You will gain understanding of the CISSP’s eight security domains. Then, you’ll learn about primary threats, risks, and vulnerabilities to business operations. In addition, you’ll explore the National Institute of Standards and Technology’s (NIST) Risk Management Framework (RMF) and the steps of risk management.
Learning Objectives
- Recognize and explain the focus of CISSP’s eight security domains.
- Identify and define the primary threats, risks, and vulnerabilities to business operations.
- Describe the threats, risks, and vulnerabilities that entry-level security analysts are most focused on.
- Determine how threats, risks, and vulnerabilities impact business operations.
- Identify the steps of risk management.
- Get started with the course
- More about the CISSP security domains
- Navigate threats, risks, and vulnerabilities
- Video: Threats, risks, and vulnerabilities
- Video: Key impacts of threats, risks, and vulnerabilities
- Video: Herbert: Manage threats, risks, and vulnerabilities
- Video: NIST’s Risk Management Framework
- Reading: Manage common threats, risks, and vulnerabilities
- Practice Quiz: Test your knowledge: Navigate threats, risks, and vulnerabilities
- Review: Security domains
Get started with the course
Video: Introduction to Course 2
In this course, you will learn about the eight security domains of the CISSP certification, security frameworks and controls, security audits, and basic security tools. You will also have a chance to explore how to use security tools to protect assets and data from threats, risks, and vulnerabilities. Securing an organization and its assets is an important step in maintaining business operations.
My name is Ashley, and I’m
a Customer Engineering Enablement Lead for Security Operation Sales at Google. I’m excited to be your instructor for
this course. Let’s start by quickly reviewing
what we’ve covered so far. Earlier, we defined security and explored some common job responsibilities
for entry-level analysts. We also discussed core skills and
knowledge that analysts need to develop. Then, we shared some key events like
the LoveLetter and Morris attacks that led to the development and
ongoing evolution of the security field. We also introduced you to frameworks,
controls, and the CIA triad, which are all
used to reduce risk. In this course, we’ll discuss the focus
of Certified Information Systems Security Professional’s, or CISSP’s,
eight security domains. We’ll also cover security frameworks and
controls in more detail, with a focus on NIST’s Risk
Management Framework. Additionally, we’ll explore
security audits, including common elements of internal audits. Then, we’ll introduce some
basic security tools, and you’ll have a chance to explore how to
use security tools to protect assets and data from threats, risks,
and vulnerabilities. Securing an organization and
its assets from threats, risks, and vulnerabilities is an important step
in maintaining business operations. In my experience as a security analyst,
I helped respond to a severe breach that cost
the organization nearly $250,000. So, I hope you’re feeling motivated
to continue your security journey. I know I’m excited. Let’s get started!
Reading: Course 2 overview
More about the CISSP security domains
Video: Welcome to module 1
- The world of cybersecurity is vast and complex.
- This program will teach you the knowledge, skills, and tools you need to navigate this world.
- The first few videos will cover the focus of the eight security domains in the CISSP certification.
- These domains are:
- Security and risk management
- Asset security
- Security architecture and engineering
- Communication and network security
- Identity and access management
- Security assessment and testing
- Security operations
- Software development security
- Risk management
- The next few videos will discuss threats, risks, and vulnerabilities in more detail.
- They will also introduce you to the three layers of the web and the different types of attacks.
- Finally, the program will teach you how to manage risks using the NIST RMF.
- By learning these topics, you will be able to mitigate and manage the risks and threats that organizations face on a daily basis.
Here is a more detailed summary of the text:
- The first paragraph introduces the topic of cybersecurity and explains why it is important to have the knowledge and skills to navigate this complex field.
- The second paragraph provides an overview of the eight security domains in the CISSP certification. These domains cover a wide range of topics, from security and risk management to software development security.
- The third paragraph discusses threats, risks, and vulnerabilities. These are the three pillars of cybersecurity, and understanding them is essential for mitigating and managing risk.
- The fourth paragraph introduces the three layers of the web. These layers are the physical layer, the network layer, and the application layer. Each layer has its own unique security challenges.
- The fifth paragraph discusses the different types of attacks. These attacks can be classified into many different categories, such as denial-of-service attacks, malware attacks, and social engineering attacks.
- The sixth paragraph explains how to manage risks using the NIST RMF. The NIST RMF is a framework that organizations can use to identify, assess, and mitigate risks.
- The seventh paragraph concludes by stating that by learning the topics covered in this program, you will be able to mitigate and manage the risks and threats that organizations face on a daily basis.
Video: Explore the CISSP security domains, Part 1
- The first four domains of the CISSP certification are:
- Security and risk management
- Asset security
- Security architecture and engineering
- Communication and network security
- Security and risk management is focused on defining security goals and objectives, risk mitigation, compliance, business continuity, and legal regulations.
- Asset security is focused on securing digital and physical assets, as well as the storage, maintenance, retention, and destruction of data.
- Security architecture and engineering is focused on optimizing data security by ensuring effective tools, systems, and processes are in place to protect an organization’s assets and data.
- Communication and network security is focused on managing and securing physical networks and wireless communications.
Here is a more detailed summary of each domain:
- Security and risk management: This domain is focused on understanding the risks to an organization’s assets and data, and developing and implementing controls to mitigate those risks.
- Asset security: This domain is focused on protecting an organization’s assets, both physical and digital. This includes securing data, devices, and infrastructure.
- Security architecture and engineering: This domain is focused on designing and implementing security solutions that protect an organization’s assets and data. This includes designing secure systems, implementing security controls, and managing security risks.
- Communication and network security: This domain is focused on securing an organization’s communications and networks. This includes protecting data in transit, securing wireless networks, and managing network security risks.
The next four domains of the CISSP certification are:
- Identity and access management (IAM)
- Security assessment and testing
- Security operations
- Software development security
I will discuss these domains in a separate summary.
Introduction
The CISSP (Certified Information Systems Security Professional) is a globally recognized certification that validates the knowledge and skills of security professionals. The CISSP certification covers eight domains of security knowledge, which are:
- Security and risk management
- Asset security
- Security architecture and engineering
- Communication and network security
- Identity and access management (IAM)
- Security assessment and testing
- Security operations
- Software development security
- Risk management
This tutorial will explore each of the CISSP security domains in more detail.
Security and risk management
The security and risk management domain is focused on understanding the risks to an organization’s assets and data, and developing and implementing controls to mitigate those risks. This domain includes topics such as:
- Risk identification and assessment
- Risk mitigation strategies
- Security controls
- Compliance
- Business continuity planning
Asset security
The asset security domain is focused on protecting an organization’s assets, both physical and digital. This includes securing data, devices, and infrastructure. This domain includes topics such as:
- Data classification
- Data security
- Device security
- Infrastructure security
- Physical security
Security architecture and engineering
The security architecture and engineering domain is focused on designing and implementing security solutions that protect an organization’s assets and data. This domain includes topics such as:
- Security design principles
- Security architecture
- Security engineering
- Security implementation
Communication and network security
The communication and network security domain is focused on securing an organization’s communications and networks. This includes protecting data in transit, securing wireless networks, and managing network security risks. This domain includes topics such as:
- Network security
- Wireless security
- Data in transit security
- Network security controls
Identity and access management (IAM)
The identity and access management (IAM) domain is focused on managing who has access to what resources. This domain includes topics such as:
- Identity management
- Access management
- Privileged access management
- Identity governance and administration (IGA)
Security assessment and testing
The security assessment and testing domain is focused on evaluating the security of an organization’s systems and networks. This domain includes topics such as:
- Vulnerability scanning
- Penetration testing
- Social engineering testing
- Red teaming
Security operations
The security operations domain is focused on monitoring and responding to security incidents. This domain includes topics such as:
- Security incident response
- Security monitoring
- Security event management (SEM)
- Security information and event management (SIEM)
Software development security
The software development security domain is focused on securing software development processes. This domain includes topics such as:
- Secure coding practices
- Software security testing
- DevSecOps
Conclusion
This tutorial has explored each of the CISSP security domains in more detail. The CISSP certification is a valuable credential for security professionals who want to demonstrate their knowledge and skills in a wide range of security domains.
If you are interested in learning more about the CISSP certification, I recommend visiting the ISC2 website: https://www.isc2.org/Certifications/CISSP.
Welcome back! You might remember from course one that
there are eight security domains, or categories, identified by CISSP. Security teams use them to
organize daily tasks and identify gaps in security that could
cause negative consequences for an organization, and
to establish their security posture. Security posture refers to
an organization’s ability to manage its defense of critical assets and
data and react to change. In this video, we’ll discuss
the focus of the first four domains: security and risk management,
asset security, security architecture and engineering,
and communication and network security. The first domain is security and
risk management. There are several areas of focus for
this domain: defining security goals and
objectives, risk mitigation, compliance, business continuity, and
legal regulations. Let’s discuss each area
of focus in more detail. By defining security goals and objectives, organizations can reduce
risks to critical assets and data like PII, or
personally identifiable information. Risk mitigation means having
the right procedures and rules in place to quickly reduce
the impact of a risk like a breach. Compliance is the primary method used
to develop an organization’s internal security policies, regulatory
requirements, and independent standards. Business continuity relates to
an organization’s ability to maintain their everyday productivity by
establishing risk disaster recovery plans. And finally,
while laws related to security and risk management are different worldwide,
the overall goals are similar. As a security professional, this means
following rules and expectations for ethical behavior to minimize negligence,
abuse, or fraud. The next domain is asset security. The asset security domain is focused on
securing digital and physical assets. It’s also related to the storage,
maintenance, retention, and destruction of data. This means that assets such as PII or
SPII should be securely handled and protected, whether stored on a computer,
transferred over a network like the internet, or
even physically collected. Organizations also need to have
policies and procedures that ensure data is properly stored,
maintained, retained, and destroyed. Knowing what data you have and who has
access to it is necessary for having a strong security posture that mitigates
risk to critical assets and data. Previously, we provided a few examples
that touched on the disposal of data. For example, an organization might
have you, as a security analyst, oversee the destruction of hard drives to make
sure that they’re properly disposed of. This ensures that private data stored
on those drives can’t be accessed by threat actors. The third domain is security
architecture and engineering. This domain is focused on optimizing data
security by ensuring effective tools, systems, and processes are in place to
protect an organization’s assets and data. One of the core concepts of secure design
architecture is shared responsibility. Shared responsibility means
that all individuals within an organization take an active
role in lowering risk and maintaining both physical and
virtual security. By having policies that
encourage users to recognize and report security concerns, many issues
can be handled quickly and effectively. The fourth domain is communication and
network security, which is mainly focused on managing and securing physical
networks and wireless communications. Secure networks keep an organization’s
data and communications safe whether on-site, or in the cloud, or
when connecting to services remotely. For example, employees working
remotely in public spaces need to be protected from vulnerabilities
that can occur when they use insecure bluetooth connections or
public wifi hotspots. By having security team members remove
access to those types of communication channels at the organizational level,
employees may be discouraged from practicing insecure behavior that
could be exploited by threat actors. Now that we’ve reviewed the focus
of our first four domains, let’s discuss the last four domains.
The world of security,
which we also refer to as cybersecurity throughout
this program, is vast. So making sure that you have
the knowledge, skills, and tools to successfully navigate
this world is why we’re here. In the following videos, you’ll learn about the focus of
CISSP’s eight security domains. Then, we’ll discuss threats, risks,
and vulnerabilities in more detail. We’ll also introduce you to
the three layers of the web and share some examples to help you understand
the different types of attacks that we’ll discuss throughout the program. Finally, we’ll examine how to manage
risks by using the National Institute of Standards and Technology’s Risk Management
Framework, known as the NIST RMF. Because these topics and related technical skills are considered
core knowledge in the security field, continuing to build your understanding
of them will help you mitigate and manage the risks and threats that
organizations face on a daily basis. In the next video, we’ll further
discuss the focus of the eight security domains introduced in the first course.
Video: Explore the CISSP security domains, Part 2
- The last four domains of the CISSP certification are:
- Identity and access management (IAM)
- Security assessment and testing
- Security operations
- Software development security
- Identity and access management (IAM) is focused on managing who has access to what resources.
- Security assessment and testing is focused on evaluating the security of an organization’s systems and networks.
- Security operations is focused on monitoring and responding to security incidents.
- Software development security is focused on securing software development processes.
Here is a more detailed summary of each domain:
- Identity and access management (IAM): This domain is focused on ensuring that only authorized users have access to an organization’s systems and data. This includes implementing strong authentication methods, managing user permissions, and monitoring user activity.
- Security assessment and testing: This domain is focused on identifying and mitigating security risks. This includes conducting vulnerability scans, penetration testing, and social engineering assessments.
- Security operations: This domain is focused on monitoring and responding to security incidents. This includes detecting and responding to malicious activity, triaging incidents, and restoring systems and data.
- Software development security: This domain is focused on securing the software development process. This includes implementing secure coding practices, testing for security vulnerabilities, and managing security risks.
In this video,
we’ll cover the last four domains: identity and access management,
security assessment and testing, security operations, and
software development security. The fifth domain is identity and
access management, or IAM. And it’s focused on access and
authorization to keep data secure by making sure users follow established
policies to control and manage assets. As an entry-level analyst, it’s essential
to keep an organization’s systems and data as secure as possible by ensuring user
access is limited to what employees need. Basically, the goal of IAM is to reduce
the overall risk to systems and data. For example, if everyone at a company
is using the same administrator login, there is no way to track who
has access to what data. In the event of a breach, separating valid user activity from
the threat actor would be impossible. There are four main components to IAM. Identification is when a user verifies
who they are by providing a user name, an access card, or
biometric data such as a fingerprint. Authentication is the verification
process to prove a person’s identity, such as entering a password or
PIN. Authorization takes place after a user’s
identity has been confirmed and relates to their level of access, which
depends on the role in the organization. Accountability refers to monitoring and
recording user actions, like login attempts, to prove systems and
data are used properly. The sixth security domain is
security assessment and testing. This domain focuses on conducting
security control testing, collecting and analyzing data, and
conducting security audits to monitor for risks, threats, and vulnerabilities. Security control testing can help
an organization identify new and better ways to mitigate threats,
risks, and vulnerabilities. This involves examining organizational
goals and objectives, and evaluating if the controls being used
actually achieve those goals. Collecting and analyzing security data
regularly also helps prevent threats and risks to the organization. Analysts might use security control
testing evaluations and security assessment reports to improve existing
controls or implement new controls. An example of implementing a new control
could be requiring the use of multi-factor authentication to better protect the
organization from potential threats and risks. Next, let’s discuss security operations. The security operations domain is
focused on conducting investigations and implementing preventative measures. Investigations begin once a security
incident has been identified. This process requires a heightened
sense of urgency in order to minimize potential risks to the organization. If there is an active attack,
mitigating the attack and preventing it from escalating further
is essential for ensuring that private information
is protected from threat actors. Once the threat has been neutralized,
the collection of digital and physical evidence to conduct
a forensic investigation will begin. A digital forensic investigation
must take place to identify when, how, and
why the breach occurred. This helps security teams determine
areas for improvement and preventative measures that can be
taken to mitigate future attacks. The eighth and final security domain
is software development security. This domain focuses on using
secure coding practices. As you may remember,
secure coding practices are recommended guidelines that are used to create
secure applications and services. The software development lifecycle is
an efficient process used by teams to quickly build software products and
features. In this process, security
is an additional step. By ensuring that each phase of the
software development lifecycle undergoes security reviews, security can be fully
integrated into the software product. For example, performing a secure
design review during the design phase, secure code reviews during
the development and testing phases, and penetration testing during
the deployment and implementation phase ensures that security is embedded into
the software product at every step. This keeps software secure and
sensitive data protected, and mitigates unnecessary
risk to an organization. Being familiar with these domains can
help you better understand how they’re used to improve the overall
security of an organization and the critical role security teams play. Next, we’ll discuss security threats,
risks, and vulnerabilities, including ransomware, and introduce
you to the three layers of the web.
Reading: Security domains cybersecurity analysts need to know
Reading
As an analyst, you can explore various areas of cybersecurity that interest you. One way to explore those areas is by understanding different security domains and how they’re used to organize the work of security professionals. In this reading you will learn more about CISSP’s eight security domains and how they relate to the work you’ll do as a security analyst.
Domain one: Security and risk management
All organizations must develop their security posture. Security posture is an organization’s ability to manage its defense of critical assets and data and react to change. Elements of the security and risk management domain that impact an organization’s security posture include:
- Security goals and objectives
- Risk mitigation processes
- Compliance
- Business continuity plans
- Legal regulations
- Professional and organizational ethics
Information security, or InfoSec, is also related to this domain and refers to a set of processes established to secure information. An organization may use playbooks and implement training as a part of their security and risk management program, based on their needs and perceived risk. There are many InfoSec design processes, such as:
- Incident response
- Vulnerability management
- Application security
- Cloud security
- Infrastructure security
As an example, a security team may need to alter how personally identifiable information (PII) is treated in order to adhere to the European Union’s General Data Protection Regulation (GDPR).
Domain two: Asset security
Asset security involves managing the cybersecurity processes of organizational assets, including the storage, maintenance, retention, and destruction of physical and virtual data. Because the loss or theft of assets can expose an organization and increase the level of risk, keeping track of assets and the data they hold is essential. Conducting a security impact analysis, establishing a recovery plan, and managing data exposure will depend on the level of risk associated with each asset. Security analysts may need to store, maintain, and retain data by creating backups to ensure they are able to restore the environment if a security incident places the organization’s data at risk.
Domain three: Security architecture and engineering
This domain focuses on managing data security. Ensuring effective tools, systems, and processes are in place helps protect an organization’s assets and data. Security architects and engineers create these processes.
One important aspect of this domain is the concept of shared responsibility. Shared responsibility means all individuals involved take an active role in lowering risk during the design of a security system. Additional design principles related to this domain, which are discussed later in the program, include:
- Threat modeling
- Least privilege
- Defense in depth
- Fail securely
- Separation of duties
- Keep it simple
- Zero trust
- Trust but verify
An example of managing data is the use of a security information and event management (SIEM) tool to monitor for flags related to unusual login or user activity that could indicate a threat actor is attempting to access private data.
Domain four: Communication and network security
This domain focuses on managing and securing physical networks and wireless communications. This includes on-site, remote, and cloud communications.
Organizations with remote, hybrid, and on-site work environments must ensure data remains secure, but managing external connections to make certain that remote workers are securely accessing an organization’s networks is a challenge. Designing network security controls—such as restricted network access—can help protect users and ensure an organization’s network remains secure when employees travel or work outside of the main office.
Domain five: Identity and access management
The identity and access management (IAM) domain focuses on keeping data secure. It does this by ensuring user identities are trusted and authenticated and that access to physical and logical assets is authorized. This helps prevent unauthorized users, while allowing authorized users to perform their tasks.
Essentially, IAM uses what is referred to as the principle of least privilege, which is the concept of granting only the minimal access and authorization required to complete a task. As an example, a cybersecurity analyst might be asked to ensure that customer service representatives can only view the private data of a customer, such as their phone number, while working to resolve the customer’s issue; then remove access when the customer’s issue is resolved.
Domain six: Security assessment and testing
The security assessment and testing domain focuses on identifying and mitigating risks, threats, and vulnerabilities. Security assessments help organizations determine whether their internal systems are secure or at risk. Organizations might employ penetration testers, often referred to as “pen testers,” to find vulnerabilities that could be exploited by a threat actor.
This domain suggests that organizations conduct security control testing, as well as collect and analyze data. Additionally, it emphasizes the importance of conducting security audits to monitor for and reduce the probability of a data breach. To contribute to these types of tasks, cybersecurity professionals may be tasked with auditing user permissions to validate that users have the correct levels of access to internal systems.
Domain seven: Security operations
The security operations domain focuses on the investigation of a potential data breach and the implementation of preventative measures after a security incident has occurred. This includes using strategies, processes, and tools such as:
- Training and awareness
- Reporting and documentation
- Intrusion detection and prevention
- SIEM tools
- Log management
- Incident management
- Playbooks
- Post-breach forensics
- Reflecting on lessons learned
The cybersecurity professionals involved in this domain work as a team to manage, prevent, and investigate threats, risks, and vulnerabilities. These individuals are trained to handle active attacks, such as large amounts of data being accessed from an organization’s internal network, outside of normal working hours. Once a threat is identified, the team works diligently to keep private data and information safe from threat actors.
Domain eight: Software development security
The software development security domain is focused on using secure programming practices and guidelines to create secure applications. Having secure applications helps deliver secure and reliable services, which helps protect organizations and their users.
Security must be incorporated into each element of the software development life cycle, from design and development to testing and release. To achieve security, the software development process must have security in mind at each step. Security cannot be an afterthought.
Performing application security tests can help ensure vulnerabilities are identified and mitigated accordingly. Having a system in place to test the programming conventions, software executables, and security measures embedded in the software is necessary. Having quality assurance and pen tester professionals ensure the software has met security and performance standards is also an essential part of the software development process. For example, an entry-level analyst working for a pharmaceutical company might be asked to make sure encryption is properly configured for a new medical device that will store private patient data.
Key takeaways
In this reading, you learned more about the focus areas of the eight CISSP security domains. In addition, you learned about InfoSec and the principle of least privilege. Being familiar with these security domains and related concepts will help you gain insight into the field of cybersecurity.
Video: Ashley: My path to cybersecurity
Ashley is a CE Enablement Lead for SecOps sales at Google. She grew up with an interest in tech, but her path to a career in cybersecurity was not linear. She joined the army after high school and then worked in retail and other non-tech jobs before returning to school to study IT. She eventually landed her first security analyst job in 2017.
Ashley emphasizes the importance of soft skills in a cybersecurity career. She says that you need to be able to work with a team, communicate effectively, and solve problems. You also don’t necessarily need to be a software engineer to work in cybersecurity. There are many different roles in the field, and you can find one that fits your skills and interests.
Here are some of the key points from Ashley’s story:
- It’s okay if your path to a career in cybersecurity is not linear.
- Soft skills are just as important as technical skills in cybersecurity.
- There are many different roles in cybersecurity, so you can find one that fits your skills and interests.
- Don’t get discouraged if you don’t get your dream job right away. Keep learning and growing, and eventually you will find the right opportunity.
My name is Ashley and
my role at Google is CE Enablement Lead
for SecOps sales. All that means is I
help set up training for customer engineers
that support our products. Grew up with a computer,
loved the Internet. I have one of the
earliest AOL screen names in history and I’m
very proud of that. My dad is an engineer and I think there was always
an interest in tech. But when I got out
of high school, there wasn’t a clear
path to get there. It wasn’t a linear path at all. I was a knucklehead growing up. I gave up in 10th grade
and I just didn’t care for a long time
and I was getting in trouble a lot and
I pretty much told myself if I don’t join the
military and get out of here, I will probably not be here in about 2-3 years if I
continue down this path. I joined the army right out of high school, graduated in June, and four days later I was at
bootcamp at Fort Jackson, South Carolina as
a trumpet player, believe it or not, I
come back and had to get a job and was not even tracking on tech jobs
or anything like that. I was pulling in carts
for a big hardware store, selling video games, retail, box slinger for a
freight company. All of that stuff has happened before I even figured out
that tech was an option. The military was kind
enough to retrain me in IT, and that’s kind of how I actually got the official first wave of schooling to be
able to actually say, hey, I have the skills to at
least be a PC technician. I went back to community
college and I actually did find a cybersecurity
associates degree program, worked on some certifications. I went to my first DEFCON, which is a big
hacking conference, and that set off a light bulb, I think to actually get that clarity on what the
path could look like. I landed my first
security analyst job back in 2017 and I went to a Veterans Training
Program at my last company that was free for
vets and ended up getting hired out
of the training. I was with that company for almost five years before
I came to Google. If you’re new and
you’re just coming in, you have to know how
to work with a team. I think a lot of us learned that in customer service settings. Some of the skills I
learned working in retail, dealing with hard customers, learning how to even talk
to people or diffuse a situation if people
are upset about things, just learning how
to talk to people. In IT we need that. It’s no longer just the
tech skills we need, the more T-shaped which
they’re soft skills, there’s people skills, and
there’s technical skills. You have to have good
analysis skills, and again, it doesn’t even have to be technical analysis, if you can read a book and pick apart the rhetorical
devices of that story, you can do analysis work. I didn’t have to be a software engineer to
work in this field. For many of us, there’s
like a math fear, programming is a big hurdle, but we work with people, we work with processes, and you don’t
necessarily need to have that coding knowledge to
understand people or processes. There’s so many
ways to break in, so do not get discouraged
and don’t be scared to think outside of the box to
get your foot in the door.
Practice Quiz: Test your knowledge: More about the CISSP security domains
Fill in the blank: The _ domain is focused on access and authorization to keep data secure by making sure that users follow established policies to control and manage assets.
identity and access management
The identity and access management domain is focused on access and authorization to keep data secure by making sure that users follow established policies to control and manage assets.
AI assistant
The identity and access management (IAM) domain is focused on access and authorization to keep data secure by making sure that users follow established policies to control and manage assets.
IAM includes the following four main components:
- Identification: This is the process of verifying a user’s identity. This can be done through a variety of methods, such as usernames, passwords, or biometrics.
- Authentication: This is the process of confirming a user’s identity after they have been identified. This can be done through a variety of methods, such as passwords, PINs, or multi-factor authentication.
- Authorization: This is the process of granting users access to specific resources. This is based on the user’s identity and role within the organization.
- Accountability: This is the process of tracking user activity to ensure that resources are used properly.
IAM is a critical part of any organization’s security posture. By implementing strong IAM practices, organizations can reduce the risk of unauthorized access to sensitive data.
What is the focus of the security and risk management domain?
Define security goals and objectives, risk mitigation, compliance, business continuity, and regulations
The focus of the security and risk management domain is defining security goals and objectives, risk mitigation, compliance, business continuity, and regulations.
AI assistant
The focus of the security and risk management domain is to define security goals and objectives, risk mitigation, compliance, business continuity, and regulations. This domain covers a wide range of topics, including:
- Risk identification and assessment: This involves identifying and understanding the risks to an organization’s assets and data.
- Risk mitigation: This involves developing and implementing controls to reduce the likelihood and impact of risks.
- Compliance: This involves ensuring that the organization complies with relevant laws and regulations.
- Business continuity: This involves planning for and mitigating the impact of disruptions to the organization’s operations.
- Legal and regulatory issues: This involves understanding and complying with the legal and regulatory requirements that apply to the organization.
The security and risk management domain is a critical part of any organization’s security posture. By understanding and managing risks, organizations can reduce the likelihood of a security incident and protect their assets and data.
The other options you have mentioned are also important, but they are not the focus of the security and risk management domain.
- Managing and securing wireless communications is the focus of the communication and network security domain.
- Optimizing data security by ensuring effective processes are in place is the focus of the asset security domain.
- Securing physical networks and wireless communications is the focus of the communication and network security domain.
In which domain would a security professional conduct security control testing; collect and analyze data; and perform security audits to monitor for risks, threats, and vulnerabilities?
Security assessment and testing
In the security assessment and testing domain, a security professional conducts security control testing; collects and analyzes data; and performs security audits to monitor for risks, threats, and vulnerabilities.
AI assistant
A security professional would conduct security control testing, collect and analyze data, and perform security audits to monitor for risks, threats, and vulnerabilities in the security assessment and testing (SAT) domain.
The SAT domain is focused on evaluating the security of an organization’s systems and networks. This includes conducting vulnerability scans, penetration testing, and social engineering assessments.
The specific tasks you mentioned are all part of the SAT domain:
- Security control testing: This involves testing the effectiveness of security controls, such as firewalls and intrusion detection systems.
- Data collection and analysis: This involves collecting and analyzing data about security threats, risks, and vulnerabilities.
- Security audits: This involves conducting audits of the organization’s security controls and procedures to ensure that they are effective.
The other domains you mentioned are also important, but they are not focused on evaluating the security of an organization’s systems and networks.
- Security architecture and engineering (SA&E) is focused on designing and implementing security solutions.
- Identity and access management (IAM) is focused on managing who has access to what resources.
- Communication and network engineering (CNE) is focused on securing communication and network systems.
Fill in the blank: The _ domain concerns conducting investigations and implementing preventive measures.
security operations
The security operations domain concerns conducting investigations and implementing preventative measures.
AI assistant
The security operations (SecOps) domain concerns conducting investigations and implementing preventive measures. This domain is focused on monitoring and responding to security incidents. This includes detecting and responding to malicious activity, triaging incidents, and restoring systems and data.
SecOps also includes the following responsibilities:
- Incident response: This involves responding to security incidents, such as data breaches and ransomware attacks.
- Forensic analysis: This involves collecting and analyzing evidence from security incidents to identify the cause and scope of the incident.
- Prevention: This involves implementing measures to prevent security incidents, such as vulnerability scanning and intrusion detection.
The other domains you mentioned are also important, but they are not focused on conducting investigations and implementing preventive measures.
- Asset security is focused on protecting an organization’s assets, both physical and digital.
- Communications and networking engineering is focused on securing communication and network systems.
- Software development security is focused on securing software development processes.
Navigate threats, risks, and vulnerabilities
Video: Threats, risks, and vulnerabilities
As an entry-level security analyst, understanding the intricate dance between threats, risks, and vulnerabilities is your foundational armor. Imagine them as a perilous three-headed dragon you must tame to protect your organization’s precious assets. Let’s dissect each head and equip you with the tools to combat them:
The Cunning Threat:
- Think of threats as malicious actors or events lurking in the shadows, waiting to pounce. They come in various forms, from sophisticated cyberattacks like ransomware to low-tech social engineering ploys like phishing emails. Each threat carries a unique bite, aiming to steal sensitive data, disrupt operations, or damage your organization’s reputation.
- Example: A disgruntled employee with access to critical customer data poses a significant threat of insider data breach.
The Calculating Risk:
- Risk isn’t the threat itself, but the likelihood of it materializing and the potential damage it can inflict. It’s like estimating the dragon’s fiery breath before facing it. By analyzing threats and vulnerabilities, you assess the probability of an attack and the severity of its impact.
- Example: An outdated database system with weak access controls presents a high risk of a data breach, potentially exposing financial information and impacting customer trust.
The Exploitable Vulnerability:
- Think of vulnerabilities as cracks in your organization’s armor, inviting threats to slip through. These weaknesses can be technical (outdated software, buggy applications) or human (lack of security awareness, weak passwords). Each vulnerability represents a potential chink in your defenses, waiting to be exploited.
- Example: Employees falling for phishing scams due to insufficient security training create a vulnerability that attackers can easily exploit to steal credentials and infiltrate systems.
The Analyst’s Role:
Your task as a security analyst is to be the vigilant dragon slayer, wielding knowledge and proactive measures to counter these threats:
- Identify and catalog vulnerabilities: Conduct regular security assessments to map out potential weaknesses in your systems and processes.
- Evaluate risks: Analyze the likelihood of threats exploiting vulnerabilities and the potential impact of such attacks.
- Implement proactive safeguards: Patch software, enforce strong authentication protocols, and educate employees on security best practices to plug vulnerabilities and minimize risks.
- Monitor and detect: Continuously monitor systems for suspicious activity and have robust incident response plans in place to mitigate damage if a threat strikes.
Remember, understanding the interplay between threats, risks, and vulnerabilities is the cornerstone of effective security. By wielding this knowledge and taking proactive measures, you can stand guard against the dragons lurking in the digital shadows, protecting your organization’s valuable assets and ensuring its smooth operation.
Next: We’ll dive deeper into how these concepts translate into the real world, exploring their impact on various business operations. Stay tuned!
I hope this expanded explanation provides a more comprehensive understanding of these crucial security concepts. Don’t hesitate to ask if you have any further questions!
By taking these steps, entry-level security analysts can help to protect their organization’s assets and ensure the confidentiality, integrity, and availability of its data.
Introduction
Cybersecurity is the practice of protecting systems, networks, and data from digital attacks. Threats, risks, and vulnerabilities are three important concepts in cybersecurity.
- A threat is anything that can exploit a vulnerability to cause harm to an asset.
- A risk is the likelihood that a threat will occur and the impact it will have if it does.
- A vulnerability is a weakness in a system, network, or application that can be exploited by a threat.
Threats
There are many different types of threats, including:
- Malware: This is software that is designed to harm a computer system. Malware can include viruses, worms, trojan horses, and ransomware.
- Social engineering: This is a technique that uses human psychology to trick people into giving up their personal information or clicking on malicious links.
- Phishing: This is a type of social engineering attack that involves sending emails or text messages that appear to be from a legitimate source, such as a bank or credit card company. The emails or text messages often contain a link that, when clicked, takes the victim to a fake website that looks like the real website. Once the victim enters their personal information on the fake website, the attacker can steal it.
- DDoS attacks: These attacks involve flooding a website or server with so much traffic that it becomes unavailable.
- Zero-day attacks: These are attacks that exploit vulnerabilities in software that the software vendor is not aware of.
Risks
The risk of a threat occurring depends on a number of factors, including the likelihood of the threat, the impact of the threat, and the organization’s ability to mitigate the threat.
The likelihood of a threat occurring can be assessed by considering the following factors:
- The motivation of the threat actor.
- The resources available to the threat actor.
- The technical skills of the threat actor.
- The security measures in place to protect against the threat.
The impact of a threat can be assessed by considering the following factors:
- The value of the asset that is being targeted.
- The confidentiality, integrity, and availability of the asset.
- The legal and regulatory requirements that apply to the asset.
The organization’s ability to mitigate the threat can be assessed by considering the following factors:
- The security controls that are in place.
- The security awareness of employees.
- The organization’s incident response plan.
Vulnerabilities
Vulnerabilities can be introduced into systems, networks, and applications in a number of ways, including:
- Software bugs.
- Misconfigurations.
- Poor security practices.
- Human error.
Vulnerabilities can be exploited by threats to cause harm to an asset. Therefore, it is important to identify and mitigate vulnerabilities as early as possible.
Conclusion
Threats, risks, and vulnerabilities are all important concepts in cybersecurity. By understanding these concepts, organizations can better protect their systems, networks, and data from digital attacks.
Here are some additional tips for managing threats, risks, and vulnerabilities:
- Conduct regular security assessments to identify and mitigate vulnerabilities.
- Implement security controls to protect against threats.
- Train employees on security best practices.
- Have a plan for responding to security incidents.
By taking these steps, organizations can reduce their risk of a data breach or other security incident.
Phishing exploits human error to acquire sensitive data and private information.
True
Phishing exploits human error to acquire sensitive data and private information. It is one method of social engineering.
As an entry-level security analyst,
one of your many roles will be to handle an organization’s digital and
physical assets. As a reminder, an asset is an item perceived as
having value to an organization. During their lifespan, organizations
acquire all types of assets, including physical office spaces, computers,
customers’ PII, intellectual property, such as patents or copyrighted
data, and so much more. Unfortunately, organizations operate
in an environment that presents multiple security threats, risks,
and vulnerabilities to their assets. Let’s review what threats, risks,
and vulnerabilities are and discuss some common examples of each. A threat is any circumstance or
event that can negatively impact assets. One example of a threat is
a social engineering attack. Social engineering is a manipulation
technique that exploits human error to gain private information,
access, or valuables. Malicious links in email messages that
look like they’re from legitimate companies or people is one method of
social engineering known as phishing. As a reminder, phishing is a technique
that is used to acquire sensitive data, such as user names, passwords,
or banking information. Risks are different from threats. A risk is anything that can impact
the confidentiality, integrity, or availability of an asset. Think of a risk as the likelihood
of a threat occurring. An example of a risk to an organization
might be the lack of backup protocols for making sure its stored information can be
recovered in the event of an accident or security incident. Organizations tend to rate risks
at different levels: low, medium, and high, depending on possible
threats and the value of an asset. A low-risk asset is information that would
not harm the organization’s reputation or ongoing operations, and would not
cause financial damage if compromised. This includes public information
such as website content, or published research data. A medium-risk asset might include
information that’s not available to the public and may cause some
damage to the organization’s finances, reputation, or ongoing operations. For example, the early release of a
company’s quarterly earnings could impact the value of their stock. A high-risk asset is any information
protected by regulations or laws, which if compromised, would have
a severe negative impact on an organization’s finances,
ongoing operations, or reputation. This could include leaked assets with SPII,
PII, or intellectual property. Now, let’s discuss vulnerabilities. A vulnerability is a weakness that
can be exploited by a threat. And it’s worth noting that
both a vulnerability and threat must be present for
there to be a risk. Examples of vulnerabilities include:
an outdated firewall, software, or application; weak passwords; or
unprotected confidential data. People can also be
considered a vulnerability. People’s actions can significantly affect
an organization’s internal network. Whether it’s a client,
external vendor, or employee, maintaining security
must be a united effort. So entry-level analysts
need to educate and empower people to be
more security conscious. For example, educating people on how to identify a
phishing email is a great starting point. Using access cards to grant employee
access to physical spaces while restricting outside visitors is
another good security measure. Organizations must continually
improve their efforts when it comes to identifying and mitigating vulnerabilities
to minimize threats and risks. Entry-level analysts can support this
goal by encouraging employees to report suspicious activity and
actively monitoring and documenting employees’
access to critical assets. Now that you’re familiar with
some of the threats, risks, and vulnerabilities analysts
frequently encounter, coming up, we’ll discuss how
they impact business operations.
Video: Key impacts of threats, risks, and vulnerabilities
Ransomware: Explores the costly malware attack where data is encrypted and a ransom demanded for decryption. It can freeze systems, lock data, and disrupt operations.
Dark Web: Explains the three layers of the web: Surface (public), Deep (authorization required), and Dark (special software needed). Dark web often used by criminals for its secrecy.
3 Key Impacts of Threats, Risks, and Vulnerabilities:
- Financial Impact: Compromised assets lead to production/service interruptions, correction costs, and potential fines for non-compliance.
- Identity Theft: Storing sensitive data (PII) poses risks like data leaks through the dark web, causing financial and legal consequences.
- Reputation Damage: Exploited vulnerabilities can lead to customer loss, bad press, and legal penalties, impacting the organization’s financial stability and long-term vision.
Organizations are encouraged to take proactive security measures to mitigate these risks and strengthen their defenses against threats like ransomware. The video will next explore the NIST risk management framework for effective risk management.
Key Takeaways:
- Ransomware is a serious threat with significant financial and operational consequences.
- Understanding the web’s layers and their risks, especially the dark web, is crucial for cybersecurity.
- Proactive security measures are essential to minimize the impact of threats, risks, and vulnerabilities.
- Threats are anything that can potentially harm an organization’s information assets. This can include malware, phishing attacks, insider threats, and natural disasters.
- Risks are the likelihood and impact of a threat being realized. For example, a phishing attack is a threat that has a high likelihood of being successful, but the impact of the attack may be low if the user does not click on the malicious link.
- Vulnerabilities are weaknesses in an organization’s security posture that can be exploited by threats. For example, a misconfigured firewall is a vulnerability that can be exploited by an attacker to gain access to the organization’s network.
The key impacts of threats, risks, and vulnerabilities on organizational operations can be summarized as follows:
- Financial impact: When an organization’s assets are compromised by a threat, such as the use of malware, the financial consequences can be significant. This can include costs associated with data recovery, lost productivity, and legal fees.
- Identity theft: Organizations that store sensitive data, such as customerPII, are at risk of identity theft. This can lead to financial losses for the victims, as well as damage to their reputation.
- Damage to an organization’s reputation: A data breach can damage an organization’s reputation and lead to loss of customers and business partners.
- Operational disruption: A security incident can disrupt an organization’s operations, leading to lost revenue and productivity.
Organizations can take steps to prevent and mitigate the impact of threats, risks, and vulnerabilities. These steps include:
- Implementing security controls: Security controls can help to protect an organization’s information assets from threats. Examples of security controls include firewalls, intrusion detection systems, and data encryption.
- Educating employees: Employees should be trained on cybersecurity best practices, such as how to identify and avoid phishing attacks.
- Backing up data: Regularly backing up data can help to minimize the impact of a data breach.
- Having a plan for responding to security incidents: Organizations should have a plan in place for responding to security incidents. This plan should include steps for identifying and containing the incident, as well as steps for restoring operations.
By taking these steps, organizations can help to protect themselves from the financial, reputational, and operational damage that can be caused by threats, risks, and vulnerabilities.
Here are some additional resources that you may find helpful:
- NIST Cybersecurity Framework: https://www.nist.gov/cyberframework
- ISO/IEC 27001: https://www.iso.org/isoiec-27001-information-security.html
- CIS Controls: https://www.cisecurity.org/controls/
- SecurityScorecard: https://securityscorecard.com/
In this video, we’ll discuss an expensive
type of malware called ransomware. Then we’ll cover three key
impacts of threats, risks, and vulnerabilities on
organizational operations. Ransomware is a malicious attack
where threat actors encrypt an organization’s data then
demand payment to restore access. Once ransomware is
deployed by an attacker, it can freeze network systems,
leave devices unusable, and encrypt, or lock confidential
data, making devices inaccessible. The threat actor then demands a ransom
before providing a decryption key to allow organizations to return to
their normal business operations. Think of a decryption key as a password
provided to regain access to your data. Note that when ransom negotiations occur
or data is leaked by threat actors, these events can occur
through the dark web. While many people use search engines to
navigate to their social media accounts or to shop online, this is only a small
part of what the web really is. The web is actually an interlinked
network of online content that’s made up of three layers: the surface web,
the deep web, and the dark web. The surface web is the layer
that most people use. It contains content that can be
accessed using a web browser. The deep web generally requires
authorization to access it. An organization’s intranet is
an example of the deep web, since it can only be accessed by employees
or others who have been granted access. Lastly, the dark web can only be
accessed by using special software. The dark web generally carries a negative
connotation since it is the preferred web layer for criminals because
of the secrecy that it provides. Now, let’s discuss three key impacts
of threats, risks, and vulnerabilities. The first impact we’ll
discuss is financial impact. When an organization’s assets are
compromised by an attack, such as the use of malware, the financial consequences can
be significant for a variety of reasons. These can include interrupted
production and services, the cost to correct the issue, and
fines if assets are compromised because of non-compliance with laws and
regulations. The second impact is identity theft. Organizations must decide whether
to store private customer, employee, and outside vendor data, and
for how long. Storing any type of sensitive data
presents a risk to the organization. Sensitive data can include personally
identifiable information, or PII, which can be sold or
leaked through the dark web. That’s because the dark web provides
a sense of secrecy and threat actors may have the ability to sell data there
without facing legal consequences. The last impact we’ll discuss is damage
to an organization’s reputation. A solid customer base supports
an organization’s mission, vision, and financial goals. An exploited vulnerability can lead
customers to seek new business relationships with competitors or create bad press that causes permanent
damage to an organization’s reputation. The loss of customer data doesn’t only
affect an organization’s reputation and financials, it may also result
in legal penalties and fines. Organizations are strongly encouraged
to take proper security measures and follow certain protocols to prevent
the significant impact of threats, risks, and vulnerabilities. By using all the tools in their toolkit,
security teams are better prepared to handle an event
such as a ransomware attack. Coming up, we’ll cover the NIST
risk management framework’s seven steps for managing risk.
Video: Herbert: Manage threats, risks, and vulnerabilities
- Herbert is a Security Engineer at Google.
- He has been interested in security since high school, when he learned how to manipulate computers to do what he wanted.
- His day-to-day work involves analyzing security risks and providing solutions to those risks.
- A typical task for cybersecurity analysts is to analyze exceptions requests, which are requests for special access to a device or document.
- One of the more common threats that cybersecurity analysts come across is misconfigurations, or when systems are not configured properly.
- Another common threat is outdated systems and machines that need to be patched.
- Working with a team or many teams is a huge part of the job of a cybersecurity analyst.
- Herbert started his career working at a pizza joint, but now he is a Security Engineer at Google.
Here are some additional key points from the passage:
- Herbert’s interest in security began in high school, when he and his friends would crack versions of video games like Halo.
- He learned how to manipulate computers to do what he wanted, which gave him a foundation for his career in cybersecurity.
- Herbert’s day-to-day work involves analyzing security risks and providing solutions to those risks. This can involve a variety of tasks, such as reviewing security logs, investigating incidents, and developing security policies.
- One of the more common threats that cybersecurity analysts come across is misconfigurations. This can happen when systems are not configured properly, which can leave them vulnerable to attack.
- Another common threat is outdated systems and machines that need to be patched. Outdated systems are often more vulnerable to attack, so it is important to keep them up to date with the latest security patches.
- Working with a team or many teams is a huge part of the job of a cybersecurity analyst. This is because security is a complex issue that requires collaboration from many different teams, such as engineering, IT, and legal.
- Herbert is an inspiration to many people who are interested in a career in cybersecurity. He started his career working at a pizza joint, but he was able to achieve his dream of becoming a Security Engineer at Google. This shows that it is possible to achieve your goals if you are passionate about your work and are willing to put in the hard work.
My name is Herbert and
I am a Security Engineer at Google. I think I’ve always been
interested in security, in high school our school gave
us these huge Dell laptops. There wasn’t a whole lot of
security within those computers. So, many of my friends would have cracked
versions of like video games like Halo, that’s really where I learned how to start
manipulating computers to kind of do what I want. I guess [LAUGH] my day to day consists
of analyzing security risks and providing solutions to those risks. A typical task for cybersecurity analysts would usually
be something like exceptions requests. Analyzing if someone needs to have
special access to a device or document based on the role that the person has or
the project that they’re working on. One of the more common threats that we
come across is misconfigurations or requesting access for
something that you don’t really need. For example,
I recently had a case where a vendor we were working with had changed
their OAuth scope requests. And basically that means that they were
requesting more permissions to use Google services than they had before in the past. We weren’t sure really how to go
about that because that wasn’t a situation we’ve come across before. So it’s still ongoing, but we’re working with partner teams to
kind of develop a solution for that. I think another thing that
we’ve seen is outdated systems, machines that need to be patched. That sounds like an IT issue, but it’s
also definitely a cybersecurity issue. Having outdated machines, not having
proper device management policies, working with a team or
many teams is a huge part of the job. In order to get really anything done, you
need to communicate with not just the team that you’re a part of,
but with other teams. Ten years ago I was working at
a pizza joint and ten years later, here I am, at Google as a Security Engineer. If I told my 16 year old
self that I would be here, I wouldn’t have believed myself,
but it is possible.
Video: NIST’s Risk Management Framework
Importance: The NIST RMF provides a structured approach to manage risks, threats, and vulnerabilities. Understanding this framework can strengthen your entry-level security analyst job candidacy.
Seven Steps:
- Prepare: Monitor for risks and identify controls to mitigate them.
- Categorize: Develop processes and tasks based on impacts to system confidentiality, integrity, and availability.
- Select: Choose, customize, and document security controls (e.g., keeping playbooks updated).
- Implement: Put security and privacy plans into action (e.g., updating password requirements).
- Assess: Evaluate effectiveness of implemented controls and identify potential weaknesses.
- Authorize: Take accountability for managing security and privacy risks (e.g., generating reports, setting milestones).
- Monitor: Stay aware of system operations and ensure continuous risk management (e.g., assessing technical systems).
Entry-Level Role: You may not perform all steps (e.g., not setting procedures), but understanding them is crucial. You will likely:
- Assist in monitoring risks and identifying controls.
- Follow established processes for risk reduction.
- Help manage and update security documentation.
- Evaluate the effectiveness of controls and report potential weaknesses.
- Assist in generating reports and setting project milestones.
- Monitor system operations and assess their alignment with security goals.
Key Takeaway: While you may not lead, a solid understanding of the RMF and its steps will equip you to contribute effectively to risk management and enhance your job prospects.
The NIST RMF is a risk-based approach to managing information security. It is a framework that organizations can use to identify, assess, and mitigate risks to their information assets.
The RMF has seven steps:
- Prepare. This step involves activities that are necessary to manage risk before a breach occurs. This includes developing a risk management plan, identifying assets, and assessing threats and vulnerabilities.
- Categorize. This step involves identifying the assets that need to be protected and understanding the risks to those assets. This includes classifying assets and determining their impact on the organization if they were compromised.
- Select. This step involves choosing the controls that will be used to mitigate the risks to the organization’s assets. This includes identifying, evaluating, and selecting appropriate security controls.
- Implement. This step involves putting the selected controls into place. This includes developing and implementing security policies, procedures, and configurations.
- Assess. This step involves evaluating whether the implemented controls are effective in mitigating the risks to the organization’s assets. This includes testing and monitoring the controls to ensure that they are effective.
- Authorize. This step involves formally approving the use of the selected controls. This includes documenting the authorization decision and ensuring that the controls are in compliance with all applicable laws and regulations.
- Monitor. This step involves continuously monitoring the effectiveness of the controls and making necessary changes as needed. This includes reviewing and updating security policies and procedures, as well as conducting periodic security assessments.
The NIST RMF is a cyclical process that should be continuously updated as the organization’s risk profile changes. It is a valuable tool for organizations of all sizes to help them protect their assets and information.
Here are some of the benefits of using the NIST RMF:
- It can help organizations to identify and assess risks to their information assets.
- It can help organizations to select and implement appropriate security controls.
- It can help organizations to monitor the effectiveness of their security controls.
- It can help organizations to comply with applicable laws and regulations.
If you are interested in learning more about the NIST RMF, there are many resources available online. The NIST website has a comprehensive guide to the framework, and there are also a number of training courses and workshops available.
As you might remember from
earlier in the program, the National Institute of
Standards and Technology, NIST, provides many
frameworks that are used by security professionals to manage risks, threats, and
vulnerabilities. In this video, we’re
going to focus on NIST’s Risk Management
Framework or RMF. As an entry-level analyst, you may not engage in
all of these steps, but it’s important to be
familiar with this framework. Having a solid
foundational understanding of how to mitigate
and manage risks can set yourself apart from
other candidates as you begin your job search in
the field of security. There are seven steps in the
RMF: prepare, categorize, select, implement, assess,
authorize, and monitor. Let’s start with
Step one, prepare. Prepare refers to activities
that are necessary to manage security and privacy risks
before a breach occurs. As an entry-level analyst, you’ll likely use this step
to monitor for risks and identify controls that can be
used to reduce those risks. Step two is categorize, which is used to develop risk management
processes and tasks. Security professionals then
use those processes and develop tasks by thinking
about how the confidentiality, integrity, and availability of systems and information
can be impacted by risk. As an entry-level analyst, you’ll need to be able
to understand how to follow the
processes established by your organization
to reduce risks to critical assets, such as
private customer information. Step three is select. Select means to
choose, customize, and capture documentation of the controls that
protect an organization. An example of the select
step would be keeping a playbook up-to-date
or helping to manage other documentation
that allows you and your team to address
issues more efficiently. Step four is to implement security and privacy plans
for the organization. Having good plans in
place is essential for minimizing the impact of
ongoing security risks. For example, if you
notice a pattern of employees constantly
needing password resets, implementing a change to password requirements may
help solve this issue. Step five is assess. Assess means to determine if established controls are
implemented correctly. An organization always wants to operate as
efficiently as possible. So it’s essential to
take the time to analyze whether the
implemented protocols, procedures, and
controls that are in place are meeting
organizational needs. During this step,
analysts identify potential weaknesses
and determine whether the
organization’s tools, procedures, controls, and protocols should be changed to better
manage potential risks. Step six is authorize. Authorize means being
accountable for the security and
privacy risks that may exist in an organization. As an analyst, the authorization step could
involve generating reports, developing plans of action, and establishing project
milestones that are aligned to your organization’s
security goals. Step seven is monitor. Monitor means to be aware of
how systems are operating. Assessing and maintaining
technical operations are tasks that analysts
complete daily. Part of maintaining
a low level of risk for an organization is knowing how the
current systems support the organization’s
security goals. If the systems in place
don’t meet those goals, changes may be needed. Although it may not be your job to establish
these procedures, you will need to make sure they’re working as
intended so that risks to the organization itself, and the people it
serves, are minimized.
Reading: Manage common threats, risks, and vulnerabilities
Reading
Previously, you learned that security involves protecting organizations and people from threats, risks, and vulnerabilities. Understanding the current threat landscapes gives organizations the ability to create policies and processes designed to help prevent and mitigate these types of security issues. In this reading, you will further explore how to manage risk and some common threat actor tactics and techniques, so you are better prepared to protect organizations and the people they serve when you enter the cybersecurity field.
Risk management
A primary goal of organizations is to protect assets. An asset is an item perceived as having value to an organization. Assets can be digital or physical. Examples of digital assets include the personal information of employees, clients, or vendors, such as:
- Social Security Numbers (SSNs), or unique national identification numbers assigned to individuals
- Dates of birth
- Bank account numbers
- Mailing addresses
Examples of physical assets include:
- Payment kiosks
- Servers
- Desktop computers
- Office spaces
Some common strategies used to manage risks include:
- Acceptance: Accepting a risk to avoid disrupting business continuity
- Avoidance: Creating a plan to avoid the risk altogether
- Transference: Transferring risk to a third party to manage
- Mitigation: Lessening the impact of a known risk
Additionally, organizations implement risk management processes based on widely accepted frameworks to help protect digital and physical assets from various threats, risks, and vulnerabilities. Examples of frameworks commonly used in the cybersecurity industry include the National Institute of Standards and Technology Risk Management Framework (NIST RMF) and Health Information Trust Alliance (HITRUST).
Following are some common types of threats, risks, and vulnerabilities you’ll help organizations manage as a security professional.
Today’s most common threats, risks, and vulnerabilities
Threats
A threat is any circumstance or event that can negatively impact assets. As an entry-level security analyst, your job is to help defend the organization’s assets from inside and outside threats. Therefore, understanding common types of threats is important to an analyst’s daily work. As a reminder, common threats include:
- Insider threats: Staff members or vendors abuse their authorized access to obtain data that may harm an organization.
- Advanced persistent threats (APTs): A threat actor maintains unauthorized access to a system for an extended period of time.
Risks
A risk is anything that can impact the confidentiality, integrity, or availability of an asset. A basic formula for determining the level of risk is that risk equals the likelihood of a threat. One way to think about this is that a risk is being late to work and threats are traffic, an accident, a flat tire, etc.
There are different factors that can affect the likelihood of a risk to an organization’s assets, including:
- External risk: Anything outside the organization that has the potential to harm organizational assets, such as threat actors attempting to gain access to private information
- Internal risk: A current or former employee, vendor, or trusted partner who poses a security risk
- Legacy systems: Old systems that might not be accounted for or updated, but can still impact assets, such as workstations or old mainframe systems. For example, an organization might have an old vending machine that takes credit card payments or a workstation that is still connected to the legacy accounting system.
- Multiparty risk: Outsourcing work to third-party vendors can give them access to intellectual property, such as trade secrets, software designs, and inventions.
- Software compliance/licensing: Software that is not updated or in compliance, or patches that are not installed in a timely manner
There are many resources, such as the NIST, that provide lists of cybersecurity risks. Additionally, the Open Web Application Security Project (OWASP) publishes a standard awareness document about the top 10 most critical security risks to web applications, which is updated regularly.
Note: The OWASP’s common attack types list contains three new risks for the years 2017 to 2021: insecure design, software and data integrity failures, and server-side request forgery. This update emphasizes the fact that security is a constantly evolving field. It also demonstrates the importance of staying up to date on current threat actor tactics and techniques, so you can be better prepared to manage these types of risks.
Vulnerabilities
A vulnerability is a weakness that can be exploited by a threat. Therefore, organizations need to regularly inspect for vulnerabilities within their systems. Some vulnerabilities include:
- ProxyLogon: A pre-authenticated vulnerability that affects the Microsoft Exchange server. This means a threat actor can complete a user authentication process to deploy malicious code from a remote location.
- ZeroLogon: A vulnerability in Microsoft’s Netlogon authentication protocol. An authentication protocol is a way to verify a person’s identity. Netlogon is a service that ensures a user’s identity before allowing access to a website’s location.
- Log4Shell: Allows attackers to run Java code on someone else’s computer or leak sensitive information. It does this by enabling a remote attacker to take control of devices connected to the internet and run malicious code.
- PetitPotam: Affects Windows New Technology Local Area Network (LAN) Manager (NTLM). It is a theft technique that allows a LAN-based attacker to initiate an authentication request.
- Security logging and monitoring failures: Insufficient logging and monitoring capabilities that result in attackers exploiting vulnerabilities without the organization knowing it
- Server-side request forgery: Allows attackers to manipulate a server-side application into accessing and updating backend resources. It can also allow threat actors to steal data.
As an entry-level security analyst, you might work in vulnerability management, which is monitoring a system to identify and mitigate vulnerabilities. Although patches and updates may exist, if they are not applied, intrusions can still occur. For this reason, constant monitoring is important. The sooner an organization identifies a vulnerability and addresses it by patching it or updating their systems, the sooner it can be mitigated, reducing the organization’s exposure to the vulnerability.
To learn more about the vulnerabilities explained in this section of the reading, as well as other vulnerabilities, explore the NIST National Vulnerability Database and CISA Known Exploited Vulnerabilities Catalog.
Key takeaways
In this reading, you learned about some risk management strategies and frameworks that can be used to develop organization-wide policies and processes to mitigate threats, risks, and vulnerabilities. You also learned about some of today’s most common threats, risks, and vulnerabilities to business operations. Understanding these concepts can better prepare you to not only protect against, but also mitigate, the types of security-related issues that can harm organizations and people alike.
Resources for more information
To learn more, click the linked terms in this reading. Also, consider exploring the following sites:
Summary
- A vulnerability is a weakness that can be exploited by a threat.
- Organizations need to regularly inspect for vulnerabilities within their systems.
- Some common vulnerabilities include ProxyLogon, ZeroLogon, Log4Shell, PetitPotam, security logging and monitoring failures, and server-side request forgery.
- As an entry-level security analyst, you might work in vulnerability management, which is monitoring a system to identify and mitigate vulnerabilities.
- The sooner an organization identifies a vulnerability and addresses it, the sooner it can be mitigated, reducing the organization’s exposure to the vulnerability.
- To learn more about vulnerabilities, explore the NIST National Vulnerability Database and CISA Known Exploited Vulnerabilities Catalog.
Here are some additional key points from the passage:
- Vulnerabilities can be exploited by threats to cause harm to organizations.
- Organizations can mitigate the risk of vulnerabilities by regularly inspecting for them and implementing appropriate security controls.
- Security analysts play an important role in vulnerability management by identifying, assessing, and mitigating vulnerabilities.
- The NIST National Vulnerability Database and CISA Known Exploited Vulnerabilities Catalog are valuable resources for organizations to learn about vulnerabilities and their potential impact.
Practice Quiz: Test your knowledge: Navigate threats, risks, and vulnerabilities
What is a vulnerability?
A weakness that can be exploited by a threat
A vulnerability is a weakness that can be exploited by a threat.
AI assistant
The correct answer is A weakness that can be exploited by a threat.
A vulnerability is a weakness in an asset or its security controls that can be exploited by a threat actor. Vulnerabilities can be found in software, hardware, or even human behavior.
Here are some examples of vulnerabilities:
- A software bug that allows an attacker to take control of a system.
- A misconfiguration in a firewall that allows unauthorized access to a network.
- A human error, such as clicking on a malicious link, that allows an attacker to gain access to an account.
Vulnerabilities can be exploited by threats to cause harm to organizations. For example, an attacker could exploit a software bug to take control of a system and steal data. Or, an attacker could exploit a misconfiguration in a firewall to gain unauthorized access to a network.
Organizations can mitigate the risk of vulnerabilities by regularly inspecting for them and implementing appropriate security controls. Security controls can help to prevent vulnerabilities from being exploited by threats.
Here are some examples of security controls that can help to mitigate the risk of vulnerabilities:
- Software patches that fix security bugs.
- Firewalls that restrict access to networks.
- User training that teaches employees about security best practices.
By understanding what vulnerabilities are and how they can be exploited, organizations can take steps to protect themselves from harm.
Fill in the blank: Information protected by regulations or laws is a _. If it is compromised, there is likely to be a severe negative impact on an organization’s finances, operations, or reputation.
high-risk asset
Information protected by regulations or laws is a high-risk asset. If it is compromised, there is likely to be a severe negative impact on an organization’s finances, operations, or reputation.
AI assistant
The answer is high-risk asset.
Information protected by regulations or laws is a high-risk asset because if it is compromised, there is likely to be a severe negative impact on an organization’s finances, operations, or reputation. This is because such information is often confidential and valuable, and its loss or misuse could lead to legal penalties, financial losses, or damage to the organization’s brand.
Here are some examples of information that is typically protected by regulations or laws:
- Customer data, such as names, addresses, and credit card numbers
- Financial information, such as trade secrets and intellectual property
- Medical information, such as patient records
- Government data, such as classified intelligence
Organizations that handle high-risk assets must take steps to protect them from unauthorized access, use, disclosure, disruption, modification, or destruction. These steps may include:
- Implementing security controls, such as firewalls, intrusion detection systems, and access control lists
- Conducting regular security assessments
- Educating employees about security best practices
By taking these steps, organizations can help to protect their high-risk assets and mitigate the risk of a data breach or other incident.
What are the key impacts of threats, risks, and vulnerabilities? Select three answers.
Financial damage, Identity theft, Damage to reputation
The key impacts of threats, risks, and vulnerabilities are financial damage, identity theft, and damage to reputation.
AI assistant
- Financial damage. This can include the cost of data breaches, cyberattacks, and other security incidents. It can also include the cost of lost productivity, legal fees, and fines.
- Identity theft. This is the unauthorized use of someone’s personal information, such as their name, Social Security number, or credit card number. It can lead to financial losses, damaged credit, and other problems.
- Damage to reputation. A data breach or other security incident can damage an organization’s reputation. This can make it more difficult to attract customers, partners, and investors.
- Operational disruption. A security incident can disrupt an organization’s operations. This can lead to lost productivity, revenue, and customers.
Employee retention is not typically considered a key impact of threats, risks, and vulnerabilities. However, it is possible that a security incident could lead to employee turnover, if employees are not confident in the organization’s security measures.
Here are some additional impacts of threats, risks, and vulnerabilities:
- Legal liability
- Regulatory fines
- Compliance issues
- Loss of intellectual property
- Damage to brand reputation
- Customer churn
- Supply chain disruptions
Organizations should take steps to mitigate the risks of threats, risks, and vulnerabilities. This can include implementing security controls, educating employees about security best practices, and conducting regular security assessments.
Fill in the blank: The steps in the Risk Management Framework (RMF) are prepare, _, select, implement, assess, authorize, and monitor.
categorize
The steps in the RMF are prepare, categorize, select, implement, assess, authorize, and monitor. In the categorize step, security professionals develop risk-management processes and tasks.
AI assistant
The answer is categorize.
The steps in the Risk Management Framework (RMF) are:
- Prepare. This step involves activities that are necessary to manage risk before a breach occurs. This includes developing a risk management plan, identifying assets, and assessing threats and vulnerabilities.
- Categorize. This step involves identifying the assets that need to be protected and understanding the risks to those assets. This includes classifying assets and determining their impact on the organization if they were compromised.
- Select. This step involves choosing the controls that will be used to mitigate the risks to the organization’s assets. This includes identifying, evaluating, and selecting appropriate security controls.
- Implement. This step involves putting the selected controls into place. This includes developing and implementing security policies, procedures, and configurations.
- Assess. This step involves evaluating whether the implemented controls are effective in mitigating the risks to the organization’s assets. This includes testing and monitoring the controls to ensure that they are effective.
- Authorize. This step involves formally approving the use of the selected controls. This includes documenting the authorization decision and ensuring that the controls are in compliance with all applicable laws and regulations.
- Monitor. This step involves continuously monitoring the effectiveness of the controls and making necessary changes as needed. This includes reviewing and updating security policies and procedures, as well as conducting periodic security assessments.
The RMF is a cyclical process that should be continuously updated as the organization’s risk profile changes. It is a valuable tool for organizations of all sizes to help them protect their assets and information.
Review: Security domains
Video: Wrap-up
In the first section of the security analyst course, you have learned about:
- The eight security domains of the CISSP
- Threats, risks, and vulnerabilities, including ransomware and the three layers of the web
- The seven steps of the NIST Risk Management Framework (RMF)
In upcoming videos, you will learn about common tools used by entry-level security analysts and how to analyze data generated by those tools to identify risks, threats, or vulnerabilities. You will also learn how to use a playbook to respond to incidents.
You’ve now completed the first
section of this course! Let’s review what we’ve discussed so far. We started out by exploring the focus
of CISSP’s eight security domains. Then, we discussed threats, risks, and vulnerabilities, and
how they can impact organizations. This included a close
examination of ransomware and an introduction to the three
layers of the web. Finally, we focused on seven
steps of the NIST Risk Management Framework, also called the RMF. You did a fantastic job adding new
knowledge to your security analyst toolkit. In upcoming videos,
we’ll go into more detail about some common tools used by
entry-level security analysts. Then, you’ll have an opportunity to
analyze data generated by those tools to identify risks,
threats, or vulnerabilities. You’ll also have a chance to use
a playbook to respond to incidents. That’s all for now. Keep up the great work!
Reading: Glossary terms from module 1
Reading
Terms and definitions from Course 2, Module 1
Assess: The fifth step of the NIST RMF that means to determine if established controls are implemented correctly
Authorize: The sixth step of the NIST RMF that refers to being accountable for the security and privacy risks that may exist in an organization
Business continuity: An organization’s ability to maintain their everyday productivity by establishing risk disaster recovery plans
Categorize: The second step of the NIST RMF that is used to develop risk management processes and tasks
External threat: Anything outside the organization that has the potential to harm organizational assets
Implement: The fourth step of the NIST RMF that means to implement security and privacy plans for an organization
Internal threat: A current or former employee, external vendor, or trusted partner who poses a security risk
Monitor: The seventh step of the NIST RMF that means be aware of how systems are operating
Prepare: The first step of the NIST RMF related to activities that are necessary to manage security and privacy risks before a breach occurs
Ransomware: A malicious attack where threat actors encrypt an organization’s data and demand payment to restore access
Risk: Anything that can impact the confidentiality, integrity, or availability of an asset
Risk mitigation: The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach
Security posture: An organization’s ability to manage its defense of critical assets and data and react to change
Select: The third step of the NIST RMF that means to choose, customize, and capture documentation of the controls that protect an organization
Shared responsibility: The idea that all individuals within an organization take an active role in lowering risk and maintaining both physical and virtual security
Social engineering: A manipulation technique that exploits human error to gain private information, access, or valuables
Vulnerability: A weakness that can be exploited by a threat
Quiz: Module 1 challenge
Fill in the blank: Security posture refers to an organization’s ability to react to change and manage its defense of _ and critical assets.
data
AI assistant
Security posture refers to an organization’s ability to react to change and manage its defense of data and critical assets.
Data is an organization’s most valuable asset, and it is essential to protect it from unauthorized access, use, disclosure, disruption, modification, or destruction. Critical assets are those that are essential to the organization’s ability to operate, such as IT systems, infrastructure, and personnel.
An effective security posture allows an organization to identify and respond to threats and risks in a timely and effective manner. It also helps to minimize the impact of security incidents on the organization’s business operations.
Here are some of the key components of a strong security posture:
- Asset management: The organization must have a complete and accurate inventory of its assets, including IT systems, data, and personnel.
- Vulnerability management: The organization must identify and assess the vulnerabilities in its assets, and take steps to mitigate those risks.
- Threat intelligence: The organization must be aware of the latest threats and risks, and take steps to protect itself from those threats.
- Incident response: The organization must have a plan in place to respond to security incidents in a timely and effective manner.
By investing in a strong security posture, organizations can protect their data and critical assets from unauthorized access, use, disclosure, disruption, modification, or destruction.
Which of the following examples are key focus areas of the security and risk management domain? Select three answers.
Maintain business continuity, Define security goals, Follow legal regulations
AI assistant
The following examples are key focus areas of the security and risk management domain:
- Conduct control testing
- Maintain business continuity
- Define security goals
- Follow legal regulations
The security and risk management domain of the CISSP certification is concerned with developing, implementing, and managing security programs that protect an organization’s assets from threats and risks. The key focus areas of this domain include:
- Identifying and assessing security risks
- Developing and implementing security controls
- Monitoring and maintaining security controls
- Responding to security incidents
- Ensuring compliance with legal and regulatory requirements
The four examples you provided are all important aspects of security and risk management. Control testing is used to verify that security controls are operating effectively. Business continuity planning helps organizations to recover from disruptions to their operations. Defining security goals helps organizations to focus their security efforts on the most critical assets. And following legal regulations helps organizations to avoid fines and other penalties.
Here are some additional examples of key focus areas of the security and risk management domain:
- Asset management
- Threat intelligence
- Security awareness training
- Incident response testing
- Risk management framework
By focusing on these key areas, organizations can improve their security posture and reduce their risk of exposure to cyberattacks.
What is the goal of business continuity?
Maintain everyday productivity
AI assistant
The goal of business continuity is to enable an organization to continue operating during and after a disruption. This includes protecting the organization’s assets, maintaining essential business functions, and minimizing the impact of the disruption on the organization’s customers, employees, and other stakeholders.
Business continuity planning involves identifying the organization’s critical assets and processes, assessing the risks to those assets and processes, and developing plans to mitigate those risks and recover from disruptions. Business continuity plans should be tested regularly to ensure that they are effective.
Here are some of the key benefits of business continuity planning:
- Reduces the impact of disruptions: Business continuity planning can help organizations to reduce the impact of disruptions on their operations, such as natural disasters, cyberattacks, and pandemics.
- Protects assets: Business continuity planning can help organizations to protect their assets, such as data, systems, and infrastructure.
- Maintains essential business functions: Business continuity planning can help organizations to maintain essential business functions during and after a disruption.
- Minimizes financial losses: Business continuity planning can help organizations to minimize financial losses caused by disruptions.
- Protects reputation: Business continuity planning can help organizations to protect their reputation by showing that they are prepared to handle disruptions.
By investing in business continuity planning, organizations can improve their resilience and reduce the risk of catastrophic failure.
What security concept involves all individuals in an organization taking an active role in reducing risk and maintaining security?
Shared responsibility
AI assistant
The security concept that involves all individuals in an organization taking an active role in reducing risk and maintaining security is shared responsibility.
Shared responsibility is the idea that everyone in an organization has a role to play in cybersecurity. This includes executives, employees, contractors, and customers.
There are a number of ways that individuals can contribute to shared responsibility. Some examples include:
- Being aware of security threats and risks
- Following security policies and procedures
- Reporting suspicious activity
- Keeping software up to date
- Using strong passwords and multi-factor authentication
- Educating others about cybersecurity
By working together, individuals can create a more secure environment for everyone.
Here are some additional tips for promoting shared responsibility in your organization:
- Create a culture of security: Make security a priority and encourage employees to talk about security openly.
- Provide security training: Give employees the knowledge and skills they need to protect themselves and the organization from cyberattacks.
- Empower employees to report suspicious activity: Create a process for employees to report suspicious activity without fear of retaliation.
- Test security controls regularly: Make sure that your security controls are working properly and that employees are following them.
By taking these steps, you can create a more secure organization for everyone.
A security analyst ensures that employees are able to review only the data they need to do their jobs. Which security domain does this scenario relate to?
Identity and access management
AI assistant
The security domain that relates to the scenario where a security analyst ensures that employees are able to review only the data they need to do their jobs is identity and access management (IAM).
IAM is a framework of processes, technologies, and policies that helps organizations to manage the identities of their users and control their access to resources. IAM is essential for protecting organizational data and systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
One of the key components of IAM is least privilege, which is the principle of granting users only the access they need to perform their job duties. Least privilege helps to reduce the risk of data breaches and other security incidents.
Security analysts play a critical role in implementing and managing IAM programs. They work with other IT professionals to identify and assess the organization’s IAM needs, design and implement IAM solutions, and monitor and maintain IAM systems.
Here are some of the key benefits of IAM:
- Improves security: IAM helps to improve security by controlling user access to resources and by providing a single point of authentication for users.
- Reduces risk: IAM helps to reduce the risk of data breaches and other security incidents by implementing least privilege and other security controls.
- Improves compliance: IAM helps organizations to comply with data protection regulations, such as the General Data Protection Regulation (GDPR).
- Reduces costs: IAM can help to reduce costs by automating tasks, such as user provisioning and deprovisioning.
By investing in IAM, organizations can improve their security posture, reduce risk, and improve compliance.
Which of the following activities may be part of establishing security controls? Select three answers.
- Implement multi-factor authentication
- Collect and analyze security data regularly
- Evaluate whether current controls help achieve business goals
AI assistant
The following activities may be part of establishing security controls:
- Monitor and record user requests
- Implement multi-factor authentication
- Collect and analyze security data regularly
- Evaluate whether current controls help achieve business goals
Security controls are safeguards or countermeasures that an organization implements to protect its assets from unauthorized access, use, disclosure, disruption, modification, or destruction.
Monitoring and recording user requests can help organizations to identify suspicious activity and potential threats.
Multi-factor authentication (MFA) adds an extra layer of security to user accounts by requiring users to enter two or more factors of authentication, such as a password and a one-time code from their phone.
Collecting and analyzing security data regularly can help organizations to identify trends and patterns in attacks, and to develop and implement more effective security controls.
Evaluating whether current controls help achieve business goals is important to ensure that the organization’s security program is aligned with its overall business objectives.
Here are some additional examples of activities that may be part of establishing security controls:
- Implementing firewalls and intrusion detection systems
- Encrypting data
- Training employees on security best practices
- Developing and implementing security policies and procedures
By establishing and implementing effective security controls, organizations can protect their assets and reduce their risk of cyberattacks.
When working in the software development security domain, which of the following are tasks that security team members may complete during various phases of the software development lifecycle? Select three answers.
- Conducting secure code reviews
- Initiating a secure design review
- Performing penetration testing
AI assistant
The following are tasks that security team members may complete during various phases of the software development lifecycle:
- Conducting secure code reviews
- Initiating a secure design review
- Performing penetration testing
- Participating in incident investigations
Secure code reviews are performed to identify and mitigate security vulnerabilities in code. Security team members typically review code for common security vulnerabilities, such as SQL injection, cross-site scripting, and buffer overflows.
Secure design reviews are performed to identify and mitigate security vulnerabilities in the design of software applications. Security team members typically review system architecture, data flow diagrams, and other design documents to identify potential security risks.
Penetration testing is a simulated attack on a software application or system to identify security vulnerabilities. Security team members use a variety of tools and techniques to attempt to exploit vulnerabilities and gain unauthorized access to the system.
Incident investigations are performed to determine the root cause of a security incident and to develop recommendations to prevent similar incidents from happening in the future. Security team members typically collect and analyze evidence, interview witnesses, and identify the steps that need to be taken to remediate the incident and restore the system to a secure state.
In addition to these tasks, security team members may also be involved in other aspects of the software development lifecycle, such as security training, threat modeling, and risk management.
By working with software developers and other IT professionals throughout the software development lifecycle, security team members can help to ensure that software applications are developed and deployed securely.
Which of the following statements accurately describe risk? Select all that apply.
- If compromised, a medium-risk asset may cause some damage to an organization’s reputation.
- Assets with SPII, PII, or intellectual property are examples of high-risk assets.
- Determining whether a risk is low, medium, or high depends on the possible threat and the asset involved.
AI assistant
The following statements accurately describe risk:
- If compromised, a medium-risk asset may cause some damage to an organization’s reputation.
- Assets with SPII, PII, or intellectual property are examples of high-risk assets.
- Determining whether a risk is low, medium, or high depends on the possible threat and the asset involved.
- If compromised, a low-risk asset would not require ongoing monitoring or action.
Risk is the likelihood and impact of a threat occurring and causing harm to an asset. The likelihood of a threat occurring is determined by the factors that make an asset vulnerable to the threat. The impact of a threat is determined by the value of the asset and the consequences of it being compromised.
Risk assessment is the process of identifying and analyzing risks. It involves identifying the assets that need to be protected, the threats that could compromise those assets, and the likelihood and impact of those threats.
Once the risks have been identified and analyzed, they need to be prioritized. This is done by considering the likelihood and impact of each risk. High-risk risks should be prioritized and mitigated first.
Risk mitigation is the process of taking steps to reduce the likelihood or impact of a risk. There are a variety of risk mitigation strategies that can be used, such as implementing security controls, training employees, and purchasing insurance.
Risk monitoring is the process of tracking and monitoring risks to ensure that the risk mitigation strategies are effective.
By following these steps, organizations can manage risk and protect their assets from harm.
A business experiences an attack. As a result, its critical business operations are interrupted and it faces regulatory fines. What type of consequence does this scenario describe?
Financial
AI assistant
The scenario you described describes a financial consequence.
Financial consequences are the most common type of consequence of a cyber attack. They can include direct costs, such as the cost of repairing damaged systems and recovering lost data, as well as indirect costs, such as lost revenue and productivity.
In this case, the business is facing regulatory fines, which is a direct financial cost. The interruption of critical business operations is likely to lead to lost revenue, which is an indirect financial cost.
Other types of consequences of cyber attacks include:
- Reputation consequences: Cyber attacks can damage a company’s reputation, leading to lost customers and partners.
- Identity consequences: Cyber attacks can lead to the theft of personal data, such as credit card numbers and Social Security numbers. This can lead to identity theft and fraud.
- Practical consequences: Cyber attacks can disrupt business operations, making it difficult or impossible for employees to do their jobs. This can lead to lost revenue and productivity.
Organizations can protect themselves from cyber attacks by implementing a comprehensive security program. This should include measures such as:
- Technical controls: Technical controls, such as firewalls and intrusion detection systems, can help to prevent cyber attacks from happening in the first place.
- Administrative controls: Administrative controls, such as security policies and procedures, can help to reduce the risk of human error and insider threats.
- Security awareness training: Security awareness training can help employees to identify and avoid cyber attacks.
By implementing these measures, organizations can reduce the likelihood and impact of cyber attacks and protect themselves from the financial, reputational, identity, and practical consequences that can result.
Fill in the blank: In the Risk Management Framework (RMF), the _ step involves knowing how systems are operating and assessing whether or not those systems support the organization’s security goals.
monitor
AI assistant
In the Risk Management Framework (RMF), the monitor step involves knowing how systems are operating and assessing whether or not those systems support the organization’s security goals.
The monitor step is an ongoing process that involves collecting and analyzing data from a variety of sources, such as system logs, security audits, and user feedback. This data is used to identify and assess security risks, and to ensure that security controls are operating effectively.
The monitor step is important because it helps organizations to identify and address security risks before they can cause damage. It also helps organizations to ensure that their security programs are aligned with their overall security goals.
Here are some of the key activities involved in the monitor step:
- Collect and analyze data from a variety of sources to identify and assess security risks.
- Monitor the effectiveness of security controls.
- Report security findings to management.
- Take action to mitigate security risks.
By following these steps, organizations can ensure that their systems are operating securely and that their security goals are being met.