        2. Due Dilignece

                                          Nota:

                                          • - is the management of due care.
                                      Mostrar resumen completo Ocultar resumen completo

                                      Similar

                                      Creating Mind Maps with GoConqr
                                      Andrea Leyden
                                      Creating Mind Maps with GoConqr
                                      Sarah Egan
                                      Mind Maps with GoConqr
                                      Manikandan Achan
                                      Mind Maps with GoConqr
                                      croconnor
                                      Mind Maps with GoConqr
                                      Elysa Din
                                      GoConqr Getting Started Guide
                                      Norman McBrien
                                      Final Exam 2015+
                                      Alexandre Pinheiro
                                      CISSP Domains
                                      pikeje
                                      Creating Mind Maps with GoConqr
                                      laurie trost
                                      THE WAYS IN WHICH ICT IS USED
                                      antebellsayssup
                                      Mind Maps with GoConqr_1
                                      hurtado13071