Take the security journey to the fullest and cover the eight security domains of the Certified Information Systems Security Professional (CISSP) certification. This will show you how to identify and analyze the key threats, risks, and vulnerabilities to business operations. In cyberspace, you can also explore the National Institute of Standards and Technology (NIST’s) Risk Management Framework (RMF), which gives risk management a structured approach. By examining the sequenced steps of risk management, you will know how you’ve learned to apply the principles and strategies of effective information security to safeguard your organization.
Learning Objectives:
Recognize and explain the point of CISSP’s eight security domains.
Identify and define the greatest threats, risks, and vulnerabilities to business operations.
Outline the types of threats, risks, and vulnerabilities that entry-level security analysts will usually be concentrating on.
Understand the effect of threats, risks, and vulnerabilities on business operations.
Identify the steps of risk management.
TEST YOUR KNOWLEDGE: MORE ABOUT THE CISSP SECURITY DOMAINS
1. Fill in the blank: The _____ domain is focused on access and authorization to keep data secure by making sure that users follow established policies to control and manage assets.
asset security
security operations
communication and network security
identity and access management (CORRECT)
Identity and Access Management (IAM) domain is all about giving safe and authorized access to data and systems through policies that manage and control user access to assets. It makes sure that users are authenticated and authorized before being granted access to critical data, which, in turn, saves the data and keeps it secure to prevent unauthorized access. This domain consists of processes such as user identification, authentication, authorization, and maintaining access controls across the user lifecycle.
2. What is the focus of the security and risk management domain?
Optimize data security by ensuring effective processes are in place
Manage and secure wireless communications
Secure physical networks and wireless communications
Define security goals and objectives, risk mitigation, compliance, business continuity, and regulations. (CORRECT)
With the premise the domain of security and risk management is justified with a broad vision of its design in keeping with the strong security foundation that information seeks to define measurable security goals and objectives-policies and measures designed to mitigate risk-comply with laws and regulations relevant for granting business-very related business continuity- and risk management related to security. It is the most considerable task of learning and establishing sound processes for the purpose of safeguarding organizational assets, ensuring continuity of business operations even under projected interruptions and incidents of security-related affairs-projected because much of the organization’s risk environment will be needed to understand before one even tries to put some of these processes in place to have them effective and efficient.
3. In which domain would a security professional conduct security control testing; collect and analyze data; and perform security audits to monitor for risks, threats, and vulnerabilities?
Identity and access management
Communication and network engineering
Security architecture and engineering
Security assessment and testing (CORRECT)
A Security professional performs testing of a security control, collects and analyzes data, as well as security audits in the area of security assessment and testing to detect and monitor risks, threats, and vulnerabilities.
4. Fill in the blank: The _____ domain concerns conducting investigations and implementing preventive measures.
communications and networking engineering
software development security
asset security
security operations (CORRECT)
The domain security operations involve investigating and applying preventive measures to secure an organization against security threats.
TEST YOUR KNOWLEDGE: NAVIGATE THREATS, RISKS, AND VULNERABILITIES
1. What is a vulnerability?
A weakness that can be exploited by a threat (CORRECT)
An organization’s ability to manage its defense of critical assets and data and react to change
Anything that can impact the confidentiality, integrity, or availability of an asset
Any circumstance or event that can negatively impact assets
A vulnerability refers to a weakness or flaw that a threat may take advantage of to undermine the security of a system.
2. Fill in the blank: Information protected by regulations or laws is a _____. If it is compromised, there is likely to be a severe negative impact on an organization’s finances, operations, or reputation.
new-risk asset
medium-risk asset
low-risk asset
high-risk asset (CORRECT)
Such information will be protected under regulations or laws, thus meaning that such information is a high-risk asset as any compromise will lead to significant loss to the organization in terms of finance, operations, or reputation.
3. What are the key impacts of threats, risks, and vulnerabilities? Select three answers.
Identity theft (CORRECT)
Employee retention
Financial damage (CORRECT)
Damage to reputation (CORRECT)
The primary forms through which threats, risks, and vulnerabilities have direct and indirect strong significant impacts on the organization include financial loss, identity theft, or reputational damage.
4. Fill in the blank: The steps in the Risk Management Framework (RMF) are prepare, _____, select, implement, assess, authorize, and monitor.
categorize (CORRECT)
communicate
reflect
produce
The Risk Management Framework (RMF) involves the preparation, categorization, selection, implementation, assessment, authorization, and monitoring steps. During the categorize process, security professionals will describe processes and tasks that will manage risk for the purpose of classifying the system’s security requirements and impact level.
5. Phishing exploits human error to acquire sensitive data and private information.
True (CORRECT)
False
Phishing, essentially a social engineering technique, uses human errors to lure an individual to disclose their sensitive data and private information.
MODULE 1 CHALLENGE
1. Fill in the blank: Security posture refers to an organization’s ability to react to change and manage its defense of _____ and critical assets.
data (CORRECT)
domains
consequences
gaps
Correct!
2. Which of the following examples are key focus areas of the security and risk management domain? Select three answers.
Define security goals (CORRECT)
Follow legal regulations (CORRECT)
Maintain business continuity (CORRECT)
Conduct control testing
Correct!
3. How does business continuity enable an organization to maintain everyday productivity?
By ensuring return on investment
By establishing risk disaster recovery plans (CORRECT)
By exploiting vulnerabilities
By outlining faults to business policies
Correct!
4. Fill in the blank: According to the concept of shared responsibility, employees can help lower risk to physical and virtual security by _____. Select two answers.
taking an active role (CORRECT)
meeting productivity goals
recognizing and reporting security concerns (CORRECT)
limiting their communication with team members
Correct!
5. A security analyst ensures that employees are able to review only the data they need to do their jobs. Which security domain does this scenario relate to?
Communication and network security
Identity and access management (CORRECT)
Software development security
Security assessment and testing
Correct!
6. Which of the following activities may be part of establishing security controls? Select three answers.
Implement multi-factor authentication (CORRECT)
Collect and analyze security data regularly (CORRECT)
Evaluate whether current controls help achieve business goals (CORRECT)
Monitor and record user requests
Correct!
7. When working in the software development security domain, which of the following are tasks that security team members may complete during various phases of the software development lifecycle? Select three answers.
Initiating a secure design review (CORRECT)
Participating in incident investigations
Performing penetration testing (CORRECT)
Conducting secure code reviews (CORRECT)
Correct!
8. Which of the following statements accurately describe risk? Select all that apply.
If compromised, a medium-risk asset may cause some damage to an organization’s finances.
Website content or published research data are examples of low-risk assets. (CORRECT)
Organizations often rate risks at different levels: low, medium, and high. (CORRECT)
If compromised, a high-risk asset is unlikely to cause financial damage.
Correct!
9. A business experiences an attack. As a result, a major news outlet reports the attack, which creates bad press for the organization. What type of consequence does this scenario describe?
Loss of identity
Increase in profits
Lack of engagement
Damage to reputation (CORRECT)
Correct!
10. Fill in the blank: In the Risk Management Framework (RMF), the _____ step might involve implementing a plan to change password requirements in order to reduce requests to reset employee passwords.
implement (CORRECT)
categorize
prepare
authorize
Correct!
11. Fill in the blank: Security _____ refers to an organization’s ability to manage its defense of critical assets and data, as well as its ability to react to change.
architecture
hardening
governance
posture (CORRECT)
Correct!
12. Which of the following examples are key focus areas of the security and risk management domain? Select three answers.
Store data properly
Maintain business continuity (CORRECT)
Mitigate risk (CORRECT)
Follow legal regulations (CORRECT)
Correct!
13. What term describes an organization’s ability to maintain its everyday productivity by establishing risk disaster recovery plans?
Recovery
Business continuity (CORRECT)
Mitigation
Daily defense
Correct!
14. A security analyst verifies users and monitors employees’ login attempts. The goal is to keep the business’s assets secure. Which security domain does this scenario describe?
Communication and network security
Security operations
Security assessment and testing
Identity and access management (CORRECT)
Correct!
15. Fill in the blank: In the Risk Management Framework (RMF), the _____ step involves knowing how systems are operating and assessing whether or not those systems support the organization’s security goals.
monitor (CORRECT)
implement
categorize
authorize
Correct!
16. What security concept involves all individuals in an organization taking an active role in reducing risk and maintaining security?
Remote services
Employee retention
Secure coding
Shared responsibility (CORRECT)
Correct!
17. A security analyst is asked to conduct a security audit to identify vulnerabilities. Which security domain is this task related to?
Communication and network security
Software development security
Security assessment and testing (CORRECT)
Security architecture and engineering
Correct!
18. Fill in the blank: When working in the software development security domain, security team members can use each phase of the software development _____ to conduct security reviews and ensure that security can be fully integrated into software products.
operations
sequencing
lifecycle (CORRECT)
handling
Correct!
19. Which of the following statements accurately describe risk? Select all that apply.
Another way to think of risk is the likelihood of a threat occurring. (CORRECT)
If compromised, a low-risk asset would have a severe negative impact on an organization’s ongoing reputation.
If compromised, a medium-risk asset may cause some damage to an organization’s ongoing operations. (CORRECT)
A high-risk asset is any information protected by regulations or laws. (CORRECT)
Correct!
20. A business experiences an attack. As a result, its critical business operations are interrupted and it faces regulatory fines. What type of consequence does this scenario describe?
Practical
Reputation
Identity
Financial (CORRECT)
Correct!
21. In the Risk Management Framework (RMF), which step notes the importance of being accountable for potential risks and may involve generating reports or developing plans of action?