Skip to content

You will gain understanding of the CISSP’s eight security domains. Then, you’ll learn about primary threats, risks, and vulnerabilities to business operations. In addition, you’ll explore the National Institute of Standards and Technology’s (NIST) Risk Management Framework (RMF) and the steps of risk management.

Learning Objectives

  • Recognize and explain the focus of CISSP’s eight security domains.
  • Identify and define the primary threats, risks, and vulnerabilities to business operations.
  • Describe the threats, risks, and vulnerabilities that entry-level security analysts are most focused on.
  • Determine how threats, risks, and vulnerabilities impact business operations.
  • Identify the steps of risk management.

Get started with the course


Video: Introduction to Course 2

In this course, you will learn about the eight security domains of the CISSP certification, security frameworks and controls, security audits, and basic security tools. You will also have a chance to explore how to use security tools to protect assets and data from threats, risks, and vulnerabilities. Securing an organization and its assets is an important step in maintaining business operations.

My name is Ashley, and I’m
a Customer Engineering Enablement Lead for Security Operation Sales at Google. I’m excited to be your instructor for
this course. Let’s start by quickly reviewing
what we’ve covered so far. Earlier, we defined security and explored some common job responsibilities
for entry-level analysts. We also discussed core skills and
knowledge that analysts need to develop. Then, we shared some key events like
the LoveLetter and Morris attacks that led to the development and
ongoing evolution of the security field. We also introduced you to frameworks,
controls, and the CIA triad, which are all
used to reduce risk. In this course, we’ll discuss the focus
of Certified Information Systems Security Professional’s, or CISSP’s,
eight security domains. We’ll also cover security frameworks and
controls in more detail, with a focus on NIST’s Risk
Management Framework. Additionally, we’ll explore
security audits, including common elements of internal audits. Then, we’ll introduce some
basic security tools, and you’ll have a chance to explore how to
use security tools to protect assets and data from threats, risks,
and vulnerabilities. Securing an organization and
its assets from threats, risks, and vulnerabilities is an important step
in maintaining business operations. In my experience as a security analyst,
I helped respond to a severe breach that cost
the organization nearly $250,000. So, I hope you’re feeling motivated
to continue your security journey. I know I’m excited. Let’s get started!

Reading: Course 2 overview

More about the CISSP security domains


Video: Welcome to module 1

  • The world of cybersecurity is vast and complex.
  • This program will teach you the knowledge, skills, and tools you need to navigate this world.
  • The first few videos will cover the focus of the eight security domains in the CISSP certification.
  • These domains are:
    • Security and risk management
    • Asset security
    • Security architecture and engineering
    • Communication and network security
    • Identity and access management
    • Security assessment and testing
    • Security operations
    • Software development security
    • Risk management
  • The next few videos will discuss threats, risks, and vulnerabilities in more detail.
  • They will also introduce you to the three layers of the web and the different types of attacks.
  • Finally, the program will teach you how to manage risks using the NIST RMF.
  • By learning these topics, you will be able to mitigate and manage the risks and threats that organizations face on a daily basis.

Here is a more detailed summary of the text:

  • The first paragraph introduces the topic of cybersecurity and explains why it is important to have the knowledge and skills to navigate this complex field.
  • The second paragraph provides an overview of the eight security domains in the CISSP certification. These domains cover a wide range of topics, from security and risk management to software development security.
  • The third paragraph discusses threats, risks, and vulnerabilities. These are the three pillars of cybersecurity, and understanding them is essential for mitigating and managing risk.
  • The fourth paragraph introduces the three layers of the web. These layers are the physical layer, the network layer, and the application layer. Each layer has its own unique security challenges.
  • The fifth paragraph discusses the different types of attacks. These attacks can be classified into many different categories, such as denial-of-service attacks, malware attacks, and social engineering attacks.
  • The sixth paragraph explains how to manage risks using the NIST RMF. The NIST RMF is a framework that organizations can use to identify, assess, and mitigate risks.
  • The seventh paragraph concludes by stating that by learning the topics covered in this program, you will be able to mitigate and manage the risks and threats that organizations face on a daily basis.

Video: Explore the CISSP security domains, Part 1

  • The first four domains of the CISSP certification are:
    • Security and risk management
    • Asset security
    • Security architecture and engineering
    • Communication and network security
  • Security and risk management is focused on defining security goals and objectives, risk mitigation, compliance, business continuity, and legal regulations.
  • Asset security is focused on securing digital and physical assets, as well as the storage, maintenance, retention, and destruction of data.
  • Security architecture and engineering is focused on optimizing data security by ensuring effective tools, systems, and processes are in place to protect an organization’s assets and data.
  • Communication and network security is focused on managing and securing physical networks and wireless communications.

Here is a more detailed summary of each domain:

  • Security and risk management: This domain is focused on understanding the risks to an organization’s assets and data, and developing and implementing controls to mitigate those risks.
  • Asset security: This domain is focused on protecting an organization’s assets, both physical and digital. This includes securing data, devices, and infrastructure.
  • Security architecture and engineering: This domain is focused on designing and implementing security solutions that protect an organization’s assets and data. This includes designing secure systems, implementing security controls, and managing security risks.
  • Communication and network security: This domain is focused on securing an organization’s communications and networks. This includes protecting data in transit, securing wireless networks, and managing network security risks.

The next four domains of the CISSP certification are:

  • Identity and access management (IAM)
  • Security assessment and testing
  • Security operations
  • Software development security

I will discuss these domains in a separate summary.

Introduction

The CISSP (Certified Information Systems Security Professional) is a globally recognized certification that validates the knowledge and skills of security professionals. The CISSP certification covers eight domains of security knowledge, which are:

  • Security and risk management
  • Asset security
  • Security architecture and engineering
  • Communication and network security
  • Identity and access management (IAM)
  • Security assessment and testing
  • Security operations
  • Software development security
  • Risk management

This tutorial will explore each of the CISSP security domains in more detail.

Security and risk management

The security and risk management domain is focused on understanding the risks to an organization’s assets and data, and developing and implementing controls to mitigate those risks. This domain includes topics such as:

  • Risk identification and assessment
  • Risk mitigation strategies
  • Security controls
  • Compliance
  • Business continuity planning

Asset security

The asset security domain is focused on protecting an organization’s assets, both physical and digital. This includes securing data, devices, and infrastructure. This domain includes topics such as:

  • Data classification
  • Data security
  • Device security
  • Infrastructure security
  • Physical security

Security architecture and engineering

The security architecture and engineering domain is focused on designing and implementing security solutions that protect an organization’s assets and data. This domain includes topics such as:

  • Security design principles
  • Security architecture
  • Security engineering
  • Security implementation

Communication and network security

The communication and network security domain is focused on securing an organization’s communications and networks. This includes protecting data in transit, securing wireless networks, and managing network security risks. This domain includes topics such as:

  • Network security
  • Wireless security
  • Data in transit security
  • Network security controls

Identity and access management (IAM)

The identity and access management (IAM) domain is focused on managing who has access to what resources. This domain includes topics such as:

  • Identity management
  • Access management
  • Privileged access management
  • Identity governance and administration (IGA)

Security assessment and testing

The security assessment and testing domain is focused on evaluating the security of an organization’s systems and networks. This domain includes topics such as:

  • Vulnerability scanning
  • Penetration testing
  • Social engineering testing
  • Red teaming

Security operations

The security operations domain is focused on monitoring and responding to security incidents. This domain includes topics such as:

  • Security incident response
  • Security monitoring
  • Security event management (SEM)
  • Security information and event management (SIEM)

Software development security

The software development security domain is focused on securing software development processes. This domain includes topics such as:

  • Secure coding practices
  • Software security testing
  • DevSecOps

Conclusion

This tutorial has explored each of the CISSP security domains in more detail. The CISSP certification is a valuable credential for security professionals who want to demonstrate their knowledge and skills in a wide range of security domains.

If you are interested in learning more about the CISSP certification, I recommend visiting the ISC2 website: https://www.isc2.org/Certifications/CISSP.

Welcome back! You might remember from course one that
there are eight security domains, or categories, identified by CISSP. Security teams use them to
organize daily tasks and identify gaps in security that could
cause negative consequences for an organization, and
to establish their security posture. Security posture refers to
an organization’s ability to manage its defense of critical assets and
data and react to change. In this video, we’ll discuss
the focus of the first four domains: security and risk management,
asset security, security architecture and engineering,
and communication and network security. The first domain is security and
risk management. There are several areas of focus for
this domain: defining security goals and
objectives, risk mitigation, compliance, business continuity, and
legal regulations. Let’s discuss each area
of focus in more detail. By defining security goals and objectives, organizations can reduce
risks to critical assets and data like PII, or
personally identifiable information. Risk mitigation means having
the right procedures and rules in place to quickly reduce
the impact of a risk like a breach. Compliance is the primary method used
to develop an organization’s internal security policies, regulatory
requirements, and independent standards. Business continuity relates to
an organization’s ability to maintain their everyday productivity by
establishing risk disaster recovery plans. And finally,
while laws related to security and risk management are different worldwide,
the overall goals are similar. As a security professional, this means
following rules and expectations for ethical behavior to minimize negligence,
abuse, or fraud. The next domain is asset security. The asset security domain is focused on
securing digital and physical assets. It’s also related to the storage,
maintenance, retention, and destruction of data. This means that assets such as PII or
SPII should be securely handled and protected, whether stored on a computer,
transferred over a network like the internet, or
even physically collected. Organizations also need to have
policies and procedures that ensure data is properly stored,
maintained, retained, and destroyed. Knowing what data you have and who has
access to it is necessary for having a strong security posture that mitigates
risk to critical assets and data. Previously, we provided a few examples
that touched on the disposal of data. For example, an organization might
have you, as a security analyst, oversee the destruction of hard drives to make
sure that they’re properly disposed of. This ensures that private data stored
on those drives can’t be accessed by threat actors. The third domain is security
architecture and engineering. This domain is focused on optimizing data
security by ensuring effective tools, systems, and processes are in place to
protect an organization’s assets and data. One of the core concepts of secure design
architecture is shared responsibility. Shared responsibility means
that all individuals within an organization take an active
role in lowering risk and maintaining both physical and
virtual security. By having policies that
encourage users to recognize and report security concerns, many issues
can be handled quickly and effectively. The fourth domain is communication and
network security, which is mainly focused on managing and securing physical
networks and wireless communications. Secure networks keep an organization’s
data and communications safe whether on-site, or in the cloud, or
when connecting to services remotely. For example, employees working
remotely in public spaces need to be protected from vulnerabilities
that can occur when they use insecure bluetooth connections or
public wifi hotspots. By having security team members remove
access to those types of communication channels at the organizational level,
employees may be discouraged from practicing insecure behavior that
could be exploited by threat actors. Now that we’ve reviewed the focus
of our first four domains, let’s discuss the last four domains.

The world of security,
which we also refer to as cybersecurity throughout
this program, is vast. So making sure that you have
the knowledge, skills, and tools to successfully navigate
this world is why we’re here. In the following videos, you’ll learn about the focus of
CISSP’s eight security domains. Then, we’ll discuss threats, risks,
and vulnerabilities in more detail. We’ll also introduce you to
the three layers of the web and share some examples to help you understand
the different types of attacks that we’ll discuss throughout the program. Finally, we’ll examine how to manage
risks by using the National Institute of Standards and Technology’s Risk Management
Framework, known as the NIST RMF. Because these topics and related technical skills are considered
core knowledge in the security field, continuing to build your understanding
of them will help you mitigate and manage the risks and threats that
organizations face on a daily basis. In the next video, we’ll further
discuss the focus of the eight security domains introduced in the first course.

Video: Explore the CISSP security domains, Part 2

  • The last four domains of the CISSP certification are:
    • Identity and access management (IAM)
    • Security assessment and testing
    • Security operations
    • Software development security
  • Identity and access management (IAM) is focused on managing who has access to what resources.
  • Security assessment and testing is focused on evaluating the security of an organization’s systems and networks.
  • Security operations is focused on monitoring and responding to security incidents.
  • Software development security is focused on securing software development processes.

Here is a more detailed summary of each domain:

  • Identity and access management (IAM): This domain is focused on ensuring that only authorized users have access to an organization’s systems and data. This includes implementing strong authentication methods, managing user permissions, and monitoring user activity.
  • Security assessment and testing: This domain is focused on identifying and mitigating security risks. This includes conducting vulnerability scans, penetration testing, and social engineering assessments.
  • Security operations: This domain is focused on monitoring and responding to security incidents. This includes detecting and responding to malicious activity, triaging incidents, and restoring systems and data.
  • Software development security: This domain is focused on securing the software development process. This includes implementing secure coding practices, testing for security vulnerabilities, and managing security risks.

In this video,
we’ll cover the last four domains: identity and access management,
security assessment and testing, security operations, and
software development security. The fifth domain is identity and
access management, or IAM. And it’s focused on access and
authorization to keep data secure by making sure users follow established
policies to control and manage assets. As an entry-level analyst, it’s essential
to keep an organization’s systems and data as secure as possible by ensuring user
access is limited to what employees need. Basically, the goal of IAM is to reduce
the overall risk to systems and data. For example, if everyone at a company
is using the same administrator login, there is no way to track who
has access to what data. In the event of a breach, separating valid user activity from
the threat actor would be impossible. There are four main components to IAM. Identification is when a user verifies
who they are by providing a user name, an access card, or
biometric data such as a fingerprint. Authentication is the verification
process to prove a person’s identity, such as entering a password or
PIN. Authorization takes place after a user’s
identity has been confirmed and relates to their level of access, which
depends on the role in the organization. Accountability refers to monitoring and
recording user actions, like login attempts, to prove systems and
data are used properly. The sixth security domain is
security assessment and testing. This domain focuses on conducting
security control testing, collecting and analyzing data, and
conducting security audits to monitor for risks, threats, and vulnerabilities. Security control testing can help
an organization identify new and better ways to mitigate threats,
risks, and vulnerabilities. This involves examining organizational
goals and objectives, and evaluating if the controls being used
actually achieve those goals. Collecting and analyzing security data
regularly also helps prevent threats and risks to the organization. Analysts might use security control
testing evaluations and security assessment reports to improve existing
controls or implement new controls. An example of implementing a new control
could be requiring the use of multi-factor authentication to better protect the
organization from potential threats and risks. Next, let’s discuss security operations. The security operations domain is
focused on conducting investigations and implementing preventative measures. Investigations begin once a security
incident has been identified. This process requires a heightened
sense of urgency in order to minimize potential risks to the organization. If there is an active attack,
mitigating the attack and preventing it from escalating further
is essential for ensuring that private information
is protected from threat actors. Once the threat has been neutralized,
the collection of digital and physical evidence to conduct
a forensic investigation will begin. A digital forensic investigation
must take place to identify when, how, and
why the breach occurred. This helps security teams determine
areas for improvement and preventative measures that can be
taken to mitigate future attacks. The eighth and final security domain
is software development security. This domain focuses on using
secure coding practices. As you may remember,
secure coding practices are recommended guidelines that are used to create
secure applications and services. The software development lifecycle is
an efficient process used by teams to quickly build software products and
features. In this process, security
is an additional step. By ensuring that each phase of the
software development lifecycle undergoes security reviews, security can be fully
integrated into the software product. For example, performing a secure
design review during the design phase, secure code reviews during
the development and testing phases, and penetration testing during
the deployment and implementation phase ensures that security is embedded into
the software product at every step. This keeps software secure and
sensitive data protected, and mitigates unnecessary
risk to an organization. Being familiar with these domains can
help you better understand how they’re used to improve the overall
security of an organization and the critical role security teams play. Next, we’ll discuss security threats,
risks, and vulnerabilities, including ransomware, and introduce
you to the three layers of the web.

Reading: Security domains cybersecurity analysts need to know

Reading

Video: Ashley: My path to cybersecurity

Ashley is a CE Enablement Lead for SecOps sales at Google. She grew up with an interest in tech, but her path to a career in cybersecurity was not linear. She joined the army after high school and then worked in retail and other non-tech jobs before returning to school to study IT. She eventually landed her first security analyst job in 2017.

Ashley emphasizes the importance of soft skills in a cybersecurity career. She says that you need to be able to work with a team, communicate effectively, and solve problems. You also don’t necessarily need to be a software engineer to work in cybersecurity. There are many different roles in the field, and you can find one that fits your skills and interests.

Here are some of the key points from Ashley’s story:

  • It’s okay if your path to a career in cybersecurity is not linear.
  • Soft skills are just as important as technical skills in cybersecurity.
  • There are many different roles in cybersecurity, so you can find one that fits your skills and interests.
  • Don’t get discouraged if you don’t get your dream job right away. Keep learning and growing, and eventually you will find the right opportunity.

My name is Ashley and
my role at Google is CE Enablement Lead
for SecOps sales. All that means is I
help set up training for customer engineers
that support our products. Grew up with a computer,
loved the Internet. I have one of the
earliest AOL screen names in history and I’m
very proud of that. My dad is an engineer and I think there was always
an interest in tech. But when I got out
of high school, there wasn’t a clear
path to get there. It wasn’t a linear path at all. I was a knucklehead growing up. I gave up in 10th grade
and I just didn’t care for a long time
and I was getting in trouble a lot and
I pretty much told myself if I don’t join the
military and get out of here, I will probably not be here in about 2-3 years if I
continue down this path. I joined the army right out of high school, graduated in June, and four days later I was at
bootcamp at Fort Jackson, South Carolina as
a trumpet player, believe it or not, I
come back and had to get a job and was not even tracking on tech jobs
or anything like that. I was pulling in carts
for a big hardware store, selling video games, retail, box slinger for a
freight company. All of that stuff has happened before I even figured out
that tech was an option. The military was kind
enough to retrain me in IT, and that’s kind of how I actually got the official first wave of schooling to be
able to actually say, hey, I have the skills to at
least be a PC technician. I went back to community
college and I actually did find a cybersecurity
associates degree program, worked on some certifications. I went to my first DEFCON, which is a big
hacking conference, and that set off a light bulb, I think to actually get that clarity on what the
path could look like. I landed my first
security analyst job back in 2017 and I went to a Veterans Training
Program at my last company that was free for
vets and ended up getting hired out
of the training. I was with that company for almost five years before
I came to Google. If you’re new and
you’re just coming in, you have to know how
to work with a team. I think a lot of us learned that in customer service settings. Some of the skills I
learned working in retail, dealing with hard customers, learning how to even talk
to people or diffuse a situation if people
are upset about things, just learning how
to talk to people. In IT we need that. It’s no longer just the
tech skills we need, the more T-shaped which
they’re soft skills, there’s people skills, and
there’s technical skills. You have to have good
analysis skills, and again, it doesn’t even have to be technical analysis, if you can read a book and pick apart the rhetorical
devices of that story, you can do analysis work. I didn’t have to be a software engineer to
work in this field. For many of us, there’s
like a math fear, programming is a big hurdle, but we work with people, we work with processes, and you don’t
necessarily need to have that coding knowledge to
understand people or processes. There’s so many
ways to break in, so do not get discouraged
and don’t be scared to think outside of the box to
get your foot in the door.

Practice Quiz: Test your knowledge: More about the CISSP security domains

Fill in the blank: The _ domain is focused on access and authorization to keep data secure by making sure that users follow established policies to control and manage assets.

What is the focus of the security and risk management domain?

In which domain would a security professional conduct security control testing; collect and analyze data; and perform security audits to monitor for risks, threats, and vulnerabilities?

Fill in the blank: The _ domain concerns conducting investigations and implementing preventive measures.

Navigate threats, risks, and vulnerabilities


Video: Threats, risks, and vulnerabilities

As an entry-level security analyst, understanding the intricate dance between threats, risks, and vulnerabilities is your foundational armor. Imagine them as a perilous three-headed dragon you must tame to protect your organization’s precious assets. Let’s dissect each head and equip you with the tools to combat them:

The Cunning Threat:

  • Think of threats as malicious actors or events lurking in the shadows, waiting to pounce. They come in various forms, from sophisticated cyberattacks like ransomware to low-tech social engineering ploys like phishing emails. Each threat carries a unique bite, aiming to steal sensitive data, disrupt operations, or damage your organization’s reputation.
  • Example: A disgruntled employee with access to critical customer data poses a significant threat of insider data breach.

The Calculating Risk:

  • Risk isn’t the threat itself, but the likelihood of it materializing and the potential damage it can inflict. It’s like estimating the dragon’s fiery breath before facing it. By analyzing threats and vulnerabilities, you assess the probability of an attack and the severity of its impact.
  • Example: An outdated database system with weak access controls presents a high risk of a data breach, potentially exposing financial information and impacting customer trust.

The Exploitable Vulnerability:

  • Think of vulnerabilities as cracks in your organization’s armor, inviting threats to slip through. These weaknesses can be technical (outdated software, buggy applications) or human (lack of security awareness, weak passwords). Each vulnerability represents a potential chink in your defenses, waiting to be exploited.
  • Example: Employees falling for phishing scams due to insufficient security training create a vulnerability that attackers can easily exploit to steal credentials and infiltrate systems.

The Analyst’s Role:

Your task as a security analyst is to be the vigilant dragon slayer, wielding knowledge and proactive measures to counter these threats:

  • Identify and catalog vulnerabilities: Conduct regular security assessments to map out potential weaknesses in your systems and processes.
  • Evaluate risks: Analyze the likelihood of threats exploiting vulnerabilities and the potential impact of such attacks.
  • Implement proactive safeguards: Patch software, enforce strong authentication protocols, and educate employees on security best practices to plug vulnerabilities and minimize risks.
  • Monitor and detect: Continuously monitor systems for suspicious activity and have robust incident response plans in place to mitigate damage if a threat strikes.

Remember, understanding the interplay between threats, risks, and vulnerabilities is the cornerstone of effective security. By wielding this knowledge and taking proactive measures, you can stand guard against the dragons lurking in the digital shadows, protecting your organization’s valuable assets and ensuring its smooth operation.

Next: We’ll dive deeper into how these concepts translate into the real world, exploring their impact on various business operations. Stay tuned!

I hope this expanded explanation provides a more comprehensive understanding of these crucial security concepts. Don’t hesitate to ask if you have any further questions!

By taking these steps, entry-level security analysts can help to protect their organization’s assets and ensure the confidentiality, integrity, and availability of its data.

Introduction

Cybersecurity is the practice of protecting systems, networks, and data from digital attacks. Threats, risks, and vulnerabilities are three important concepts in cybersecurity.

  • A threat is anything that can exploit a vulnerability to cause harm to an asset.
  • A risk is the likelihood that a threat will occur and the impact it will have if it does.
  • A vulnerability is a weakness in a system, network, or application that can be exploited by a threat.

Threats

There are many different types of threats, including:

  • Malware: This is software that is designed to harm a computer system. Malware can include viruses, worms, trojan horses, and ransomware.
  • Social engineering: This is a technique that uses human psychology to trick people into giving up their personal information or clicking on malicious links.
  • Phishing: This is a type of social engineering attack that involves sending emails or text messages that appear to be from a legitimate source, such as a bank or credit card company. The emails or text messages often contain a link that, when clicked, takes the victim to a fake website that looks like the real website. Once the victim enters their personal information on the fake website, the attacker can steal it.
  • DDoS attacks: These attacks involve flooding a website or server with so much traffic that it becomes unavailable.
  • Zero-day attacks: These are attacks that exploit vulnerabilities in software that the software vendor is not aware of.

Risks

The risk of a threat occurring depends on a number of factors, including the likelihood of the threat, the impact of the threat, and the organization’s ability to mitigate the threat.

The likelihood of a threat occurring can be assessed by considering the following factors:

  • The motivation of the threat actor.
  • The resources available to the threat actor.
  • The technical skills of the threat actor.
  • The security measures in place to protect against the threat.

The impact of a threat can be assessed by considering the following factors:

  • The value of the asset that is being targeted.
  • The confidentiality, integrity, and availability of the asset.
  • The legal and regulatory requirements that apply to the asset.

The organization’s ability to mitigate the threat can be assessed by considering the following factors:

  • The security controls that are in place.
  • The security awareness of employees.
  • The organization’s incident response plan.

Vulnerabilities

Vulnerabilities can be introduced into systems, networks, and applications in a number of ways, including:

  • Software bugs.
  • Misconfigurations.
  • Poor security practices.
  • Human error.

Vulnerabilities can be exploited by threats to cause harm to an asset. Therefore, it is important to identify and mitigate vulnerabilities as early as possible.

Conclusion

Threats, risks, and vulnerabilities are all important concepts in cybersecurity. By understanding these concepts, organizations can better protect their systems, networks, and data from digital attacks.

Here are some additional tips for managing threats, risks, and vulnerabilities:

  • Conduct regular security assessments to identify and mitigate vulnerabilities.
  • Implement security controls to protect against threats.
  • Train employees on security best practices.
  • Have a plan for responding to security incidents.

By taking these steps, organizations can reduce their risk of a data breach or other security incident.

Phishing exploits human error to acquire sensitive data and private information.

True

Phishing exploits human error to acquire sensitive data and private information. It is one method of social engineering.

As an entry-level security analyst,
one of your many roles will be to handle an organization’s digital and
physical assets. As a reminder, an asset is an item perceived as
having value to an organization. During their lifespan, organizations
acquire all types of assets, including physical office spaces, computers,
customers’ PII, intellectual property, such as patents or copyrighted
data, and so much more. Unfortunately, organizations operate
in an environment that presents multiple security threats, risks,
and vulnerabilities to their assets. Let’s review what threats, risks,
and vulnerabilities are and discuss some common examples of each. A threat is any circumstance or
event that can negatively impact assets. One example of a threat is
a social engineering attack. Social engineering is a manipulation
technique that exploits human error to gain private information,
access, or valuables. Malicious links in email messages that
look like they’re from legitimate companies or people is one method of
social engineering known as phishing. As a reminder, phishing is a technique
that is used to acquire sensitive data, such as user names, passwords,
or banking information. Risks are different from threats. A risk is anything that can impact
the confidentiality, integrity, or availability of an asset. Think of a risk as the likelihood
of a threat occurring. An example of a risk to an organization
might be the lack of backup protocols for making sure its stored information can be
recovered in the event of an accident or security incident. Organizations tend to rate risks
at different levels: low, medium, and high, depending on possible
threats and the value of an asset. A low-risk asset is information that would
not harm the organization’s reputation or ongoing operations, and would not
cause financial damage if compromised. This includes public information
such as website content, or published research data. A medium-risk asset might include
information that’s not available to the public and may cause some
damage to the organization’s finances, reputation, or ongoing operations. For example, the early release of a
company’s quarterly earnings could impact the value of their stock. A high-risk asset is any information
protected by regulations or laws, which if compromised, would have
a severe negative impact on an organization’s finances,
ongoing operations, or reputation. This could include leaked assets with SPII,
PII, or intellectual property. Now, let’s discuss vulnerabilities. A vulnerability is a weakness that
can be exploited by a threat. And it’s worth noting that
both a vulnerability and threat must be present for
there to be a risk. Examples of vulnerabilities include:
an outdated firewall, software, or application; weak passwords; or
unprotected confidential data. People can also be
considered a vulnerability. People’s actions can significantly affect
an organization’s internal network. Whether it’s a client,
external vendor, or employee, maintaining security
must be a united effort. So entry-level analysts
need to educate and empower people to be
more security conscious. For example, educating people on how to identify a
phishing email is a great starting point. Using access cards to grant employee
access to physical spaces while restricting outside visitors is
another good security measure. Organizations must continually
improve their efforts when it comes to identifying and mitigating vulnerabilities
to minimize threats and risks. Entry-level analysts can support this
goal by encouraging employees to report suspicious activity and
actively monitoring and documenting employees’
access to critical assets. Now that you’re familiar with
some of the threats, risks, and vulnerabilities analysts
frequently encounter, coming up, we’ll discuss how
they impact business operations.

Video: Key impacts of threats, risks, and vulnerabilities

Ransomware: Explores the costly malware attack where data is encrypted and a ransom demanded for decryption. It can freeze systems, lock data, and disrupt operations.

Dark Web: Explains the three layers of the web: Surface (public), Deep (authorization required), and Dark (special software needed). Dark web often used by criminals for its secrecy.

3 Key Impacts of Threats, Risks, and Vulnerabilities:

  1. Financial Impact: Compromised assets lead to production/service interruptions, correction costs, and potential fines for non-compliance.
  2. Identity Theft: Storing sensitive data (PII) poses risks like data leaks through the dark web, causing financial and legal consequences.
  3. Reputation Damage: Exploited vulnerabilities can lead to customer loss, bad press, and legal penalties, impacting the organization’s financial stability and long-term vision.

Organizations are encouraged to take proactive security measures to mitigate these risks and strengthen their defenses against threats like ransomware. The video will next explore the NIST risk management framework for effective risk management.

Key Takeaways:

  • Ransomware is a serious threat with significant financial and operational consequences.
  • Understanding the web’s layers and their risks, especially the dark web, is crucial for cybersecurity.
  • Proactive security measures are essential to minimize the impact of threats, risks, and vulnerabilities.

  • Threats are anything that can potentially harm an organization’s information assets. This can include malware, phishing attacks, insider threats, and natural disasters.
  • Risks are the likelihood and impact of a threat being realized. For example, a phishing attack is a threat that has a high likelihood of being successful, but the impact of the attack may be low if the user does not click on the malicious link.
  • Vulnerabilities are weaknesses in an organization’s security posture that can be exploited by threats. For example, a misconfigured firewall is a vulnerability that can be exploited by an attacker to gain access to the organization’s network.

The key impacts of threats, risks, and vulnerabilities on organizational operations can be summarized as follows:

  • Financial impact: When an organization’s assets are compromised by a threat, such as the use of malware, the financial consequences can be significant. This can include costs associated with data recovery, lost productivity, and legal fees.
  • Identity theft: Organizations that store sensitive data, such as customerPII, are at risk of identity theft. This can lead to financial losses for the victims, as well as damage to their reputation.
  • Damage to an organization’s reputation: A data breach can damage an organization’s reputation and lead to loss of customers and business partners.
  • Operational disruption: A security incident can disrupt an organization’s operations, leading to lost revenue and productivity.

Organizations can take steps to prevent and mitigate the impact of threats, risks, and vulnerabilities. These steps include:

  • Implementing security controls: Security controls can help to protect an organization’s information assets from threats. Examples of security controls include firewalls, intrusion detection systems, and data encryption.
  • Educating employees: Employees should be trained on cybersecurity best practices, such as how to identify and avoid phishing attacks.
  • Backing up data: Regularly backing up data can help to minimize the impact of a data breach.
  • Having a plan for responding to security incidents: Organizations should have a plan in place for responding to security incidents. This plan should include steps for identifying and containing the incident, as well as steps for restoring operations.

By taking these steps, organizations can help to protect themselves from the financial, reputational, and operational damage that can be caused by threats, risks, and vulnerabilities.

Here are some additional resources that you may find helpful:

  • NIST Cybersecurity Framework: https://www.nist.gov/cyberframework
  • ISO/IEC 27001: https://www.iso.org/isoiec-27001-information-security.html
  • CIS Controls: https://www.cisecurity.org/controls/
  • SecurityScorecard: https://securityscorecard.com/

In this video, we’ll discuss an expensive
type of malware called ransomware. Then we’ll cover three key
impacts of threats, risks, and vulnerabilities on
organizational operations. Ransomware is a malicious attack
where threat actors encrypt an organization’s data then
demand payment to restore access. Once ransomware is
deployed by an attacker, it can freeze network systems,
leave devices unusable, and encrypt, or lock confidential
data, making devices inaccessible. The threat actor then demands a ransom
before providing a decryption key to allow organizations to return to
their normal business operations. Think of a decryption key as a password
provided to regain access to your data. Note that when ransom negotiations occur
or data is leaked by threat actors, these events can occur
through the dark web. While many people use search engines to
navigate to their social media accounts or to shop online, this is only a small
part of what the web really is. The web is actually an interlinked
network of online content that’s made up of three layers: the surface web,
the deep web, and the dark web. The surface web is the layer
that most people use. It contains content that can be
accessed using a web browser. The deep web generally requires
authorization to access it. An organization’s intranet is
an example of the deep web, since it can only be accessed by employees
or others who have been granted access. Lastly, the dark web can only be
accessed by using special software. The dark web generally carries a negative
connotation since it is the preferred web layer for criminals because
of the secrecy that it provides. Now, let’s discuss three key impacts
of threats, risks, and vulnerabilities. The first impact we’ll
discuss is financial impact. When an organization’s assets are
compromised by an attack, such as the use of malware, the financial consequences can
be significant for a variety of reasons. These can include interrupted
production and services, the cost to correct the issue, and
fines if assets are compromised because of non-compliance with laws and
regulations. The second impact is identity theft. Organizations must decide whether
to store private customer, employee, and outside vendor data, and
for how long. Storing any type of sensitive data
presents a risk to the organization. Sensitive data can include personally
identifiable information, or PII, which can be sold or
leaked through the dark web. That’s because the dark web provides
a sense of secrecy and threat actors may have the ability to sell data there
without facing legal consequences. The last impact we’ll discuss is damage
to an organization’s reputation. A solid customer base supports
an organization’s mission, vision, and financial goals. An exploited vulnerability can lead
customers to seek new business relationships with competitors or create bad press that causes permanent
damage to an organization’s reputation. The loss of customer data doesn’t only
affect an organization’s reputation and financials, it may also result
in legal penalties and fines. Organizations are strongly encouraged
to take proper security measures and follow certain protocols to prevent
the significant impact of threats, risks, and vulnerabilities. By using all the tools in their toolkit,
security teams are better prepared to handle an event
such as a ransomware attack. Coming up, we’ll cover the NIST
risk management framework’s seven steps for managing risk.

Video: Herbert: Manage threats, risks, and vulnerabilities

  • Herbert is a Security Engineer at Google.
  • He has been interested in security since high school, when he learned how to manipulate computers to do what he wanted.
  • His day-to-day work involves analyzing security risks and providing solutions to those risks.
  • A typical task for cybersecurity analysts is to analyze exceptions requests, which are requests for special access to a device or document.
  • One of the more common threats that cybersecurity analysts come across is misconfigurations, or when systems are not configured properly.
  • Another common threat is outdated systems and machines that need to be patched.
  • Working with a team or many teams is a huge part of the job of a cybersecurity analyst.
  • Herbert started his career working at a pizza joint, but now he is a Security Engineer at Google.

Here are some additional key points from the passage:

  • Herbert’s interest in security began in high school, when he and his friends would crack versions of video games like Halo.
  • He learned how to manipulate computers to do what he wanted, which gave him a foundation for his career in cybersecurity.
  • Herbert’s day-to-day work involves analyzing security risks and providing solutions to those risks. This can involve a variety of tasks, such as reviewing security logs, investigating incidents, and developing security policies.
  • One of the more common threats that cybersecurity analysts come across is misconfigurations. This can happen when systems are not configured properly, which can leave them vulnerable to attack.
  • Another common threat is outdated systems and machines that need to be patched. Outdated systems are often more vulnerable to attack, so it is important to keep them up to date with the latest security patches.
  • Working with a team or many teams is a huge part of the job of a cybersecurity analyst. This is because security is a complex issue that requires collaboration from many different teams, such as engineering, IT, and legal.
  • Herbert is an inspiration to many people who are interested in a career in cybersecurity. He started his career working at a pizza joint, but he was able to achieve his dream of becoming a Security Engineer at Google. This shows that it is possible to achieve your goals if you are passionate about your work and are willing to put in the hard work.

My name is Herbert and
I am a Security Engineer at Google. I think I’ve always been
interested in security, in high school our school gave
us these huge Dell laptops. There wasn’t a whole lot of
security within those computers. So, many of my friends would have cracked
versions of like video games like Halo, that’s really where I learned how to start
manipulating computers to kind of do what I want. I guess [LAUGH] my day to day consists
of analyzing security risks and providing solutions to those risks. A typical task for cybersecurity analysts would usually
be something like exceptions requests. Analyzing if someone needs to have
special access to a device or document based on the role that the person has or
the project that they’re working on. One of the more common threats that we
come across is misconfigurations or requesting access for
something that you don’t really need. For example,
I recently had a case where a vendor we were working with had changed
their OAuth scope requests. And basically that means that they were
requesting more permissions to use Google services than they had before in the past. We weren’t sure really how to go
about that because that wasn’t a situation we’ve come across before. So it’s still ongoing, but we’re working with partner teams to
kind of develop a solution for that. I think another thing that
we’ve seen is outdated systems, machines that need to be patched. That sounds like an IT issue, but it’s
also definitely a cybersecurity issue. Having outdated machines, not having
proper device management policies, working with a team or
many teams is a huge part of the job. In order to get really anything done, you
need to communicate with not just the team that you’re a part of,
but with other teams. Ten years ago I was working at
a pizza joint and ten years later, here I am, at Google as a Security Engineer. If I told my 16 year old
self that I would be here, I wouldn’t have believed myself,
but it is possible.

Video: NIST’s Risk Management Framework

Importance: The NIST RMF provides a structured approach to manage risks, threats, and vulnerabilities. Understanding this framework can strengthen your entry-level security analyst job candidacy.

Seven Steps:

  • Prepare: Monitor for risks and identify controls to mitigate them.
  • Categorize: Develop processes and tasks based on impacts to system confidentiality, integrity, and availability.
  • Select: Choose, customize, and document security controls (e.g., keeping playbooks updated).
  • Implement: Put security and privacy plans into action (e.g., updating password requirements).
  • Assess: Evaluate effectiveness of implemented controls and identify potential weaknesses.
  • Authorize: Take accountability for managing security and privacy risks (e.g., generating reports, setting milestones).
  • Monitor: Stay aware of system operations and ensure continuous risk management (e.g., assessing technical systems).

Entry-Level Role: You may not perform all steps (e.g., not setting procedures), but understanding them is crucial. You will likely:

  • Assist in monitoring risks and identifying controls.
  • Follow established processes for risk reduction.
  • Help manage and update security documentation.
  • Evaluate the effectiveness of controls and report potential weaknesses.
  • Assist in generating reports and setting project milestones.
  • Monitor system operations and assess their alignment with security goals.

Key Takeaway: While you may not lead, a solid understanding of the RMF and its steps will equip you to contribute effectively to risk management and enhance your job prospects.

The NIST RMF is a risk-based approach to managing information security. It is a framework that organizations can use to identify, assess, and mitigate risks to their information assets.

The RMF has seven steps:

  1. Prepare. This step involves activities that are necessary to manage risk before a breach occurs. This includes developing a risk management plan, identifying assets, and assessing threats and vulnerabilities.
  2. Categorize. This step involves identifying the assets that need to be protected and understanding the risks to those assets. This includes classifying assets and determining their impact on the organization if they were compromised.
  3. Select. This step involves choosing the controls that will be used to mitigate the risks to the organization’s assets. This includes identifying, evaluating, and selecting appropriate security controls.
  4. Implement. This step involves putting the selected controls into place. This includes developing and implementing security policies, procedures, and configurations.
  5. Assess. This step involves evaluating whether the implemented controls are effective in mitigating the risks to the organization’s assets. This includes testing and monitoring the controls to ensure that they are effective.
  6. Authorize. This step involves formally approving the use of the selected controls. This includes documenting the authorization decision and ensuring that the controls are in compliance with all applicable laws and regulations.
  7. Monitor. This step involves continuously monitoring the effectiveness of the controls and making necessary changes as needed. This includes reviewing and updating security policies and procedures, as well as conducting periodic security assessments.

The NIST RMF is a cyclical process that should be continuously updated as the organization’s risk profile changes. It is a valuable tool for organizations of all sizes to help them protect their assets and information.

Here are some of the benefits of using the NIST RMF:

  • It can help organizations to identify and assess risks to their information assets.
  • It can help organizations to select and implement appropriate security controls.
  • It can help organizations to monitor the effectiveness of their security controls.
  • It can help organizations to comply with applicable laws and regulations.

If you are interested in learning more about the NIST RMF, there are many resources available online. The NIST website has a comprehensive guide to the framework, and there are also a number of training courses and workshops available.

As you might remember from
earlier in the program, the National Institute of
Standards and Technology, NIST, provides many
frameworks that are used by security professionals to manage risks, threats, and
vulnerabilities. In this video, we’re
going to focus on NIST’s Risk Management
Framework or RMF. As an entry-level analyst, you may not engage in
all of these steps, but it’s important to be
familiar with this framework. Having a solid
foundational understanding of how to mitigate
and manage risks can set yourself apart from
other candidates as you begin your job search in
the field of security. There are seven steps in the
RMF: prepare, categorize, select, implement, assess,
authorize, and monitor. Let’s start with
Step one, prepare. Prepare refers to activities
that are necessary to manage security and privacy risks
before a breach occurs. As an entry-level analyst, you’ll likely use this step
to monitor for risks and identify controls that can be
used to reduce those risks. Step two is categorize, which is used to develop risk management
processes and tasks. Security professionals then
use those processes and develop tasks by thinking
about how the confidentiality, integrity, and availability of systems and information
can be impacted by risk. As an entry-level analyst, you’ll need to be able
to understand how to follow the
processes established by your organization
to reduce risks to critical assets, such as
private customer information. Step three is select. Select means to
choose, customize, and capture documentation of the controls that
protect an organization. An example of the select
step would be keeping a playbook up-to-date
or helping to manage other documentation
that allows you and your team to address
issues more efficiently. Step four is to implement security and privacy plans
for the organization. Having good plans in
place is essential for minimizing the impact of
ongoing security risks. For example, if you
notice a pattern of employees constantly
needing password resets, implementing a change to password requirements may
help solve this issue. Step five is assess. Assess means to determine if established controls are
implemented correctly. An organization always wants to operate as
efficiently as possible. So it’s essential to
take the time to analyze whether the
implemented protocols, procedures, and
controls that are in place are meeting
organizational needs. During this step,
analysts identify potential weaknesses
and determine whether the
organization’s tools, procedures, controls, and protocols should be changed to better
manage potential risks. Step six is authorize. Authorize means being
accountable for the security and
privacy risks that may exist in an organization. As an analyst, the authorization step could
involve generating reports, developing plans of action, and establishing project
milestones that are aligned to your organization’s
security goals. Step seven is monitor. Monitor means to be aware of
how systems are operating. Assessing and maintaining
technical operations are tasks that analysts
complete daily. Part of maintaining
a low level of risk for an organization is knowing how the
current systems support the organization’s
security goals. If the systems in place
don’t meet those goals, changes may be needed. Although it may not be your job to establish
these procedures, you will need to make sure they’re working as
intended so that risks to the organization itself, and the people it
serves, are minimized.

Reading: Manage common threats, risks, and vulnerabilities

Reading

Summary

Practice Quiz: Test your knowledge: Navigate threats, risks, and vulnerabilities

What is a vulnerability?

Fill in the blank: Information protected by regulations or laws is a _. If it is compromised, there is likely to be a severe negative impact on an organization’s finances, operations, or reputation.

What are the key impacts of threats, risks, and vulnerabilities? Select three answers.

Fill in the blank: The steps in the Risk Management Framework (RMF) are prepare, _, select, implement, assess, authorize, and monitor.

Review: Security domains


Video: Wrap-up

In the first section of the security analyst course, you have learned about:

  • The eight security domains of the CISSP
  • Threats, risks, and vulnerabilities, including ransomware and the three layers of the web
  • The seven steps of the NIST Risk Management Framework (RMF)

In upcoming videos, you will learn about common tools used by entry-level security analysts and how to analyze data generated by those tools to identify risks, threats, or vulnerabilities. You will also learn how to use a playbook to respond to incidents.

You’ve now completed the first
section of this course! Let’s review what we’ve discussed so far. We started out by exploring the focus
of CISSP’s eight security domains. Then, we discussed threats, risks, and vulnerabilities, and
how they can impact organizations. This included a close
examination of ransomware and an introduction to the three
layers of the web. Finally, we focused on seven
steps of the NIST Risk Management Framework, also called the RMF. You did a fantastic job adding new
knowledge to your security analyst toolkit. In upcoming videos,
we’ll go into more detail about some common tools used by
entry-level security analysts. Then, you’ll have an opportunity to
analyze data generated by those tools to identify risks,
threats, or vulnerabilities. You’ll also have a chance to use
a playbook to respond to incidents. That’s all for now. Keep up the great work!

Reading: Glossary terms from module 1

Reading

Quiz: Module 1 challenge

Fill in the blank: Security posture refers to an organization’s ability to react to change and manage its defense of _ and critical assets.

Which of the following examples are key focus areas of the security and risk management domain? Select three answers.

What is the goal of business continuity?

What security concept involves all individuals in an organization taking an active role in reducing risk and maintaining security?

A security analyst ensures that employees are able to review only the data they need to do their jobs. Which security domain does this scenario relate to?

Which of the following activities may be part of establishing security controls? Select three answers.

When working in the software development security domain, which of the following are tasks that security team members may complete during various phases of the software development lifecycle? Select three answers.

Which of the following statements accurately describe risk? Select all that apply.

A business experiences an attack. As a result, its critical business operations are interrupted and it faces regulatory fines. What type of consequence does this scenario describe?

Fill in the blank: In the Risk Management Framework (RMF), the _ step involves knowing how systems are operating and assessing whether or not those systems support the organization’s security goals.