You will recognize the importance of security professionals in the workplace. You’ll discover how proper detection and escalation can impact an organization’s security posture.
Learning Objectives
- Recognize the importance of incident detection.
- Describe the importance of various asset types.
- Examine the relationship between events and incidents.
- Determine incidents that need to be escalated to stakeholders.
- Recognize the sensitive nature of secured assets and data.
- Explain how having an ethical security mindset supports an entry-level security analyst’s ability to protect secured assets and data
Get started with the course
Video: Introduction to Course 8
This is an introduction to a course about security analysis. The speaker, Dion, is a Program Manager at Google with five years of experience in security. He will be the instructor for the first part of the course.
The course will cover a variety of topics, including how to protect assets, communicate incidents, and escalate incidents. It will also cover how to find, prepare for, and apply for security jobs.
By the end of the course, students will have had multiple opportunities to refine their understanding of key security concepts, create a resume, build confidence in their interview skills, and even participate in an AI-generated interview.
Dion is excited for the students to join the security profession and asks them if they are ready to get started.
Here are some key takeaways from the introduction:
- Security analysis is a complex and important field.
- There are many different skills that security analysts need to have.
- This course will help students develop the skills they need to be successful security analysts.
- Dion is excited to help students learn about security analysis.
Video: Dion: My personal career journey
Dion’s Cybersecurity Journey:
- Job: Program Manager at Google, Detection & Response Team (part of Privacy, Safety & Security organization)
- Mission: Understand, find, and respond to threats to keep online information safe and private.
- Why it matters: Cybersecurity protects our online data, trusted to companies like Google.
- Previous Jobs: Radio DJ & online personality (key takeaway: Keep things moving!)
- Motivation: Protecting his children as a father and information as a security professional.
- Challenges: Constantly learning in a rapidly evolving field (no formal security training).
- Learning Strategies: Online courses, journals, and team support.
- Advice for beginners: Don’t be afraid to ask for help, getting stuck is normal.
Key Takeaways:
- Cybersecurity is crucial for online safety and privacy.
- Anyone can learn cybersecurity with dedication and support.
- Teamwork and a positive attitude are essential in this field.
[MUSIC PLAYING] Hi, I’m Dion.
I am a program manager at Google. I am a part of the detection and response
team which falls under the privacy, safety, and security organization. My favorite part of my job is
understanding that there are threats that we encounter day by day. And my team helps to ensure that
we can find those threats and respond to them accordingly. Cybersecurity is very important. Just as we need to keep
ourselves physically secure, we need to keep our information
online safe and secure. So, whenever you use a computer or a device, that data lives somewhere online. And you trust Google and other companies to secure that data and
keep it private, only to you. The work that I do day by day ensures
that your information, your data, and the world’s information stays secure,
stays private, and protected. I’ve held many jobs in different areas
before getting involved in cybersecurity. One of those jobs is
serving as a radio DJ and online personality,
which has not much to do with security. One of the key things I got from
that was to keep the music playing. No matter what happens,
keep the music playing. I’m also a proud father.
My kids are my greatest assets and I have to protect them. There are lots of threats and
risks associated with them, even vulnerabilities. As a security guy,
I have to protect the information that I’m tasked with holding from threats,
risks, and vulnerabilities. As a security professional,
fires will come up. You have to find a way to keep
things moving, either escalating to the right team or escalating up
the chain to find a resolution. So, having not been formally
trained in security, I am tasked with teaching
myself new things daily. New threats arrive,
new things need to be protected, and security is constantly changing. I teach myself through online learning. I subscribe to and read to lots of
journals related to security knowledge, and I’m also taking some
security courses online as well. I think the most challenging
part about an entry-level role in security is not knowing
what you don’t know. When I first got involved in security,
I was really winging it, but the one thing that I did was always
reach out to my team for support. Getting stuck is a part of the process,
we could always lean on our team and others for additional support or
to help us get unstuck.
Hello, and welcome to the course! I’m Dion, a Program Manager at Google. I’ve worked in security for
the past five years in areas ranging from risk management
to insider threat detection. I’ll be your first
instructor in this course. As a security analyst, you’ll help
protect the assets of the organization you work for, including tangible, or
physical, assets such as software and network devices, as well as
intangible assets, like PII, copyrights, and intellectual property. Imagine if this kind of sensitive
information were to be exposed by a threat actor! It would be devastating
to the reputation and financial stability of the organization
and the people the organization serves. In previous courses, we discussed
a variety of topics that are relevant to the security profession, including: core security concepts;
frameworks and controls; threats, risks, and
vulnerabilities; networks; incident detection and response;
and programming basics. Now it’s time to put all of these core
security concepts to practical use. In this course, we’ll further
explore how to protect assets and communicate incidents. Then, we’ll discuss when and how to escalate incidents to protect
an organization’s assets and data. We’ll also cover how to communicate
effectively to influence stakeholders’ decisions related to security. After that, Emily, your instructor for the
second part of this course will introduce some reliable resources that will help
you engage with the security community after you complete this
certificate program. And finally, we’ll cover how to find,
prepare for, and apply for security jobs. This will include discussions about
how to create a compelling resume and tips to help you throughout
the interview process. When I started my first
security-based role, I was excited to be hired at Google
to protect information and devices. I was also happy to be a part of a broader
team that I could learn from and reach out to for support. My team helped me grow my expertise, and I’m proud of my contribution
to our projects. By the end of this course,
you’ll have had multiple opportunities to refine your understanding of key
security concepts, create a resume, build confidence in your
interview skills, and even participate in an artificial
intelligence, or AI, generated interview. The security profession is
such an amazing field, and I’m looking forward to you joining it! I have one question for you:
Are you ready to get started?
Event and incident detection
Video: Welcome to module 1
This course section dives into the world of security:
- Developing a security mindset: Learn what it means to prioritize security and how to apply it for organizational protection.
- Incident escalation: Explore the proper procedures for addressing data breaches promptly and effectively.
- Data sensitivity: Gain insight into the critical nature of the data you’ll be safeguarding.
- Focus: The upcoming videos will specifically guide you on building a security mindset and utilizing it to shield organizations and their people.
In essence, this section equips you with the foundational knowledge and tools to become a vigilant security advocate.
Welcome to the first
section of the course! In the next several videos, we’ll discuss what it means
to have a security mindset, and how you’ll use
that mindset to protect an organization’s
assets and data. Then, we’ll explore
the process of incident escalation in
the event of a breach. Finally, we’ll share information to better
help you understand the sensitive nature of the data that you’ll
work to protect. Coming up, we’ll focus on how to develop a
security mindset then use that mindset to
protect organizations and the people they serve.
Video: Security as a mindset
Developing a Security Mindset: Your Compass in the Cybersecurity World
This section emphasizes the importance of a security mindset, a crucial tool for any aspiring cybersecurity professional.
Key takeaways:
- Understanding the Landscape: Having a security mindset involves recognizing what you’re protecting (assets) and who/what you’re protecting it from (threats, risks, vulnerabilities).
- Constant Vigilance: It’s not just about identifying threats, but actively seeking out potential breaches and vulnerabilities in systems, applications, and data.
- Staying Informed: Continuous learning is key. Keep yourself updated about the latest security threats and vulnerabilities to stay ahead of attackers.
- Everyday Vigilance: Security is an ongoing battle, not a one-time event. Approach every action with a security lens, considering its potential impact.
- Prepared for Anything: Even seemingly insignificant actions like clicking a link can have security implications. Prepare for worst-case scenarios.
- Protecting All Levels: Your security mindset applies to all assets, from low-level guest Wi-Fi to high-value intellectual property.
- Prioritizing Response: Not all incidents are created equal. Learn to prioritize and respond effectively based on the nature of the threat.
- Stand Out from the Crowd: A strong security mindset sets you apart in the job market. Highlight it in interviews and throughout your career.
Remember:
- Developing a security mindset is a continuous journey, not a destination.
- This section lays the foundation for further exploration of incident detection and response in the following videos.
Bonus tip: Imagine a knight constantly scanning the horizon for enemies. That’s the essence of a security mindset!
Developing a Security Mindset: Your Compass in the Cybersecurity World
Introduction
Welcome to the world of cybersecurity! In this vast and ever-changing landscape, one of the most valuable tools you can possess is a security mindset. It’s your internal compass, guiding you in identifying and mitigating threats, protecting valuable assets, and keeping your organization safe.
What is a Security Mindset?
Imagine a knight in shining armor, constantly vigilant against approaching enemies. That’s the essence of a security mindset. It’s a proactive approach to security, where you’re not just reacting to threats, but actively seeking them out and taking steps to prevent them from causing harm.
Key Pillars of a Security Mindset:
- Understanding the Landscape: The first step is to understand what you’re protecting. This includes identifying your organization’s critical assets, such as data, systems, and applications. You also need to be aware of the potential threats, risks, and vulnerabilities that could exploit these assets.
- Constant Vigilance: Don’t be like a passive guard dozing off at their post. Be an active detective, constantly looking for suspicious activity and potential breaches. This includes questioning every click, every email, and every access request.
- Staying Informed: The world of cybersecurity is constantly evolving, with new threats emerging every day. Make it a habit to stay updated on the latest threats and vulnerabilities by reading security blogs, attending conferences, and taking online courses.
- Everyday Vigilance: Security isn’t just a one-time task; it’s an ongoing process. Integrate security into your daily routine, considering the potential security implications of every action you take.
- Prepared for Anything: Always be prepared for the worst-case scenario. This means having a plan for incident response and knowing how to effectively contain and mitigate any security breaches that may occur.
- Protecting All Levels: Don’t underestimate the importance of protecting even low-level assets. A seemingly insignificant breach in your guest Wi-Fi network could be a stepping stone for attackers to gain access to more critical systems.
- Prioritizing Response: Not all incidents are created equal. Learn to prioritize your response based on the severity of the threat and the potential impact on your organization.
Benefits of a Strong Security Mindset:
- Reduced Risk of Cyberattacks: By proactively identifying and mitigating threats, you can significantly reduce the risk of cyberattacks and data breaches.
- Faster Incident Response: A security mindset prepares you to respond quickly and effectively to any security incidents that may occur.
- Improved Security Posture: By constantly thinking about security, you can improve your organization’s overall security posture and make it more resilient against cyberattacks.
- Career Advantage: A strong security mindset is a valuable asset in any cybersecurity career. It can help you stand out from the crowd and make you a more attractive candidate to potential employers.
Developing Your Security Mindset:
Building a strong security mindset takes time and effort. Here are some tips to get you started:
- Start small: Don’t try to change everything overnight. Begin by incorporating small security practices into your daily routine, such as using strong passwords and being cautious about clicking on links in emails.
- Educate yourself: There are many resources available to help you learn more about cybersecurity. Take online courses, read security blogs, and attend industry conferences.
- Practice, practice, practice: The more you practice thinking about security, the more natural it will become. Try to identify potential security risks in everyday situations, such as when you’re using public Wi-Fi or downloading a new app.
- Find a mentor: Having a mentor who can provide guidance and support can be invaluable in developing your security mindset. Look for someone with experience in the cybersecurity field who can answer your questions and offer advice.
Conclusion
Developing a security mindset is an essential step for anyone who wants to be successful in the cybersecurity field. By following the tips in this tutorial, you can start building your own internal compass and become a more vigilant defender against cyber threats.
Remember, cybersecurity is a team effort. Share your knowledge and insights with others, and help create a more secure world for everyone.
Additional Resources:
- National Institute of Standards and Technology (NIST) Cybersecurity Framework: https://www.nist.gov/cyberframework
- SANS Institute: https://docs.broadcom.com/doc/proactive-approach-incident-response
- OWASP Top 10 Web Application Security Risks: https://owasp.org/www-project-top-ten/
Let’s take a little
time to discuss a concept that would help you throughout your security career: having a security mindset. In previous courses, we discussed
various threats, risks, and vulnerabilities and
how they can impact organizational operations
and the people served by those organizations. These concepts are
key considerations when thinking about having
a security mindset. You’ll have to recognize not
only what you’re defending, but what or who you’re
defending against. For example, it’s important to recognize the types
of assets that are essential to maintaining an organization’s
business functions, along with types of threats, risks, and vulnerabilities that can negatively
impact those assets. And that’s what having a security
mindset is all about. A security mindset
is the ability to evaluate risk and constantly seek out and identify the potential or actual
breach of a system, application, or data. Earlier in the program, we discussed threats, risks, and vulnerabilities
that are posed by social engineering
attacks, such as phishing. These attacks are
designed to compromise an organization’s assets to help the threat actor or actors gain access to sensitive information. Using our security mindset can help prevent these
types of attacks. It’s important that
we’re constantly staying up-to-date with the kinds of attacks
that are happening. To do this, it’s good to develop
a habit of seeking out information regarding the latest security threats
or vulnerabilities. As you do this, new ideas for protecting company
data may come to mind. Security is an
everyday objective for every security
team in the industry. So having a security
mindset helps analysts defend against the constant
pressure from attackers. That mindset can make
you think: “Every click of the mouse has the potential
to lead to a security breach.” That level of scrutiny as
a security professional helps you prepare for the worst-case scenario,
even if it doesn’t happen. Entry-level analysts can help
protect low-level assets, such as an organization’s
guest WiFi network, and high-importance assets, such
as intellectual property, trade secrets, PII, and
even financial information. Your security mindset
allows you to protect all levels of assets. However, if an
incident does occur, that doesn’t mean you respond to all incidents in the same way. So we’ll discuss incident
prioritization a little later in the course. Having a strong security mindset can help set you apart from other candidates as you prepare to enter the
security profession. It may even be a good idea to reference that foundation
in future job interviews. We’ll discuss
interview preparation in detail, later in the course. Coming up, we’ll focus on incident detection
in greater detail.
Reading: Data and asset classification
Reading
Protecting an organization’s business operations and assets from security threats, risks, and vulnerabilities is important. You previously learned what it means to have a security mindset. That mindset can help you identify and reduce security risks and potential incidents.
In this reading, you will learn about key data classification types and the difference between the low-level and high-level assets of an organization.
Classifying for safety
Security professionals classify data types to help them properly protect an organization from cyber attacks that negatively impact business operations. Here is a review of the most common data types:
- Public data
- Private data
- Sensitive data
- Confidential data
Public data
This data classification does not need extra security protections. Public data is already accessible to the public and poses a minimal risk to the organization if viewed or shared by others. Although this data is open to the public, it still needs to be protected from security attacks. Examples of public data include press releases, job descriptions, and marketing materials.
Private data
This data classification type has a higher security level. Private data is information that should be kept from the public. If an individual gains unauthorized access to private data, that event has the potential to pose a serious risk to an organization.
Examples of private data can include company email addresses, employee identification numbers, and an organization’s research data.
Sensitive data
This information must be protected from everyone who does not have authorized access. Unauthorized access to sensitive data can cause significant damage to an organization’s finances and reputation.
Sensitive data includes personally identifiable information (PII), sensitive personally identifiable information (SPII), and protected health information (PHI). Examples of these types of sensitive data are banking account numbers, usernames and passwords, social security numbers (which U.S. citizens use to report their wages to the government), passwords, passport numbers, and medical information.
Confidential data
This data classification type is important for an organization’s ongoing business operations. Confidential data often has limits on the number of people who have access to it. Access to confidential data sometimes involves the signing of non-disclosure agreements (NDAs)— legal contracts that bind two or more parties to protect information—to further protect the confidentiality of the data.
Examples of confidential data include proprietary information such as trade secrets, financial records, and sensitive government data.
Asset classification
Asset classification means labeling assets based on sensitivity and importance to an organization. The classification of an organization’s assets ranges from low- to high-level.
Public data is a low-level asset. It is readily available to the public and will not have a negative impact on an organization if compromised. Sensitive data and confidential data are high-level assets. They can have a significantly negative impact on an organization if leaked publicly. That negative impact can lead to the loss of a company’s competitive edge, reputation, and customer trust. A company’s website address is an example of a low-level asset. An internal email from that company discussing trade secrets is an example of a high-level asset.
Key takeaways
Every company has their own data classification policy that identifies what type of data is in each category. It will be important to your success as a security professional to familiarize yourself with that policy. Understanding different data and asset classification types is important. It helps you prioritize what data needs to be protected most. It also helps you recognize what assets need higher levels of security and what assets need minimal security.
Practice Quiz: Test your knowledge: Event and incident detection
What does a security mindset enable a security analyst to do when protecting their organization? Select two answers.
- Evaluate risks and identify potential system breaches
- Recognize what they are defending
A security mindset enables an analyst to recognize what they are defending. It also helps them evaluate risks and identify potential system breaches.
Which type of asset would have the least impact on an organization if it were compromised?
Guest Wi-Fi network
A guest Wi-Fi network is an asset that would have the least impact on an organization if it were compromised because an organization’s business operations would experience little to no impact.
How can security analysts cultivate a security mindset?
By researching the latest security vulnerabilities
Security analysts can cultivate a security mindset by researching the latest security vulnerabilities. Staying updated about threats and vulnerabilities can help analysts take the necessary actions to prevent potential attacks from happening.
Which of the following examples describes the use of a security mindset? Select two answers.
Reporting suspicious emails. Exercising suspicion before opening email attachments
Exercising suspicion before opening email attachments and reporting suspicious emails are examples of the use of a security mindset. A security mindset can help you identify and reduce security risks and potential incidents.
Your impact on data protection
Video: Detect and protect without neglect
Summary: Importance of Collaboration and Data Protection in Security
Key points:
- Impact of security incidents: Compromised data leads to financial losses, legal penalties, and loss of trust.
- Collaboration essential: Security isn’t a solo act. Diverse teams across the organization share security interests (financial data, user credentials, vendor security, employee PII).
- Protecting customer data: A top priority. Organizations handle sensitive information (credit cards, SSN, emails etc.) and must earn customer trust.
- Security mindset: Understanding data importance for strong security. Careful handling and attention to detail are crucial to prevent breaches.
- Security events vs incidents: Events not leading to breaches aren’t incidents. Be safe, not sorry.
- No issue too small/big: Report anomalies, like unauthorized app installs or suspicious code execution, regardless of perceived severity.
- Responsibility and impact: Your decisions affect the company, customers, and colleagues. Choose wisely, what you do matters!
Overall: This emphasizes the collective effort needed in security, the critical nature of data protection, and the individual responsibility in safeguarding sensitive information.
Importance of Collaboration and Data Protection in Security: A Teamwork for Fortress-Level Defense
Introduction
Welcome to the heart of the cybersecurity domain! In this crucial area, protecting sensitive data and maintaining organizational security thrives not on solo heroes, but on tight-knit collaboration and diligent data protection. This tutorial delves into the “why” and “how” of these two pillars, equipping you with the knowledge and mindset to be a valuable player in the security team orchestra.
Collaboration: Security’s Synergistic Symphony
Imagine a team of musicians, each mastering their instrument (financial data protection, user authentication, vendor security, employee PII safeguarding). Though skilled individually, their true magic lies in the harmonious ensemble.
Similarly, security flourishes through collaboration. Diverse teams across the organization share a vested interest in robust security:
- Finance team: Shielding sensitive financial data and ensuring regulatory compliance.
- IT team: Protecting user credentials and maintaining secure network infrastructure.
- Procurement team: Vetting third-party vendors for robust security practices.
- HR team: Safeguarding employee PII and promoting security awareness.
By combining expertise, perspectives, and resources, these teams weave a stronger security tapestry, protecting every corner of the organization.
Data Protection: The Crown Jewels of Security
At the heart of this collaborative effort lies the paramount importance of data protection. Think of data as the crown jewels of your organization, entrusted to your care. This includes:
- Customer data: Credit card numbers, Social Security numbers, emails, usernames, passwords – the lifeblood of customer trust.
- Internal data: Intellectual property, trade secrets, financial records – the very fabric of your organization’s operations.
Protecting this sensitive information demands a relentless focus on detail and a proactive approach. Every decision, every action, must be weighed against its potential impact on data security.
Building Your Security Mindset: Vigilance and Responsibility
Developing a strong security mindset is key to excelling in this role. This means:
- Understanding the gravity of data breaches: Financial losses, legal repercussions, and reputational damage are just the tip of the iceberg.
- Handling sensitive data with meticulous care: Every click, every email, every access request deserves scrutiny.
- Being the “eyes and ears” of security: Noticing anomalies, like unauthorized app installations or suspicious code execution, and promptly reporting them.
Remember, there are no “small” issues in security. Even seemingly insignificant breaches can be stepping stones for attackers.
Collaboration in Action: Real-World Scenarios
Let’s see how collaboration and data protection play out in practice:
- Scenario 1: An employee installs an unauthorized app on their work device. The IT team, in collaboration with the security team, investigates the app’s potential vulnerabilities and takes necessary action to mitigate any risks.
- Scenario 2: A suspicious log entry indicates malicious code execution. The security team immediately alerts the network operations team, who swiftly isolates the affected system and launches an investigation to contain the damage.
Conclusion: You Are the Hero, Together
As a security professional, you are not just a cog in the machine; you are a vital member of a formidable team. Your vigilance, your commitment to collaboration, and your unwavering focus on data protection contribute to an impenetrable fortress around your organization’s most valuable assets.
Remember, what you do matters. Every action, every decision, ripples across the organization, impacting not just the company, but also its customers and countless colleagues. So, stand tall, collaborate effectively, and protect the data entrusted to you with unwavering dedication. Together, you can build a security posture that stands strong against any threat.
Additional Resources:
- National Institute of Standards and Technology (NIST) Cybersecurity Framework: https://www.nist.gov/cyberframework
- SANS Institute: https://docs.broadcom.com/doc/proactive-approach-incident-response
- OWASP Top 10 Web Application Security Risks: https://owasp.org/www-project-top-ten/
Let’s build a safer digital world, one vigilant team at a time!
Welcome back! In
earlier courses, we discussed the impact that security incidents can have on the critical data and
assets of an organization. If data and assets
are compromised, it can lead to financial
pains for an organization. It can even lead to regulatory
fines and the loss of credibility with customers or other businesses in
the same industry. This is why your
role in protecting company data and
assets is so valuable. Collaboration is
an exciting part about working in security. There are so many
individuals across an organization that are interested in various
functions of security. No security professional
can do this alone. Some team members are focused on protecting sensitive
financial data, others work on protecting
usernames and passwords, some are more focused
on protecting third-party vendor security, and others may be concerned with
protecting employees’ PII. These stakeholders
and others have an interest in the role the
security team plays for keeping the organization,
and the people it serves, safe from
malicious attacks. It’s important to recognize
that the assets and data you protect affect multiple
levels of your organization. One of the most
important concerns for an organization is the
protection of customer data. Customers trust that an
organization they engage with will protect their
data at all times. This means credit card numbers, Social Security numbers, emails, usernames, passwords,
and so much more. It’s important to keep this in mind when taking on
a security role. Understanding the importance of the data you’re protecting is a big part of having a
strong security mindset. As a security professional, it’s important to handle sensitive data with
care while being mindful of the little details to ensure that private data is
protected from breaches. When a security event
results in a data breach, it is categorized as
a security incident. However, if the event is resolved without
resulting in a breach, it’s not considered an incident. It’s better to be
safe when it comes to taking a job in the
security profession. That means paying attention to details and raising your
issues to your supervisor. For example, a
seemingly small issue, like an employee
installing an app on their work device without
getting permission from the help desk should be
escalated to a supervisor. This is because some apps
have vulnerabilities that can pose a threat to the
security of the organization. An example of a bigger issue is noticing that a log may have malicious code executed in it. Malicious code can lead
to operational downtime, severe financial consequences, or the loss of critical
high-level assets. The point is that there are no issues that are
too small or too big. If you’re not sure of the potential impact of an incident, it’s always best
to be cautious and report events to the
appropriate team members. Each day on the job as
a security professional comes with a level
of responsibility to help protect the organization
and the people it serves. The decisions you make not
only affect the company, but also its customers and countless team members
across the organization. Remember, what you do matters!
Reading: Disaster recovery and business continuity
Reading
The role of a security professional is to ensure a company’s data and assets are protected from threats, risks, and vulnerabilities. However, sometimes things don’t go as planned. There are times when security incidents happen. You’ve already learned that security breaches can lead to financial consequences and the loss of credibility with customers or other businesses in the industry.
This reading will discuss the need to create business continuity and disaster recovery plans to minimize the impact of a security incident on an organization’s business operations. Analysts need to consider the sequence of steps to be taken by the security team before business continuity and disaster recovery plans are implemented.
Identify and protect
Creating business continuity and disaster recovery plans are the final steps of a four-part process that most security teams go through to help ensure the security of an organization.
First, the security team identifies the assets that must be protected in the organization. Next, they determine what potential threats could negatively impact those assets. After the threats have been determined, the security team implements tools and processes to detect potential threats to assets. Lastly, the IT or appropriate business function creates the business continuity and disaster recovery plans. These plans are created in conjunction with one another. The plans help to minimize the impact of a security incident involving one of the organization’s assets.
Business continuity plan
The impact of successful security attacks on an organization can be significant. Loss of profits and customers are two possible outcomes that organizations never want to happen. A business continuity plan is a document that outlines the procedures to sustain business operations during and after a significant disruption. It is created alongside a disaster recovery plan to minimize the damage of a successful security attack. Here are four essential steps for business continuity plans:
- Conduct a business impact analysis. The business impact analysis step focuses on the possible effects a disruption of business functions can have on an organization.
- Identify, document, and implement steps to recover critical business functions and processes. This step helps the business continuity team create actionable steps toward responding to a security event.
- Organize a business continuity team. This step brings various members of the organization together to help execute the business continuity plan, if it is needed. The members of this team are typically from the cybersecurity, IT, HR, communications, and operations departments.
- Conduct training for the business continuity team. The team considers different risk scenarios and prepares for security threats during these training exercises.
Disaster recovery plan
A disaster recovery plan allows an organization’s security team to outline the steps needed to minimize the impact of a security incident, such as a successful ransomware attack that has stopped the manufacturing team from retrieving certain data. It also helps the security team resolve the security threat. A disaster recovery plan is typically created alongside a business continuity plan. Steps to create a disaster recovery plan should include:
- Implementing recovery strategies to restore software
- Implementing recovery strategies to restore hardware functionality
- Identifying applications and data that might be impacted after a security incident has taken place
Key takeaways
Disaster recovery and business continuity plans are important for an organization’s security posture. It’s essential that the security team has plans in place to keep the organization’s business operations moving forward in case a security incident does occur.
Reading: Juliana’s story: Asset protection
Reading
Meet Juliana Soto, who recently completed an online cybersecurity certificate program and was hired as a cybersecurity analyst for Right-On-Time Payment Solutions, a fictional payment processing company allowing individuals to transfer money to friends and family. Right-On-Time also allows companies to accept payments from customers or organizations.
In this reading, you will begin a three-part journey that follows Juliana as she takes on new roles and responsibilities within the cybersecurity team of her new company.
Juliana decides that one of her first objectives is to gain a better understanding of the most important assets to the company by reviewing various company reading materials that will help her learn what is most valuable to them. On her first day, she is given reading materials to help her familiarize herself with the company. She learns that customers must create unique usernames and passwords and provide their full name or company name to sign up for the service as an individual. Business customers can also sign up for the service if they provide their employee identification number (EIN). Finally, customers must enter their bank account information or debit card number for payments to be accepted.
Juliana discovers that this company handles a lot of personally identifiable information (PII) from its customers. This kind of information is considered sensitive data. Unauthorized access to it can lead to significant damage to the organization’s finances, its customers, and its reputation. Juliana realizes that the most important asset to this company is customer data.
After finishing the required onboarding materials, she decides to put together an information lifecycle strategy. She learned about this when completing her online cybersecurity certificate program.
Information lifecycle strategy
Juliana recalls the following steps of the information lifecycle:
- The first step in the information lifecycle is to identify the important assets to the company, including sensitive customer information such as PII, financial information, social security numbers, and EINs.
- The second step is to assess the security measures in place to protect the identified assets and review the company’s information security policies. There are different components to this step, ranging from vulnerability scanning to reviewing processes and procedures that are already in place. Juliana is new to the company and might not be ready to conduct vulnerability scans.
- The third step of the information lifecycle is to protect the identified assets of the organization. Once again, this is only Juliana’s first day on the job. She asks her supervisor if she can observe a more senior security analyst for a day. This will give her the opportunity to learn how the security team monitors the company’s systems and network.
- The last step of the security lifecycle is to monitor the security processes that have been implemented to protect the organization’s assets. She contacts her supervisor and gives them a detailed report of what she has learned on her first day. She requests to finish her day by monitoring a few of the systems that are in place. Her supervisor is impressed with her initiative and prepares Juliana to monitor the security systems. What a great first day for Juliana!
Key takeaways
Identifying the important assets of a company is a key security analyst responsibility. Once you identify the assets, it can be helpful to follow the information lifecycle strategy to help ensure those assets are being protected effectively. Reviewing a company’s security policies will also help an analyst understand what is important to the company and how the analyst should be protecting that data.
Practice Quiz: Test your knowledge: Your impact on data protection
A security analyst notices that an employee has installed an app on their work device without getting permission from the help desk. The log indicates that potentially malicious code might have been executed on the host. Which of these security events should the security analyst escalate to a supervisor?
Both events should be escalated.
Both events should be escalated to a supervisor. There are no issues that are too small or too big. It’s always best to err on the side of caution and report events to the appropriate team members.
Which are types of data and assets that stakeholders are most interested in protecting? Select two answers.
Customers’ usernames and passwords. Sensitive financial data
Sensitive financial data and customers’ usernames and passwords are examples of data and assets that stakeholders are most interested in protecting.
Fill in the blank: When a security event results in a data breach, it is categorized as a _____.
security incident
When a security event results in a data breach, it is categorized as a security incident. However, if the event is resolved without resulting in a breach, it is not considered an incident.
Which of the following are examples of the potential impact of a security incident involving malicious code? Select three answers.
Loss of assets. Operational downtime. Financial consequences.
Operational downtime, financial consequences, and loss of assets are examples of the potential impact of a security incident involving malicious code.
Review: Protect assets and communicate incidents
Video: Wrap-up
This section wraps up what you’ve learned so far about an entry-level security analyst’s role:
Key Takeaways:
- Security Mindset: Crucial for proactive threat detection and incident prevention.
- Incidents vs. Events: Not all anomalies are incidents; learn to differentiate and prioritize.
- Incident Escalation: Understand the process for effectively addressing security concerns.
- Data Sensitivity: Recognize the critical nature of the data you protect and its impact on various stakeholders.
- Teamwork: Every security role contributes to the organization’s smooth operation.
Motivation: Emphasizes the value of your work and the positive impact you make as a security team member.
Coming Up: The next section dives deeper into the process of escalating security incidents.
Overall: This serves as a recap and sets the stage for further learning about incident escalation in the next section.
You’ve had an opportunity to learn
more about the important role an entry-level analyst plays in protecting
the data and assets of an organization. Let’s quickly review what we covered. We started off by discussing the
importance of having a security mindset, including how it supports
incident detection. Then, we examined the relationship
between incidents and events, and further explored the incident
escalation process. We ended our discussion by exploring the
sensitive nature of the data that you’re protecting and the amount of people counting on you to
play your part in protecting that data. Understanding how valuable you are as
a member of the security team can help you put the work you do into perspective. Every role in security matters. Each individual contributes to making
a company’s operations flow smoothly. I hope you enjoyed our
discussion as much as I did! Are you ready to continue your
journey into the security world? Coming up, we’ll discuss the importance
of escalating security incidents.
Reading: Glossary terms from module 1
Terms and definitions from Course 8, Module 1
Business continuity plan (BCP): A document that outlines the procedures to sustain business operations during and after a significant disruption
Confidential data: Data that often has limits on the number of people who have access to it
Disaster recovery plan: A plan that allows an organization’s security team to outline the steps needed to minimize the impact of a security incident
Private data: Information that should be kept from the public
Public data: Data that is already accessible to the public and poses a minimal risk to the organization if viewed or shared by others
Security mindset: The ability to evaluate risk and constantly seek out and identify the potential or actual breach of a system, application, or data
Sensitive data: A type of data that includes personally identifiable information (PII), sensitive personally identifiable information (SPII), and protected health information (PHI)
Quiz: Module 1 challenge
Fill in the blank: A security mindset is the _____.
ability to evaluate risk and constantly seek out and identify the potential or actual breach of a system, application, or data
As a security analyst, you are responsible for protecting an organization’s low-level assets and high-importance assets. Which of the following is considered a low-level asset?
Guest Wi-Fi network
Fill in the blank: A security mindset helps a security analyst _____.
defend against constant pressure from cyber attackers
Which of the following are examples of private data? Select two answers.
Employee email addresses, Employee identification numbers
Fill in the blank: One of the most important concerns for most organizations is the protection of _____.
customer data
Fill in the blank: The decisions a security analyst makes can affect the organization that the analyst works for and other team members across the organization. These decisions also affect ______.
the customers of the organization that hired the analyst
A security analyst notices that an employee has installed an app on their work computer without getting permission from the IT service desk. The security analyst also notices that antivirus software recorded a potentially malicious execution on the same computer. Which of these security events should the security analyst escalate to their supervisor?
Both events should be escalated.
Fill in the blank: When a security event results in a data breach, it is categorized as a _____.
security incident
Which of the following are examples of sensitive customer data that most organizations prioritize? Select two answers.
Usernames and passwords. Credit card numbers
Fill in the blank: ____ can occur if an organization’s data and essential assets are compromised in a way that disrupts its business operations.
Financial loss