CISSP - Domain 1 Part 1
CISSP - Domain 1 Part 1
CISSP - Domain 1 Part 1
(CISSP)
Professional Ethics
CIA Concepts
Security Governance Principle
Security Policies, Standards, Procedures and Guidelines
Risk Identification, Assessment, Response, Monitoring
and Reporting
BCP & BIA
THREATS We Use
Encryption for DATA AT REST (For instance
Attacks on Encryption
AES 256), Full disk Encryption
Social Engineering
Secure Transport protocol for DATA IN
Key Loggers (Software/ Hardware)
MOTION (SSL, TLS, IPSEC)
IOT – They can be backdoor to other
Best practices for DATA IN USE- Clean desk,
system due to growing number
No Shoulder Surfing, Screen view Angle
protector, LOCK the PC
Strong Passwords, MFA, Masking, Access
control, Need to Know, Least Privilege
THREATS We Use
Cryptography
Alteration of our data
Check sums
Code Injections
Message Digest (MD5, SHA 1 or SHA2)
Attacks on your encryption
Digital Signatures – Non-Repudiation
THREATS We Use
IDS/ IPS
Malicious Attacks (DDOS, Physical
Patch management
system compromise, Staffs)
Redundancy of Hardware Power supplies/
Application Failures (Errors in the code)
UPS/ Generators, Disks (RAID), Traffic Paths
Component Failure (Hardware)
(Network Designs), HVAC, Staff, High
Availability
SLAs – How much uptime wanted (99.9%)
Identification is claiming to be an identity when attempting to access a secured area or system.
Authorization is defining the permissions (i.e., allow/grant and/or deny) of a resource and object access for a specific
identity or subject.
Auditing is recording a log of the events and activities related to the system and subjects.
Accounting is reviewing log files to check for compliance and violations in order to hold subjects accountable for their
actions, especially violations of organizational security policy
Least Privilege - The principle of least privilege ensures users are granted with the minimum amount
of access necessary for them to complete their required work tasks or job responsibilities.
Need to Know - This principle ensures that subjects are granted access only to what they need to
know for their work tasks and job functions. Subjects may have clearance to access classified or
restricted data but are not granted authorization to the data unless they actually need it to perform
a job.
Non-Repudiation - Nonrepudiation ensures that the subject of an activity or who caused an event
cannot deny that the event occurred.
Subjects & Objects - The subject is the active entity that makes a request to access a resource. A
subject is commonly a user, but it can also be a process, program, computer, or organization. The
object is the passive entity that the subject wants to access. An object is commonly a resource, such
as a file or printer, but it can also be a user, process, program, computer, or organization.
CEO – Chief Executive Officer
• To access a server, you will have to go thru multiple locked doors, Security guards, Man
traps etc
• To access a data you will have to go thru multiple routers, Firewalls, switches, servers and
application security
POLICIES
STANDARDS
PROCEEDURE