CISSP Domain 1: Security and Risk Management - Cornerstone information Security Concepts

Beschreibung

Certificate CISSP Mindmap am CISSP Domain 1: Security and Risk Management - Cornerstone information Security Concepts, erstellt von reginaldsands am 26/02/2016.
reginaldsands
Mindmap von reginaldsands, aktualisiert more than 1 year ago
reginaldsands
Erstellt von reginaldsands vor mehr als 8 Jahre
123
4

Zusammenfassung der Ressource

CISSP Domain 1: Security and Risk Management - Cornerstone information Security Concepts
  1. Cornerstone of information Security Concepts
    1. CIA Triad
      1. Confidentiality

        Anmerkungen:

        • - Its opposing force is Disclosure. - An example of a confidentiality attack would be the theft of Personally Identifiable Information - An example of Laws that govern confidentiality is Health Insurance Portability and Accountability Act (HIPAA) 
        1. Integrity

          Anmerkungen:

          • - A system "back door" will violate system integrity.
          1. Data Integrity

            Anmerkungen:

            • - it seeks to protect information from unauthorized modification
            1. System Integrity

              Anmerkungen:

              • - It seeks to protect a system
            2. Availibility

              Anmerkungen:

              • - A Denial of Service (DoS) Attack which seeks to deny the availibility of a system.
            3. DAD opposing Triad
              1. Disclosure

                Anmerkungen:

                • - unauthorized release of information
                1. Alteration
                  1. Distruction
                  2. Tension Between the Concepts
                    1. Finding balance within CIA
                    2. AAA
                      1. Identity and Authentication
                        1. identity: username

                          Anmerkungen:

                          • - identity along is weak because it has no proof - You could claim to be someone that you are not. - Identities must be unique
                          1. Authentication: password

                            Anmerkungen:

                            • - authentication is the method of proving you are who you identified yourself to be. - this can be done by giving a thing that only you posses such as a password.
                          2. Authorization

                            Anmerkungen:

                            • - describes the actions you can perform on a system once . - action may include read, write and execution permissions.
                            1. Least Privilege

                              Anmerkungen:

                              • -the user should only be granted the minimum amount of access to do there job.
                              1. Need to know

                                Anmerkungen:

                                • - it is more granular than least privilege - the user must need to know that specific piece of information before accessing it.
                              2. Accountability

                                Anmerkungen:

                                • - holding a person responsible for thier actions. - this requires that auditing and logging of data.
                                1. Non-Repuditation

                                  Anmerkungen:

                                  • - this means that a user cant deny having performed a transaction. You must have both authentication and integrity to have non repudiation.
                              3. Subjects

                                Anmerkungen:

                                • - A subject is a active entity on a data system. such as people trying to access data files. -Active programs and scripts can be considered subjects.
                                1. Object

                                  Anmerkungen:

                                  • - is any passive data with a system. such as documents, database tables and text files.
                                  1. Defense-in-Depth

                                    Anmerkungen:

                                    • - also called layered defense - a single security control can fail , but multiple controls improve the CIA of your data
                                    1. Due Care and Due Diligence
                                      1. Due Care

                                        Anmerkungen:

                                        • - is doing what a reasonable person would do. - It is also called the prudent man rule. - Expecting your staff to patch there systems is expecting them to exercise due care
                                        1. Gross Negligence

                                          Anmerkungen:

                                          • - This is the opposite of due care -
                                        2. Due Dilignece

                                          Anmerkungen:

                                          • - is the management of due care.
                                      Zusammenfassung anzeigen Zusammenfassung ausblenden

                                      ähnlicher Inhalt

                                      Mind Maps with GoConqr
                                      Manikandan Achan
                                      Mind Maps with GoConqr
                                      croconnor
                                      Mind Maps with GoConqr
                                      Elysa Din
                                      Creating Mind Maps with GoConqr
                                      Andrea Leyden
                                      Creating Mind Maps with GoConqr
                                      Sarah Egan
                                      GoConqr Getting Started Guide
                                      Norman McBrien
                                      Final Exam 2015+
                                      Alexandre Pinheiro
                                      CISSP Domains
                                      pikeje
                                      Creating Mind Maps with GoConqr
                                      laurie trost
                                      THE WAYS IN WHICH ICT IS USED
                                      antebellsayssup
                                      Mind Maps with GoConqr_1
                                      hurtado13071