You will learn about security frameworks and controls, which are used to mitigate organizational risk. You’ll cover principles of the CIA triad and various National Institute of Standards and Technology (NIST) frameworks. In addition, you’ll explore security ethics.
Learning Objectives
- Define security frameworks and controls
- Define the CIA triad and NIST CSF
- Discuss how the CIA triad and NIST CSF are used to develop procedures and processes to address security threats, risks, and vulnerabilities
- Explain security ethics
Frameworks and controls
Video: Welcome to week 3
- You are halfway done with the first course.
- This section will discuss how organizations protect themselves from threats, risks, and vulnerabilities.
- Security frameworks and controls are important for protecting organizations.
- The CIA Triad is a security framework that covers confidentiality, integrity, and availability.
- Security ethics is important to consider when protecting organizations.
- Evolving security practices may seem abstract, but they are used every day.
- Having processes and procedures in place to organize security efforts is important.
The text uses the analogy of planting a garden to help explain security concepts. Just as a gardener needs to take steps to protect their garden from pests and the weather, organizations need to take steps to protect themselves from threats, risks, and vulnerabilities.
The text also discusses the importance of security frameworks and controls. Security frameworks provide a blueprint for how to protect an organization. Security controls are specific measures that can be taken to implement a security framework.
The CIA Triad is a well-known security framework that covers confidentiality, integrity, and availability. Confidentiality is the protection of sensitive information from unauthorized access. Integrity is the protection of information from unauthorized modification. Availability is the assurance that information is available when needed.
Security ethics is also an important consideration when protecting organizations. Security professionals need to be aware of the ethical implications of their work. For example, they need to be careful not to violate the privacy of individuals or to use their knowledge for malicious purposes.
The text concludes by emphasizing the importance of having processes and procedures in place to organize security efforts. This helps to ensure that security is managed in a consistent and systematic way.
Hi there, glad to have you back! You’re halfway done with the first course,
so you’re making great progress. In this section, we’ll discuss how organizations protect
themselves from threats, risks, and vulnerabilities by covering key principles
such as: frameworks, controls, and ethics. To help you better understand how this
relates to the role of a security analyst, we’ll use an analogy. Imagine you want to plant a garden.
You research, plan, prepare, and purchase materials while
considering all the things that could potentially present a risk to your garden. You establish a plan to pull weeds,
spray for bugs, and water your plants regularly
to prevent issues or incidents. But as the days go by,
unexpected problems arise. The weather has been unpredictable and pests have been aggressively
trying to infiltrate your garden. You start implementing better ways to
safeguard your garden by installing a surveillance camera,
building a fence, and covering your plants with a canopy to
keep your garden healthy and growing. Now that you have a better idea
about the threats to your garden and how to keep your plants safe, you establish better policies and
procedures to continuously monitor and safeguard your garden. In this way, security resembles a garden. It’s an evolving industry that will
challenge you to make continuous improvements to policies and procedures
that help protect your organization and the people it serves. To that end, we’ll
introduce security frameworks and controls and
explain why they’re important. We’ll also cover core components and
specific examples of frameworks and controls, including the Confidentiality,
Integrity, and Availability Triad, or CIA Triad. We’ll end with the discussion
about the ethics of security and share a few notable ethical
concerns in the security field. Evolving security practices may
seem a little abstract, but many of us use them every day. For example, I use security keys,
which are a type of security control, as a second form of authentication
to access my accounts. The keys ensure that only
I can access my accounts, even if a password has been compromised. By improving confidentiality, they also assure me that the integrity
of my accounts is intact. Having processes and procedures in
place to organize security efforts and make informed decisions is important for
any organization. I’m so excited to get started,
and I hope you are too!
Video: Introduction to security frameworks and controls
- Security frameworks are guidelines used to build plans to help mitigate risks and threats to data and privacy.
- Security frameworks provide a structured approach to implementing a security lifecycle.
- The security lifecycle is a constantly evolving set of policies and standards that define how an organization manages risks, follows established guidelines, and meets regulatory compliance, or laws.
- There are several security frameworks that may be used to manage different types of organizational and regulatory compliance risks.
- The purpose of security frameworks include protecting personally identifiable information (PII), securing financial information, identifying security weaknesses, managing organizational risks, and aligning security with business goals.
- Frameworks have four core components:
- Identifying and documenting security goals
- Setting guidelines to achieve security goals
- Implementing strong security processes
- Monitoring and communicating results
- Security controls are safeguards designed to reduce specific security risks.
- Security frameworks and controls are vital to managing security for all types of organizations and ensuring that everyone is doing their part to maintain a low level of risk.
- Understanding their purpose and how they are used allows analysts to support an organization’s security goals and protect the people it serves.
Here are some additional points that are mentioned in the text:
- The General Data Protection Regulation (GDPR) is a data protection law established to grant European citizens more control over their personal data.
- Security frameworks can be used to help organizations comply with GDPR.
- Security analysts may be responsible for identifying and documenting areas where an organization is out of compliance with GDPR.
- Security analysts may also be responsible for developing new policies and procedures to ensure that the organization complies with GDPR.
- Security controls can be used to reduce the risk of data breaches.
- For example, an organization may require all employees to complete privacy training to reduce the risk of data breaches.
- Security frameworks and controls are essential for managing security for all types of organizations.
What are security frameworks and controls?
Security frameworks and controls are essential for managing security for all types of organizations. Security frameworks provide a structured approach to implementing a security lifecycle, while security controls are safeguards designed to reduce specific security risks.
What is the security lifecycle?
The security lifecycle is a constantly evolving set of policies and standards that define how an organization manages risks, follows established guidelines, and meets regulatory compliance, or laws. The security lifecycle typically includes the following phases:
- Risk assessment: This phase involves identifying and assessing the organization’s security risks.
- Risk mitigation: This phase involves implementing controls to reduce the organization’s security risks.
- Monitoring and remediation: This phase involves monitoring the organization’s security posture and implementing changes as needed.
- Audit and compliance: This phase involves ensuring that the organization is meeting its security compliance requirements.
What are the core components of security frameworks?
Security frameworks have four core components:
- Identifying and documenting security goals: This involves identifying the organization’s security goals and documenting them in a way that is clear and concise.
- Setting guidelines to achieve security goals: This involves developing policies and procedures that will help the organization achieve its security goals.
- Implementing strong security processes: This involves implementing the policies and procedures that have been developed.
- Monitoring and communicating results: This involves monitoring the organization’s security posture and communicating the results to stakeholders.
What are some well-known security frameworks?
There are many well-known security frameworks, including:
- The Information Security Management System (ISMS) is a framework that helps organizations manage their information security risks.
- The Payment Card Industry Data Security Standard (PCI DSS) is a framework that helps organizations protect cardholder data.
- The Health Insurance Portability and Accountability Act (HIPAA) is a framework that helps organizations protect patient health information.
- The General Data Protection Regulation (GDPR) is a framework that helps organizations protect the personal data of European citizens.
What are some security controls?
There are many different types of security controls, including:
- Access controls: These controls restrict who can access what data and systems.
- Authentication controls: These controls verify the identity of users before they are allowed access to systems and data.
- Authorization controls: These controls determine what users are allowed to do once they have been authenticated.
- Auditing controls: These controls track user activity and can be used to identify security breaches.
- Data encryption: This process scrambles data so that it cannot be read without the correct decryption key.
- Disaster recovery: This process ensures that the organization can recover from a disaster, such as a data breach or cyberattack.
How are security frameworks and controls used together?
Security frameworks and controls are used together to create a comprehensive security program. The framework provides the structure and the controls provide the specific measures that are needed to mitigate risks.
The specific security frameworks and controls that are used will vary depending on the organization’s specific needs and requirements. However, all organizations should have a security program that includes a framework and controls that are appropriate for their size, industry, and risk profile.
Imagine you’re working as a
security analyst and receive multiple alerts about suspicious
activity on the network. You realize that you’ll need to implement additional security
measures to keep these alerts from becoming serious incidents. But
where do you start? As an analyst, you’ll
start by identifying your organization’s
critical assets and risks. Then you’ll implement the necessary frameworks
and controls. In this video, we’ll discuss
how security professionals use frameworks to continuously
identify and manage risk. We’ll also cover how to use security controls to manage
or reduce specific risks. Security frameworks
are guidelines used for building plans to help mitigate risks and
threats to data and privacy. Security frameworks provide
a structured approach to implementing a
security lifecycle. The security lifecycle is a constantly evolving
set of policies and standards that define how an organization
manages risks, follows established guidelines, and meets regulatory
compliance, or laws. There are several
security frameworks that may be used to manage different types
of organizational and regulatory compliance risks. The purpose of security
frameworks include protecting personally identifiable
information, known as PII, securing financial information, identifying security weaknesses, managing organizational risks, and aligning security
with business goals. Frameworks have four
core components and understanding them
will allow you to better manage potential risks. The first core component is identifying and documenting
security goals. For example, an organization
may have a goal to align with the E.U.’s General
Data Protection Regulation, also known as GDPR. GDPR is a data protection
law established to grant European
citizens more control over their personal data. A security analyst may be
asked to identify and document areas where an organization is out of compliance with GDPR. The second core
component is setting guidelines to achieve
security goals. For example, when implementing guidelines to achieve
GDPR compliance, your organization
may need to develop new policies for how to handle data requests from
individual users. The third core component
of security frameworks is implementing strong
security processes. In the case of GDPR, a security analyst working for a social media company
may help design procedures to ensure
the organization complies with verified
user data requests. An example of this type
of request is when a user attempts to update or delete
their profile information. The last core component of security frameworks is monitoring and
communicating results. As an example, you may monitor your organization’s
internal network and report a potential security
issue affecting GDPR to your manager or
regulatory compliance officer. Now that we’ve introduced the four core components
of security frameworks, let’s tie them all together. Frameworks allow analysts
to work alongside other members of the
security team to document, implement, and use the policies and procedures that
have been created. It’s essential for an entry-level
analyst to understand this process because
it directly affects the work they do and how they
collaborate with others. Next, we’ll discuss
security controls. Security controls are safeguards designed to reduce
specific security risks. For example, your company may have a guideline
that requires all employees to complete a privacy training to reduce
the risk of data breaches. As a security analyst, you may use a software
tool to automatically assign and track which employees have completed
this training. Security frameworks
and controls are vital to managing
security for all types of organizations and
ensuring that everyone is doing their part to maintain
a low level of risk. Understanding their
purpose and how they are used allows analysts to support an organization’s
security goals and protect the
people it serves. In the following videos, we’ll discuss some
well-known frameworks and principles that
analysts need to be aware of to minimize risk
and protect data and users.
Video: Secure design
- The CIA triad is a foundational model that helps inform how organizations consider risk when setting up systems and security policies. It stands for confidentiality, integrity, and availability.
- Confidentiality means that only authorized users can access specific assets or data.
- Integrity means the data is correct, authentic, and reliable.
- Availability means data is accessible to those who are authorized to access it.
- An asset is an item perceived as having value to an organization.
- The NIST Cybersecurity Framework is a voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk.
- Threat actors are individuals or groups who attempt to exploit vulnerabilities in systems and networks to gain unauthorized access.
- Disgruntled employees are some of the most dangerous threat actors because they often have access to sensitive information and know where to find it.
- A diverse workforce of security professionals helps organizations identify attackers’ intentions and mitigate the impact of malicious activity.
Here are some additional points that are mentioned in the text:
- The CIA triad is a widely accepted framework for thinking about security.
- The NIST Cybersecurity Framework is a valuable resource for organizations of all sizes.
- Threat actors are constantly evolving their methods, so it is important for organizations to stay up-to-date on the latest threats.
- A diverse workforce of security professionals can bring different perspectives and experiences to the table, which can help organizations to better protect themselves from threats.
- What is secure design?
Secure design is the practice of building systems and applications with security in mind from the start. This means considering security risks and vulnerabilities at every stage of the development process, from requirements gathering to deployment.
- Why is secure design important?
Secure design is important because it can help to prevent security vulnerabilities from being introduced into systems and applications. This can help to protect organizations from cyberattacks, data breaches, and other security incidents.
- What are the principles of secure design?
There are many principles of secure design, but some of the most important include:
* **Defense in depth:** This principle states that security should be layered, with multiple layers of protection in place. This makes it more difficult for attackers to exploit vulnerabilities.
* **Least privilege:** This principle states that users should only be given the permissions they need to do their jobs. This helps to reduce the risk of unauthorized access to sensitive data.
* **Fail-safe defaults:** This principle states that systems and applications should be configured with the most secure settings by default. This helps to prevent attackers from exploiting default configurations.
* **Code review:** This process involves having an independent reviewer examine code for security vulnerabilities. This can help to identify and fix vulnerabilities before they are exploited.
* **Vulnerability scanning:** This process involves using automated tools to scan systems and applications for known vulnerabilities. This can help to identify vulnerabilities that need to be fixed.
- How to implement secure design?
There are many ways to implement secure design. Some of the most common methods include:
* **Using security frameworks and standards:** There are many security frameworks and standards available that can help organizations to implement secure design. Some of the most popular frameworks include the NIST Cybersecurity Framework and the ISO/IEC 27001 standard.
* **Conducting security assessments:** Security assessments can help organizations to identify and fix security vulnerabilities. There are many different types of security assessments available, such as penetration testing and vulnerability scanning.
* **Training employees:** Employees should be trained on security best practices. This training should cover topics such as password security, social engineering, and phishing.
* **Monitoring systems and applications:** Systems and applications should be monitored for security threats. This monitoring can be done using automated tools or manual processes.
- Conclusion
Secure design is an important part of any organization’s cybersecurity strategy. By following the principles of secure design, organizations can help to prevent security vulnerabilities from being introduced into systems and applications. This can help to protect organizations from cyberattacks, data breaches, and other security incidents.
What is the CIA triad?
A foundational cybersecurity model
The CIA (confidentiality, integrity, and availability) triad is a foundational cybersecurity model that helps inform how organizations consider risk when setting up systems and security policies.
Hi, welcome back! Previously, we
discussed frameworks and controls in general. In this video,
you’ll learn about specific frameworks and
controls that organizations can voluntarily use to minimize risks to their data
and to protect users. Let’s get started! The CIA triad is a foundational model that helps inform how
organizations consider risk when setting up systems
and security policies. CIA stands for confidentiality, integrity, and availability. Confidentiality means that
only authorized users can access specific
assets or data. For example, strict
access controls that define who should and should
not have access to data, must be put in place to ensure confidential data remains safe. Integrity means the data is correct, authentic,
and reliable. To maintain integrity, security professionals
can use a form of data protection like encryption to safeguard data from
being tampered with. Availability means data is accessible to those who are
authorized to access it. Let’s define a term
that came up during our discussion of the CIA triad: asset. An asset is an item perceived as having
value to an organization. And value is determined by the cost associated with the
asset in question. For example, an application
that stores sensitive data, such as social security
numbers or bank accounts, is a valuable asset
to an organization. It carries more risk
and therefore requires tighter security
controls in comparison to a website that shares
publicly available news content. As you may remember, earlier in the course, we discussed frameworks
and controls in general. Now, we’ll discuss a specific
framework developed by the U.S.-based National Institute of Standards
and Technology: the Cybersecurity
Framework, also referred to as the NIST CSF. The NIST Cybersecurity
Framework is a voluntary framework that
consists of standards, guidelines, and best practices to manage cybersecurity risk. It’s important to become
familiar with this framework because security teams use it as a baseline to manage
short and long-term risk. Managing and mitigating
risks and protecting an organization’s assets from threat actors are key goals
for security professionals. Understanding the
different motives a threat actor may have, alongside identifying
your organization’s most valuable assets
is important. Some of the most
dangerous threat actors to consider are
disgruntled employees. They are the most dangerous
because they often have access to sensitive information and know where to find it. In order to reduce
this type of risk, security professionals would use the principle of availability, as well as organizational
guidelines based on frameworks to ensure staff members can only access the data they need to
perform their jobs. Threat actors originate
from all across the globe, and a diverse workforce
of security professionals helps organizations identify
attackers’ intentions. A variety of perspectives
can assist organizations in understanding and mitigating the impact of
malicious activity. That concludes our
introduction to the CIA triad and
NIST CSF framework, which are used to
develop processes to secure organizations and
the people they serve. You may be asked in
an interview if you know about security
frameworks and principles. Or you may be asked to
explain how they’re used to secure
organizational assets. In either case,
throughout this program, you’ll have multiple
opportunities to learn more about them and apply what we’ve discussed
to real-world situations. Coming up, we’ll discuss the ethics of security.
See you soon!
Reading: Controls, frameworks, and compliance
Reading
Previously, you were introduced to security frameworks and how they provide a structured approach to implementing a security lifecycle. As a reminder, a security lifecycle is a constantly evolving set of policies and standards. In this reading, you will learn more about how security frameworks, controls, and compliance regulations—or laws—are used together to manage security and make sure everyone does their part to minimize risk.
How controls, frameworks, and compliance are related
The confidentiality, integrity, and availability (CIA) triad is a model that helps inform how organizations consider risk when setting up systems and security policies.
CIA are the three foundational principles used by cybersecurity professionals to establish appropriate controls that mitigate threats, risks, and vulnerabilities.
As you may recall, security controls are safeguards designed to reduce specific security risks. So they are used alongside frameworks to ensure that security goals and processes are implemented correctly and that organizations meet regulatory compliance requirements.
Security frameworks are guidelines used for building plans to help mitigate risks and threats to data and privacy. They have four core components:
- Identifying and documenting security goals
- Setting guidelines to achieve security goals
- Implementing strong security processes
- Monitoring and communicating results
Compliance is the process of adhering to internal standards and external regulations.
Specific controls, frameworks, and compliance
The National Institute of Standards and Technology (NIST) is a U.S.-based agency that develops multiple voluntary compliance frameworks that organizations worldwide can use to help manage risk. The more aligned an organization is with compliance, the lower the risk.
Examples of frameworks include the NIST Cybersecurity Framework (CSF) and the NIST Risk Management Framework (RMF).
Note: Specifications and guidelines can change depending on the type of organization you work for.
In addition to the NIST CSF and NIST RMF, there are several other controls, frameworks, and compliance standards that it is important for security professionals to be familiar with to help keep organizations and the people they serve safe.
The Federal Energy Regulatory Commission – North American Electric Reliability Corporation (FERC-NERC)
FERC-NERC is a regulation that applies to organizations that work with electricity or that are involved with the U.S. and North American power grid. These types of organizations have an obligation to prepare for, mitigate, and report any potential security incident that can negatively affect the power grid. They are also legally required to adhere to the Critical Infrastructure Protection (CIP) Reliability Standards defined by the FERC.
The Federal Risk and Authorization Management Program (FedRAMP®)
FedRAMP is a U.S. federal government program that standardizes security assessment, authorization, monitoring, and handling of cloud services and product offerings. Its purpose is to provide consistency across the government sector and third-party cloud providers.
Center for Internet Security (CIS®)
CIS is a nonprofit with multiple areas of emphasis. It provides a set of controls that can be used to safeguard systems and networks against attacks. Its purpose is to help organizations establish a better plan of defense. CIS also provides actionable controls that security professionals may follow if a security incident occurs.
General Data Protection Regulation (GDPR)
GDPR is a European Union (E.U.) general data regulation that protects the processing of E.U. residents’ data and their right to privacy in and out of E.U. territory. For example, if an organization is not being transparent about the data they are holding about an E.U. citizen and why they are holding that data, this is an infringement that can result in a fine to the organization. Additionally, if a breach occurs and an E.U. citizen’s data is compromised, they must be informed. The affected organization has 72 hours to notify the E.U. citizen about the breach.
Payment Card Industry Data Security Standard (PCI DSS)
PCI DSS is an international security standard meant to ensure that organizations storing, accepting, processing, and transmitting credit card information do so in a secure environment. The objective of this compliance standard is to reduce credit card fraud.
The Health Insurance Portability and Accountability Act (HIPAA)
HIPAA is a U.S. federal law established in 1996 to protect patients’ health information. This law prohibits patient information from being shared without their consent. It is governed by three rules:
- Privacy
- Security
- Breach notification
Organizations that store patient data have a legal obligation to inform patients of a breach because if patients’ Protected Health Information (PHI) is exposed, it can lead to identity theft and insurance fraud. PHI relates to the past, present, or future physical or mental health or condition of an individual, whether it’s a plan of care or payments for care. Along with understanding HIPAA as a law, security professionals also need to be familiar with the Health Information Trust Alliance (HITRUST®), which is a security framework and assurance program that helps institutions meet HIPAA compliance.
International Organization for Standardization (ISO)
ISO was created to establish international standards related to technology, manufacturing, and management across borders. It helps organizations improve their processes and procedures for staff retention, planning, waste, and services.
System and Organizations Controls (SOC type 1, SOC type 2)
The American Institute of Certified Public Accountants® (AICPA) auditing standards board developed this standard. The SOC1 and SOC2 are a series of reports that focus on an organization’s user access policies at different organizational levels such as:
- Associate
- Supervisor
- Manager
- Executive
- Vendor
- Others
They are used to assess an organization’s financial compliance and levels of risk. They also cover confidentiality, privacy, integrity, availability, security, and overall data safety. Control failures in these areas can lead to fraud.
Pro tip: There are a number of regulations that are frequently revised. You are encouraged to keep up-to-date with changes and explore more frameworks, controls, and compliance. Two suggestions to research: the Gramm-Leach-Bliley Act and the Sarbanes-Oxley Act.
United States Presidential Executive Order 14028
On May 12, 2021, President Joe Biden released an executive order related to improving the nation’s cybersecurity to remediate the increase in threat actor activity. Remediation efforts are directed toward federal agencies and third parties with ties to U.S. critical infrastructure. For additional information, review the Executive Order on Improving the Nation’s Cybersecurity.
Key takeaways
In this reading you learned more about controls, frameworks, and compliance. You also learned how they work together to help organizations maintain a low level of risk.
As a security analyst, it’s important to stay up-to-date on common frameworks, controls, and compliance regulations and be aware of changes to the cybersecurity landscape to help ensure the safety of both organizations and people.
Video: Heather: Protect sensitive data and information
- Personally identifiable information (PII) is information that can be used to identify an individual, such as their name, address, social security number, or date of birth.
- PII should be handled with care and should only be collected and used when necessary.
- Organizations that collect PII have a responsibility to protect it from unauthorized access, use, or disclosure.
- There are a number of laws and regulations that govern how PII can be handled, and organizations that fail to comply with these laws and regulations can face significant consequences.
- To stay up-to-date on the latest laws and regulations, organizations should consult the relevant website in the jurisdiction where they are operating.
- If you have any questions about a specific law, it is important to seek advice from legal counsel.
Here are some additional points that are mentioned in the text:
- PII can be used for a variety of purposes, such as marketing, fraud prevention, and customer service.
- There are a number of ways to protect PII, such as encryption, access controls, and data anonymization.
- Organizations should have a security policy in place that outlines how PII will be collected, used, and protected.
- Employees should be trained on how to handle PII securely.
- Organizations should regularly audit their PII security practices to ensure that they are compliant with the law.
Hello, my name is Heather and I’m the Vice President of
Security Engineering at Google. PII has been an important
topic on the internet since the beginning of the internet. And we have been talking about
increasingly sophisticated ways to protect that data over time. When we think about collecting
PII on behalf of another person, we should make sure we’re very
deliberate about how it’s handled and where it’s stored, and that we understand
where it’s stored all the time. Depending on what kind of role you’re in, you might also need to protect that
data to comply with regulation or law. And so, it’s important to understand
how the data relates to some of those obligations. If an organization fails
to meet their obligations, a number of things might happen. First, you might see a government
regulator become more interested in understanding the practices around
how a company is handling data. Secondly, consumers, customers,
businesses may actually begin to directly inquire of the company
how they’re handling data. And this may become part of
the customer relationship and increasingly important if
that data is very sensitive. And third,
the last consequence is legal action. And it’s not uncommon for
us to see victims of cybersecurity incidents now suing companies for
mishandling their data. You can keep up to date with compliance,
regulation and laws around PII by consulting the relevant website in the
jurisdiction that you have a question for. Many government websites now
post the laws, regulations, and compliance requirements for
data that’s being handled. The regulations and laws that govern how
PII can be handled are very complex, all over the world, countries, states, counties are regulating
it at different levels. It’s important to understand and
to be aware that these laws exist. However, if you need to ask
a question about a specific law, it’s important to seek advice from legal
counsel for that particular jurisdiction. It may be very different than
the jurisdiction that you’re in.
Practice Quiz: Test your knowledge: Frameworks and controls
Fill in the blank: A security _ is a set of guidelines used for building plans to help mitigate risk and threats to data and privacy.
framework
Security frameworks are guidelines used for building plans to help mitigate risk and threats to data and privacy.
An organization requires its employees to complete a new data privacy training program each year to reduce the risk of a data breach. What is this training requirement an example of?
Security control
What is a foundational model that informs how organizations consider risk when setting up systems and security policies?
Confidentiality, integrity, and availability (CIA) triad
The CIA triad is a foundational model that helps inform how organizations consider risk when setting up systems and security policies.
Security teams use the NIST Cybersecurity Framework (CSF) as a baseline to manage short and long-term risk.
True
Security teams use the NIST CSF as a baseline to manage short and long-term risk. The CSF is a voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk.
Ethics in cybersecurity
Video: Ethics in cybersecurity
- Security professionals must act ethically at all times, even when it is difficult.
- They should never abuse the access they have been granted or entrusted with.
- There are three important ethical principles that security professionals should follow: confidentiality, privacy protections, and laws.
- Confidentiality means keeping proprietary or private information safe.
- Privacy protections mean safeguarding personal information from unauthorized use.
- Laws are rules that are recognized by a community and enforced by a governing entity.
- Security professionals must always follow the policies and procedures set by their organization.
- They must also be aware of the laws that apply to their work.
- As technology evolves, so do the risks to security.
- Security professionals must continue to think critically about how to respond to attacks.
- Having a strong sense of ethics can guide their decisions and help them to mitigate risk.
Here are some key points from the passage:
- Security professionals have a responsibility to protect the confidentiality, privacy, and security of the information they are entrusted with.
- They should never abuse their access to information or systems.
- They should always follow the policies and procedures set by their organization, and the laws that apply to their work.
- Security professionals must be constantly learning and adapting to new threats and technologies.
- They must also be able to think critically and make ethical decisions in difficult situations.
- Cybersecurity ethics is a branch of applied ethics that examines moral, legal, and social issues at the intersection of computer/information and communication technologies.
- Cybersecurity professionals have a responsibility to protect the confidentiality, integrity, and availability of information.
- This means that they should not misuse their access to information, they should not intentionally introduce vulnerabilities into systems, and they should take steps to prevent unauthorized access to systems.
- Cybersecurity professionals should also be aware of the laws that apply to their work, and they should not violate those laws.
- In some cases, there may be ethical dilemmas in cybersecurity. For example, a cybersecurity professional may be asked to break into a system to test its security. In this case, the professional would need to weigh the ethical implications of their actions before making a decision.
Here are some specific ethical principles that cybersecurity professionals should follow:
- Confidentiality: Cybersecurity professionals should keep information confidential that they have been entrusted with, such as passwords, personal data, and trade secrets.
- Integrity: Cybersecurity professionals should ensure that information is not modified or destroyed without authorization.
- Availability: Cybersecurity professionals should ensure that information is accessible to authorized users when they need it.
- Accountability: Cybersecurity professionals should be held accountable for their actions, both good and bad.
- Transparency: Cybersecurity professionals should be transparent about their work, and they should be willing to explain their decisions to others.
Cybersecurity ethics is an important field, and it is essential for cybersecurity professionals to be aware of the ethical implications of their work. By following the ethical principles outlined above, cybersecurity professionals can help to protect the confidentiality, integrity, and availability of information.
In security, new technologies
present new challenges. For every new security incident or
risk, the right or wrong decision isn’t always clear. For example, imagine that you’re working
as an entry-level security analyst and you have received a high risk alert. You investigate the alert and discover data has been
transferred without authorization. You work diligently to identify
who made the transfer and discover it is one of
your friends from work. What do you do? Ethically, as a security professional,
your job is to remain unbiased and maintain security and confidentiality. While it’s normal to
want to protect a friend, regardless of who the user in question may
be, your responsibility and obligation is to adhere to the policies and
protocols you’ve been trained to follow. In many cases, security teams are
entrusted with greater access to data and information than other employees. Security professionals must respect that
privilege and act ethically at all times. Security ethics are guidelines for making appropriate decisions
as a security professional. As another example, if you as an analyst
have the ability to grant yourself access to payroll data and can give yourself
a raise, just because you have access to do so, does that mean you should? The answer is no. You should never abuse the access
you’ve been granted and entrusted with. Let’s discuss ethical principles that
may raise questions as you navigate solutions for mitigating risks. These are confidentiality,
privacy protections, and laws. Let’s begin with the first ethical
principle, confidentiality. Earlier we discussed confidentiality
as part of the CIA triad. Now let’s discuss how confidentiality
can be applied to ethics. As a security professional,
you’ll encounter proprietary or private information, such as PII. It’s your ethical duty to keep that
information confidential and safe. For example, you may want to help
out a coworker by providing computer system access outside of
properly documented channels. However, this ethical violation can
result in serious consequences, including reprimands, the loss of
your professional reputation, and legal repercussions for
both you and your friend. The second ethical principle to
consider is privacy protections. Privacy protection means safeguarding
personal information from unauthorized use. For example,
imagine you receive a personal email after hours from your manager requesting
a colleague’s home phone number. Your manager explains that they can’t
access the employee database at the moment, but they need to discuss
an urgent matter with that person. As a security analyst, your role is to
follow the policies and procedures of your company, which in this example, state
that employee information is stored in a secure database and should never be
accessed or shared in any other format. So, accessing and sharing the employee’s
personal information would be unethical. In situations like this,
it can be difficult to know what to do. So, the best response is to
adhere to the policies and procedures set by your organization. A third important ethical principle
we must discuss is the law. Laws are rules that
are recognized by a community and enforced by a governing entity. For example, consider a staff
member at a hospital who has been trained to handle PII,
and SPII for compliance. The staff member has files with
confidential data that should never be left unsupervised, but
the staff member is late for a meeting. Instead of locking the files
in a designated area, the files are left on the staff
member’s desk, unsupervised. Upon the employee’s return,
the files are missing. The staff member has just violated
multiple compliance regulations, and their actions were unethical and illegal,
since their negligence has likely resulted in the loss of private patient and
hospital data. As you enter the security field, remember
that technology is constantly evolving, and so are attackers’ tactics and
techniques. Because of this, security professionals
must continue to think critically about how to respond to attacks. Having a strong sense of ethics can guide
your decisions to ensure that the proper processes and procedures are followed to mitigate
these continually evolving risks.
Reading: Ethical concepts that guide cybersecurity decisions
Reading
Previously, you were introduced to the concept of security ethics. Security ethics are guidelines for making appropriate decisions as a security professional. Being ethical requires that security professionals remain unbiased and maintain the security and confidentiality of private data. Having a strong sense of ethics can help you navigate your decisions as a cybersecurity professional so you’re able to mitigate threats posed by threat actors’ constantly evolving tactics and techniques. In this reading, you’ll learn about more ethical concepts that are essential to know so you can make appropriate decisions about how to legally and ethically respond to attacks in a way that protects organizations and people alike.
Ethical concerns and laws related to counterattacks
United States standpoint on counterattacks
In the U.S., deploying a counterattack on a threat actor is illegal because of laws like the Computer Fraud and Abuse Act of 1986 and the Cybersecurity Information Sharing Act of 2015, among others. You can only defend. The act of counterattacking in the U.S. is perceived as an act of vigilantism. A vigilante is a person who is not a member of law enforcement who decides to stop a crime on their own. And because threat actors are criminals, counterattacks can lead to further escalation of the attack, which can cause even more damage and harm. Lastly, if the threat actor in question is a state-sponsored hacktivist, a counterattack can lead to serious international implications. A hacktivist is a person who uses hacking to achieve a political goal. The political goal may be to promote social change or civil disobedience.
For these reasons, the only individuals in the U.S. who are allowed to counterattack are approved employees of the federal government or military personnel.
International standpoint on counterattacks
The International Court of Justice (ICJ), which updates its guidance regularly, states that a person or group can counterattack if:
- The counterattack will only affect the party that attacked first.
- The counterattack is a direct communication asking the initial attacker to stop.
- The counterattack does not escalate the situation.
- The counterattack effects can be reversed.
Organizations typically do not counterattack because the above scenarios and parameters are hard to measure. There is a lot of uncertainty dictating what is and is not lawful, and at times negative outcomes are very difficult to control. Counterattack actions generally lead to a worse outcome, especially when you are not an experienced professional in the field.
To learn more about specific scenarios and ethical concerns from an international perspective, review updates provided in the Tallinn Manual online.
Ethical principles and methodologies
Because counterattacks are generally disapproved of or illegal, the security realm has created frameworks and controls—such as the confidentiality, integrity, and availability (CIA) triad and others discussed earlier in the program—to address issues of confidentiality, privacy protections, and laws. To better understand the relationship between these issues and the ethical obligations of cybersecurity professionals, review the following key concepts as they relate to using ethics to protect organizations and the people they serve.
Confidentiality means that only authorized users can access specific assets or data. Confidentiality as it relates to professional ethics means that there needs to be a high level of respect for privacy to safeguard private assets and data.
Privacy protection means safeguarding personal information from unauthorized use. Personally identifiable information (PII) and sensitive personally identifiable information (SPII) are types of personal data that can cause people harm if they are stolen. PII data is any information used to infer an individual’s identity, like their name and phone number. SPII data is a specific type of PII that falls under stricter handling guidelines, including social security numbers and credit card numbers. To effectively safeguard PII and SPII data, security professionals hold an ethical obligation to secure private information, identify security vulnerabilities, manage organizational risks, and align security with business goals.
Laws are rules that are recognized by a community and enforced by a governing entity. As a security professional, you will have an ethical obligation to protect your organization, its internal infrastructure, and the people involved with the organization. To do this:
- You must remain unbiased and conduct your work honestly, responsibly, and with the highest respect for the law.
- Be transparent and just, and rely on evidence.
- Ensure that you are consistently invested in the work you are doing, so you can appropriately and ethically address issues that arise.
- Stay informed and strive to advance your skills, so you can contribute to the betterment of the cyber landscape.
As an example, consider the Health Insurance Portability and Accountability Act (HIPAA), which is a U.S. federal law established to protect patients’ health information, also known as PHI, or protected health information. This law prohibits patient information from being shared without their consent. So, as a security professional, you might help ensure that the organization you work for adheres to both its legal and ethical obligation to inform patients of a breach if their health care data is exposed.
Key takeaways
As a future security professional, ethics will play a large role in your daily work. Understanding ethics and laws will help you make the correct choices if and when you encounter a security threat or an incident that results in a breach.
Video: Holly: The importance of ethics as a cybersecurity professional
- Holly is a Cloud Security Architect with Google Cloud.
- She started her career in banking and telecommunications, and then transitioned to security.
- She got her cybersecurity certifications to gain credibility with potential employers.
- Ethics is important in cybersecurity, and unethical behavior can include sharing passwords, giving out private information, or looking into systems for personal reasons.
- Holly faced a difficult ethical dilemma shortly after 9/11 when her boss asked her to query a database of text messages without a court order. She refused to do it and suggested that he get something in writing.
- Holly encourages people to pursue a career in cybersecurity because it is rewarding to help protect people and organizations from cyber attacks.
Here are some key points from the passage:
- Cybersecurity is a complex field that requires a strong understanding of ethics.
- Ethical behavior is essential for building trust and credibility in the cybersecurity community.
- Cybersecurity professionals should always be aware of the potential ethical implications of their actions.
- It is important to speak up if you see something that you believe is unethical.
- A career in cybersecurity can be rewarding and fulfilling.
Hi, I’m Holly and I’m a Cloud Security Architect
with Google Cloud. At the beginning of
my adult career, I sold hosiery while I
was going to school. That led me into an opportunity
to work in banking, which then led me into an opportunity to work
in telecommunications. From there I managed
to get myself into a security vendor
and learn security. Part of the way
that I was able to change from my original half
of my tech career being a database administrator
to getting into cybersecurity was through
getting certificates like you’re doing today. Those really helped me
gain credibility with potential employers
when I didn’t have the experience in
this particular field yet. Ethics are really the
crux of cybersecurity, you need to be able to
be ethical in all of your actions in order to be a
cybersecurity professional. Examples of unethical
behavior are usually honestly just
slight laziness, people taking shortcuts
and not really thinking about the
consequences of their actions. So, certainly when people
share passwords to systems or give out
private information, or look into systems for their own personal information or purposes about people they
know or about celebrities. One of the most difficult
situations that I ever faced in my technology career related to ethics was shortly after 9/11, my boss’s boss’s boss came to me with a bunch of keywords
that were clearly related to the attack in New York and asked me to
query the database that I administered that had everybody’s
text messages in it for the entire
telecommunications company without anything in writing
and without a court order. I was in a very uncomfortable
position to tell someone that much senior than me that I wasn’t
comfortable doing that. I suggested that he bring
something in writing to me to do that and he found someone else
who did it for him. When you’re faced with one of
these difficult decisions, it’s good to think
about what would be the consequences
of your decision. My encouragement to those
of you out here taking this program is that
the rewards that you get from helping to protect
your company or your users or your organization from cyber
criminals is really great. We get to be the
good guys and help protect our industry and our customers from cyber attacks and cyber criminals.
That’s rewarding.
- Introduction
Cybersecurity is the practice of protecting systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. Cybersecurity professionals play a critical role in protecting the confidentiality, integrity, and availability of information.
Ethics is the study of what is right and wrong. In the context of cybersecurity, ethics refers to the moral principles that guide the behavior of cybersecurity professionals. Ethical behavior is essential for building trust and credibility in the cybersecurity community.
- Why is ethics important in cybersecurity?
There are many reasons why ethics is important in cybersecurity. Here are a few of the most important reasons:
* **To protect privacy and confidentiality.** Cybersecurity professionals have access to sensitive information, such as personal data and financial records. It is important for them to protect this information from unauthorized access and disclosure.
* **To prevent fraud and theft.** Cybersecurity professionals can help to prevent fraud and theft by identifying and patching security vulnerabilities. They can also help to educate users about cybersecurity best practices.
* **To maintain public trust.** When cybersecurity professionals act unethically, it can damage public trust in the entire cybersecurity community. This can make it more difficult to protect people and organizations from cyber attacks.
* **To set a good example.** Cybersecurity professionals are role models for others. When they act ethically, they set a good example for others to follow. This can help to create a more ethical and responsible cybersecurity community.
- What are some ethical considerations for cybersecurity professionals?
There are many ethical considerations for cybersecurity professionals. Here are a few of the most important considerations:
* **Confidentiality.** Cybersecurity professionals should keep confidential information confidential. This includes information that they have been entrusted with, as well as information that they have learned about in the course of their work.
* **Integrity.** Cybersecurity professionals should ensure that information is not modified or destroyed without authorization. They should also take steps to prevent unauthorized access to information.
* **Availability.** Cybersecurity professionals should ensure that information is accessible to authorized users when they need it. They should also take steps to prevent denial-of-service attacks.
* **Accountability.** Cybersecurity professionals should be held accountable for their actions, both good and bad. They should be willing to take responsibility for their mistakes and to learn from them.
* **Transparency.** Cybersecurity professionals should be transparent about their work. They should be willing to explain their decisions to others and to answer questions about their work.
- How can cybersecurity professionals stay ethical?
There are many things that cybersecurity professionals can do to stay ethical. Here are a few tips:
* **Get training on ethical hacking and security awareness.** This training will help you to understand the ethical implications of your work.
* **Adopt a code of ethics.** A code of ethics can help you to stay on track and to make ethical decisions.
* **Consult with a mentor or ethics advisor.** If you are faced with an ethical dilemma, you can consult with a mentor or ethics advisor for guidance.
* **Speak up if you see something wrong.** If you see a colleague or supervisor behaving unethically, you should speak up.
- Conclusion
Ethics is an important part of cybersecurity. Cybersecurity professionals should always strive to act ethically in the course of their work. By doing so, they can help to protect people and organizations from cyber attacks, build trust and credibility in the cybersecurity community, and set a good example for others.
Practice Quiz: Test your knowledge: Ethics in cybersecurity
An employee trained to handle PII and SPII leaves confidential patient information unlocked in a public area. Which ethical principles does this violate? Select all that apply.
Laws, Privacy protections, Confidentiality
This violates laws, confidentiality, and privacy protections.
Fill in the blank: Privacy protection means safeguarding _ from unauthorized use.
personal information
Privacy protection means safeguarding personal information from unauthorized use. Ensuring user permissions are correct helps prevent individuals from accessing protected information that they are not authorized to access.
You receive a text message on your personal device from your manager stating that they cannot access the company’s secured online database. They’re updating the company’s monthly party schedule and need another employee’s birth date right away. Your organization’s policies and procedures state that employee information should never be accessed or shared through personal communication channels. What should you do?
Respectfully decline, then remind your manager of the organization’s guidelines.
You should respectfully decline and remind your manager of the organization’s guidelines. Your role as a security analyst is to follow the policies and procedures of your company.
You work for a U.S.-based utility company that suffers a data breach. Several hacktivist groups claim responsibility for the attack. However, there is no evidence to verify their claims. What is the most ethical way to respond to this incident?
Improve the company’s defenses to help prevent future attacks.
Defending against future attacks is the most ethical way to approach this situation. Counterattacks are illegal in the U.S. except for by approved employees of the federal government or military personnel.
Review: Protect against threats, risks, and vulnerabilities
Video: Wrap-up
In this section, we learned about security frameworks and controls. We discussed how they are used to develop processes and procedures that protect organizations and the people they serve. We also discussed core components of frameworks, such as identifying security goals and establishing guidelines to achieve those goals. Then, we introduced specific frameworks and controls, including the CIA triad and the NIST CSF, and how they are used to manage risk. Finally, we discussed security ethics, including common ethical issues to consider, such as confidentiality, privacy protections, and laws.
Here are some of the key points to include in the summary:
- Security frameworks and controls are used to develop processes and procedures that protect organizations and the people they serve.
- Core components of frameworks include identifying security goals and establishing guidelines to achieve those goals.
- Specific frameworks and controls include the CIA triad and the NIST CSF.
- Security ethics is important to consider when developing and implementing security frameworks and controls.
You are now better prepared
to understand and help make decisions regarding
assessing and managing risks. Let’s review what we’ve covered. We discussed security
frameworks and controls and how
they’re used to develop processes and procedures that protect organizations and
the people they serve. We also discussed core
components of frameworks, such as identifying
security goals and establishing guidelines
to achieve those goals. Then, we introduced specific
frameworks and controls, including the CIA triad
and the NIST CSF, and how they are
used to manage risk. And finally, we discussed
security ethics, including common
ethical issues to consider, such as
confidentiality, privacy protections, and laws. You’re almost there, only one more section to go
in this course. Coming up, you’ll learn
about common tools and programming languages used by security analysts to protect
organizational operations. Hope you’re as excited
as I am to keep going!
Reading: Glossary terms from module 3
Reading
Terms and definitions from Course 1, Module 3
Asset: An item perceived as having value to an organization
Availability: The idea that data is accessible to those who are authorized to access it
Compliance: The process of adhering to internal standards and external regulations
Confidentiality: The idea that only authorized users can access specific assets or data
Confidentiality, integrity, availability (CIA) triad: A model that helps inform how organizations consider risk when setting up systems and security policies
Hacktivist: A person who uses hacking to achieve a political goal
Health Insurance Portability and Accountability Act (HIPAA): A U.S. federal law established to protect patients’ health information
Integrity: The idea that the data is correct, authentic, and reliable
National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF): A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk
Privacy protection: The act of safeguarding personal information from unauthorized use
Protected health information (PHI): Information that relates to the past, present, or future physical or mental health or condition of an individual
Security architecture: A type of security design composed of multiple components, such as tools and processes, that are used to protect an organization from risks and external threats
Security controls: Safeguards designed to reduce specific security risks
Security ethics: Guidelines for making appropriate decisions as a security professional
Security frameworks: Guidelines used for building plans to help mitigate risk and threats to data and privacy
Security governance: Practices that help support, define, and direct security efforts of an organization
Sensitive personally identifiable information (SPII): A specific type of PII that falls under stricter handling guidelines
Quiz: Module 3 challenge
What are some of the primary purposes of security frameworks? Select three answers.
- Identifying security weaknesses
- Protecting PII data
- Managing organizational risks
AI assistant
The three primary purposes of security frameworks are:
- Managing organizational risks: Security frameworks help organizations to identify and mitigate risks to their assets, systems, and data. This includes risks from cyberattacks, natural disasters, and human error.
- Identifying security weaknesses: Security frameworks help organizations to identify and fix security weaknesses in their systems and processes. This helps to reduce the risk of unauthorized access, data breaches, and other cyberattacks.
- Protecting PII data: Security frameworks help organizations to protect sensitive data, such as personally identifiable information (PII). This includes data that can be used to identify or track an individual, such as their name, address, and social security number.
The other option is not a primary purpose of security frameworks.
- Safeguarding specific individuals: Security frameworks are not designed to safeguard specific individuals. They are designed to protect organizations from a variety of risks, including those that could harm individuals.
Security frameworks are an important tool for organizations of all sizes. By implementing a security framework, organizations can improve their security posture and reduce their risk of cyberattacks.
Which of the following are core components of security frameworks? Select two answers.
- Setting guidelines to achieve security goals
- Implementing security processes
AI assistant
The two core components of security frameworks are setting guidelines to achieve security goals and implementing security processes.
- Setting guidelines to achieve security goals involves defining the organization’s security goals and developing guidelines for how to achieve those goals. This includes identifying the organization’s assets, threats, and vulnerabilities, and developing a risk management strategy.
- Implementing security processes involves putting the guidelines into practice by implementing security controls and procedures. This includes creating and enforcing security policies, training employees on security best practices, and monitoring the security posture of the organization.
The other options are not core components of security frameworks.
- Monitoring personally identifiable information (PII) is important for compliance with regulations such as the General Data Protection Regulation (GDPR), but it is not a core component of security frameworks.
- Establishing regulatory compliance measures is also important for compliance with regulations, but it is not a core component of security frameworks.
Security frameworks are designed to help organizations improve their security posture by providing a structured approach to security. The core components of security frameworks help organizations to define their security goals, develop and implement security controls, and monitor their security posture.
Fill in the blank: A security professional has been tasked with implementing strict password policies on workstations to reduce the risk of password theft. This is an example of _.
security controls
AI assistant
The answer is security controls.
Security controls are the policies, procedures, and technologies that are used to protect an organization’s assets. They can be physical, technical, or administrative.
In this case, the security professional is implementing a password policy, which is a type of administrative control. Password policies are designed to reduce the risk of password theft by requiring users to create strong passwords and to change their passwords regularly.
Other examples of security controls include:
- Firewalls: Hardware or software that controls incoming and outgoing network traffic.
- Intrusion detection systems (IDS): Systems that monitor network traffic for suspicious activity.
- Intrusion prevention systems (IPS): Systems that take action to prevent suspicious activity from occurring.
- Data encryption: The process of converting data into a form that cannot be read without a special key.
- Access control lists (ACLs): Lists that define which users or groups have access to which resources.
Security controls are an essential part of any organization’s security posture. By implementing appropriate security controls, organizations can reduce the risk of cyberattacks and protect their assets.
The other options are incorrect.
- Networking regulations are rules that govern the use of networks. They are typically enforced by government agencies.
- Hardware changes are changes to the physical components of a computer system. They can be used to improve security, but they are not always necessary.
- Security teams are groups of people who are responsible for protecting an organization’s assets. They typically implement and monitor security controls.
You are helping your security team consider risk when setting up a new software system. Using the CIA triad, you focus on integrity, availability, and what else?
Confidentiality
AI assistant
The correct answer is confidentiality.
The CIA triad is a security model that describes the three main goals of information security: confidentiality, integrity, and availability.
- Confidentiality is the assurance that information is not disclosed to unauthorized individuals or processes.
- Integrity is the assurance that information is not modified in an unauthorized way.
- Availability is the assurance that information is accessible to authorized individuals or processes when needed.
In the context of setting up a new software system, the security team should focus on all three aspects of the CIA triad. However, confidentiality is particularly important for systems that handle sensitive data, such as financial information or customer records.
The other options are incorrect.
- Communication: Communication is important for security, but it is not one of the main goals of the CIA triad.
- Consent: Consent is the permission given by an individual to collect or use their personal information. It is important for privacy, but it is not one of the main goals of the CIA triad.
- Conformity: Conformity is the adherence to standards or regulations. It is important for security, but it is not one of the main goals of the CIA triad.
By focusing on confidentiality, integrity, and availability, the security team can help to ensure that the new software system is secure and protects the organization’s information assets.
Fill in the blank: A key aspect of the CIA triad is ensuring that only _ can access specific assets.
authorized users
AI assistant
The answer is authorized users.
The CIA triad is a security model that describes the three main goals of information security: confidentiality, integrity, and availability.
- Confidentiality is the assurance that information is not disclosed to unauthorized individuals or processes.
- Integrity is the assurance that information is not modified in an unauthorized way.
- Availability is the assurance that information is accessible to authorized individuals or processes when needed.
Ensuring that only authorized users can access specific assets is a key aspect of confidentiality. This can be done through a variety of methods, such as authentication, authorization, and access control.
The other options are incorrect.
- Business competitors: Business competitors should not be able to access an organization’s assets.
- Social media sites: Social media sites are not typically considered to be assets that need to be protected by the CIA triad.
- Internet providers: Internet providers may have access to an organization’s assets, but they should only have access to the data that is necessary to provide internet service.
By ensuring that only authorized users can access specific assets, organizations can help to protect their information assets and comply with regulations such as the General Data Protection Regulation (GDPR).
Which of the following statements accurately describe the NIST CSF? Select all that apply.
- It is a voluntary framework.
- Security teams use it as a baseline to manage risk.
- Its purpose is to help manage cybersecurity risk.
AI assistant
The following statements accurately describe the NIST CSF:
- It is a voluntary framework.
- Security teams use it as a baseline to manage risk.
- Its purpose is to help manage cybersecurity risk.
The statement that it is only effective at managing short-term risk is not accurate. The NIST CSF can be used to manage both short-term and long-term risk.
Here is a brief explanation of each statement:
- Voluntary framework: The NIST CSF is a voluntary framework, which means that organizations are not required to use it. However, many organizations choose to use it because it provides a comprehensive and flexible approach to managing cybersecurity risk.
- Baseline to manage risk: Security teams use the NIST CSF as a baseline to manage risk. This means that they use the CSF to identify, assess, and mitigate cybersecurity risks.
- Help manage cybersecurity risk: The purpose of the NIST CSF is to help organizations manage cybersecurity risk. This includes helping organizations to identify, assess, and mitigate risks; improve their security posture; and communicate about cybersecurity risk.
- Manage short-term and long-term risk: The NIST CSF can be used to manage both short-term and long-term risk. The short-term risks are those that are likely to occur in the near future, such as a data breach. The long-term risks are those that may occur in the future, such as a cyber attack on critical infrastructure.
Fill in the blank: As a security professional, you monitor the potential threats associated with _ because they often have access to sensitive information, know where to find it, and may have malicious intent.
disgruntled employees
AI assistant
The answer is disgruntled employees.
As a security professional, you need to be aware of the potential threats associated with all types of individuals, but disgruntled employees are a particularly high risk because they often have access to sensitive information, know where to find it, and may have malicious intent.
Disgruntled employees may be motivated to harm their employer by stealing data, sabotaging systems, or leaking confidential information. They may also be more likely to fall victim to social engineering attacks, which can be used to trick them into giving up their passwords or other sensitive information.
Here are some specific threats that disgruntled employees can pose:
- Data theft: Disgruntled employees may steal sensitive data, such as customer records, financial information, or intellectual property. This data can be used for malicious purposes, such as blackmail, identity theft, or corporate espionage.
- System sabotage: Disgruntled employees may try to sabotage systems or networks, which can cause disruption to business operations or even financial losses.
- Confidentiality breaches: Disgruntled employees may leak confidential information, such as trade secrets or marketing plans. This information can give competitors a leg up or damage the reputation of the organization.
To mitigate the risks posed by disgruntled employees, organizations should implement appropriate security measures, such as:
- Conducting regular background checks on employees.
- Limiting employee access to sensitive information.
- Monitoring employee behavior for signs of suspicious activity.
- Implementing security awareness training for employees.
- Having a plan in place to deal with disgruntled employees.
By taking these steps, organizations can help to protect themselves from the threats posed by disgruntled employees.
A security professional is updating software on a coworker’s computer and happens to see a very interesting email about another employee. The security professional chooses to follow company guidelines with regards to privacy protections and does not share the information with coworkers. Which concept does this scenario describe?
Security ethics
AI assistant
The scenario you described describes the security ethics concept.
Security ethics is the application of ethical principles to the field of information security. It is important for security professionals to be aware of the ethical implications of their work, and to make decisions that uphold the privacy and confidentiality of individuals.
In the scenario you described, the security professional did the right thing by following company guidelines with regards to privacy protections and not sharing the information with coworkers. This is an example of upholding the ethical principle of confidentiality, which means keeping information private and secure.
Other security ethics concepts include:
- Integrity: Ensuring that information is accurate and complete.
- Availability: Ensuring that information is accessible when needed.
- Accountability: Holding individuals responsible for their actions.
- Transparency: Ensuring that decisions are made in a fair and open manner.
By following security ethics principles, security professionals can help to protect the privacy and confidentiality of individuals, and build trust and credibility with their organizations.
The other concepts you mentioned are also important in information security, but they are not the focus of the scenario you described.
- Security controls are the mechanisms that are used to protect information systems. They can include things like firewalls, intrusion detection systems, and access control lists.
- Business email compromise is a type of cyber attack that involves tricking a victim into sending money or revealing sensitive information.
- Preserving evidence is the process of collecting and storing data in a way that it can be used as evidence in a legal proceeding.
Which ethical principle describes safeguarding personal information from unauthorized use?
Privacy protection
AI assistant
The ethical principle that describes safeguarding personal information from unauthorized use is privacy protection.
Privacy protection is the right of individuals to control the collection, use, and disclosure of their personal information. It is an important ethical principle because it helps to protect individuals from harm, such as identity theft, financial fraud, and discrimination.
There are many ways to safeguard personal information from unauthorized use. Some common methods include:
- Limiting access to personal information to those who need it.
- Using strong passwords and security measures to protect personal information.
- Educating employees and users about privacy protection.
- Implementing data security policies and procedures.
By following these methods, organizations can help to protect the privacy of individuals and uphold the ethical principle of privacy protection.
The other ethical principles you mentioned are also important, but they are not directly related to safeguarding personal information.
- Incident investigation is the process of determining the cause of an incident and taking steps to prevent it from happening again.
- Non-bias is the practice of making decisions without prejudice or discrimination.
- Honesty is the practice of being truthful and trustworthy.
You are a security professional working for a state motor vehicle agency that stores drivers’ national identification numbers and banking information. Which ethical principle involves adhering to rules that are intended to protect these types of data?
Laws
AI assistant
The ethical principle that involves adhering to rules that are intended to protect these types of data is laws.
Laws are the rules that are created by governments to regulate the behavior of individuals and organizations. They are designed to protect the rights of individuals, including their privacy and security.
In the context of data protection, laws such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) establish rules for how organizations can collect, use, and share personal information. These laws also give individuals the right to access their personal information, to have it corrected, and to delete it.
As a security professional working for a state motor vehicle agency, you have a responsibility to adhere to the laws that are designed to protect the data that you are entrusted with. This includes drivers’ national identification numbers and banking information. By following the law, you can help to protect the privacy and security of these individuals.
The other ethical principles you mentioned are also important, but they are not directly related to adhering to laws.
- Restrictions are limitations on what can be done.
- Investigations are the process of gathering information to determine if a crime has been committed.
- Guidelines are suggestions or recommendations on how to do something.
I hope this helps! Let me know if you have any other questions.