Module 3 Flashcards
are responsible for maintaining data assurance for an organization and ensuring the integrity and confidentiality of information.
Network security professionals
Security specialist job roles within an enterprise include
Chief Information Officer (CIO),
Chief Information Security Officer (CISO),
Security Operations (SecOps) Manager,
Chief Security Officer (CSO),
Security Manager, and
Network Security Engineer.
Regardless of job titles, network security
professionals must always stay one step ahead of the hackers:
- They must constantly upgrade their skill set to keep abreast of the latest threats.
- They must attend training and workshops.
- They must subscribe to real-time feeds regarding threats.
- They must peruse security websites daily.
- They must maintain familiarity with network security organizations. These organizations often have
the latest information on threats and vulnerabilities.
Network Intelligence Communities
SANS
Mitre
FIRST Forum of Incident Response and Security Teams
SecurityNewsWire
(ISC)2 International Information Systems Security Certification Consortium
CIS Center for Internet Security
Institute resources are largely free upon request and include:
The Internet Storm Center - the popular internet early warning system
NewsBites, the weekly digest of news articles about computer security.
@RISK, the weekly digest of newly discovered attack vectors, vulnerabilities with active exploits, and explanations of how recent attacks worked
Flash security alerts
Reading Room - more than 1,200 award-winning, original research papers.
SANS also develops security courses.
SANS
SysAdmin, Audit, Network, Security (SANS)
maintains a list of common vulnerabilities and exposures (CVE) used by prominent security organizations making it easier for them to share data. The CVE serves as a dictionary of common names (i.e., CVE Identifiers) for known cybersecurity vulnerabilities.
The Mitre Corporation
is a security organization that brings together a variety of computer security incident response teams from government, commercial, and educational organizations to foster cooperation and coordination in information sharing, incident prevention and rapid reaction.
Forum of Incident Response and Security Teams (FIRST)
A security news portal that aggregates the latest breaking news pertaining to alerts, exploits, and vulnerabilities.
SecurityNewsWire
provides vendor neutral education products and career services to more than 75,000+ industry professionals in more than 135 countries.
International Information Systems Security Certification Consortium (ISC2)
is a focal point for cyber threat prevention, protection, response, and recovery for state, local, tribal, and territorial (SLTT) governments through the Multi-State Information Sharing and Analysis Center (MS-ISAC). The MS-ISAC offers 24x7 cyber threat warnings and advisories, vulnerability identification, and mitigation and incident response.
Center for Internet Security (CIS)
To remain effective, a network security professional must:
Keep abreast of the latest threats -
This includes subscribing to real-time feeds regarding threats, routinely perusing security-related websites, following security blogs and podcasts, and more.
Continue to upgrade skills -
This includes attending security-related training, workshops, and conferences.
Information security deals with protecting information
and information systems from unauthorized access,
use, disclosure, disruption, modification, or
destruction. The ___ serves as a conceptual
foundation for the field.
CIA Triad
Only authorized individuals, entities, or processes can access sensitive information.
Confidentiality
This refers to the protection of data from unauthorized alteration.
Integrity
Authorized users must have uninterrupted access to the network resources and data that they require.
Availability
There are 14 network security domains specified by the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC).
Described by ISO/IEC 27001, these 14 domains serve to organize, at a high level, the vast realm of information and activities under the umbrella of network security.
These domains have some significant parallels with domains defined by the Certified Information Systems Security Professional (CISSP) certification.
CONT
The 14 domains are intended to serve as a common basis for developing organizational security standards and effective security management practices.
They also help to facilitate communication between organizations.
These 14 domains provide a convenient separation of the elements of network security. While it is not important to memorize these 14 domains, it is important to be aware of their existence and formal declaration by the ISO. In the ISO 27001 standard these are known as the 14 control sets of Annex A. They will serve as a useful reference in your work as a network security professional.
14 Network Security Domain
Information Security Policies
Organization of Information Security
Human Resources Security
Asset Management
Access Control
Cryptography
Physical and Environmental Security
Operations Security
Communications Security
System Acquisition, Development, and Maintenance
Supplier Relationships
Information Security Incident Management
Business Continuity Management
Compliance
This annex is designed to ensure that security policies are created, reviewed, and maintained.
Information Security Policies
This is the governance model set out by an organization for information security. It assigns responsibilities for information security tasks within an organization.
Organization of Information Security
This addresses security responsibilities relating to employees joining, moving within, and leaving an organization.
Human Resources Security
This concerns the way that organizations create an inventory of and classification scheme for information assets.
Asset Management
This describes the restriction of access rights to networks, systems, applications, functions, and data.
Access Control
This concerns data encryption and the management of sensitive information to protect confidentiality, integrity, and availability of data.
Cryptography
This describes the protection of the physical computer facilities and equipment within an organization.
Physical and Environmental Security