Вы находитесь на странице: 1из 14

Mission CISSP

100 Days plan

CISSP
Security and Risk
Management
1.1 – Understand and apply concepts of Confidentiality, Integrity and Availability

MISSION CISSP
The CIA Triad

 CIA proportion may change from


one organisation to another

 CIA needs for an organisation


helps deriving security controls

 Impact on CIA determines the


effectiveness of a security control

 Security is inversely proportional


to human comfort

MISSION CISSP
Confidentiality

Principle Threats Countermeasures


Authorized people , process or Eavesdropping, Sniffing, Security through Design
system has access shoulder surfing. Password Strong Authentication
Data must be protected from cracking
Encryption at rest and in Transit
unauthorized access / disclosure Human errors - misconfigured
Access controls, Emails sent to Appropriate policies and controls
unintended recipients Security Awareness
Policy or security control gaps

MISSION CISSP
Terms around Confidentiality

MISSION CISSP
Integrity

Principle: Threats: Countermeasures:


Concept of preventing Intentional: Unauthorised Authentication, front and
unauthorised modification access, Virus, Bugs, backend Validation, Hashing,
attempt to impact content, malicious modification etc Checksums, HVAC, Physical
accuracy or consistency of and admin controls
data or system

MISSION CISSP
Other aspects of Integrity

Accuracy

Integrity

Complete Authenticity

MISSION CISSP
Availability

Principle: Threats: Countermeasures:


Authorised users are granted Redundancy and Fault
timely and uninterrupted Device failures, Software tolerance, prevention to
access to objects Errors, and Dos/DDos, Ransomwares,
environmental issues, Backups, Avoiding SPOF
Attacks on availability,

MISSION CISSP
Other aspects of Availability

Usability

Availabilit
y

Accessibili
Timeliness
ty

MISSION CISSP
Nonrepudiation

• Preventive measures implemented


to prevent a situation where the
user deny it’s own action and
deems himself/ herself not
accountable

• Nonrepudiation is ensured through


digital signature, session identifiers,
transaction logs etc.

MISSION CISSP
Authentication and Auditing terms

Identification Authentication Authorisation Auditing Accounting

MISSION CISSP
Layered Security

• Often also termed as “Defense in


Depth”

• Deployment of multiple controls in


a sequence to protect an asset

Image curtsey – Plixer .com

MISSION CISSP
Security through Obscurity

• Any false sense of


security achieved
through implementing
certain controls based
on incorrect
assumptions
courtesy – explainhow.com

MISSION CISSP
Abstraction

Data hiding

Data Obfuscation

MISSION CISSP
Thank you
Stay tuned for more interesting stuff…

MISSION CISSP

Вам также может понравиться