GRC and Audit
Security and Risk Management
CIA Triad confidentiality, integrity and availability
Confidentiality and Integrity tightly coupled on each other
Security control evaluation using CIA Triad
Scenarios which violates these security CIA triad and how to detect and address
For ex: weak encryption and enforce strong encryption
DOS attacks
BCP
IAAAA
Layering defense in depth
BCP
DR
Data encryption
Data hiding
Security governance principles (IT and corporate governance)
Change management (change advisory board)
Data classification
Who are data owners
Data custodians
Levels of classification
Security policies and security management planning
Strategic plan
Tactical plan
Operational plan
Security frameworks
NIST 800-53 or 800-100
Org roles
Senior manager
Security professional
Data owner
Data custodian
User
Auditor
Security control frameworks
COBIT
OSSTMM
ISO 27002/1
Security policies
Security standards
Security baselines
Security guidelines
Security procedures
Security governance
Third party governance
Threat modeling
Proactive
Reactive
Stride
Pasta
Threat reduction analysis
Threat prioritization and reduction
DREAD
Supply chain and third party service risk assessment
Audit
PCI
CJIS
SOC 2
Separation of duties
Job responsibilities
Job rotation
Cross training
Employee onboarding process
Security awareness training
Employee termination process
Access revoke
Audit activity
NDA
NCA
SLA
Vendors, contractors, contract agreements
Compliance policy requirements
Privacy policy requirement
Risk Management
Asset
Asset inventory
Classes and criticality
Asset valuation
Asset valuation
Threats
Vulnerability
Exposure
Risk
Safeguards
Attack
Breach
Identifying the threats and vulnerabilities
Risk assessment
Quantitative risk analysis
Exposure factor
Single loss expectancy
Annualized rate of occurrence
Annualized loss expectancy
Calculating safe guard costs
Qualitative risk analysis
Risk responses
Risk mitigation
Avoidance
Etc..
Counter measures
Security controls
Physical
Logical/technical
Administrative
Types of controls
Deterrent
Preventive
Detective
Compensating
Corrective
Recovery
Directive
Security control assessment
NIST Guide for Assessing the Security Controls in Federal Information Systems
RISK frameworks
NIST SP 800-37
Security awareness training
Business continuity plan
Disaster recovery plan
Legal and regulatory requirements
Business Impact Analysis
Business priorities
Identifying the risk/risk assessment
SaaS application
Cloud
Law
Cyberlaw
Criminal activity law
FISMA Act
Compliance
SAAS (contracting and procurement)
Asset Security
Data classification
DLP
PII
PHI
Classification levels
NIST SP 800-122
Data thefts
Asset classification
Data security controls
Email data security
Strong encryption algo AES 256
Data states
In rest
In transit
In use
Labeling
Sensitive data
Sensitive systems
Sensitive data destroying
Data remanence, destruction, clearing, degaussing, purging
Data protection policies/methods
Ownership
Data owners
Asset owners
Asset owners
Business owners
Data processors
Anonymization
NIST 800-53
Security baselines
Scoping
Standards
NISR
CIS
PCI
Security Architecture
Cryptography
FIPS 140
Ciphers
One time pads
Symmetric key
Asymmetric key
Hashing
Data encryption standards
Key management
PKI
Public key encryption
Private key encryption
Key distribution
Key escrow and recover
RSA
Elliptic curve
Digital signatures
HMAC
Public key infra
Certificate authority
Certificates
Digital signing
TPM
Portable device encryption
PGP
TLS/SSL
Networking
IPSEC
Wpa2
Wireless
Cryptographic attacks
Man in middle attacks
Security architecture references
Perimeter security
Access controls
ITSEC
Org certification and accreditation
TPM
Protection
Os level
Application
Firmware
BIOS
UEFI
Memory
Browser
System/RAM
Pendrives
Storage
Client based systems
Applets
Java
Server based systems
Cache based attacks
ARP
DNS
Database security
Backup monitoring
Distributed systems security
DMZ
Endpoint security
Cloud security
Virutual machines security
Paas
Saas
Iaas
Cloud acces security broker
Peer to peer
IOT https://www .nist.gov/itl/applied-cybersecurity/nist-initiatives-iot
ICS
SCADA
PLC
SAML
HIDS
USB security
Device security
Device encryption
Remote wiping
Lockout
Screen locks
GPS
Application control
Storage segmentation
Asset Tracking
Inventory control
Mobile Device Management
BYOD
Device Access Control
Removable storage media
Application security
Key Management
Credential Management
Authentication
Geo tagging
Encryption
Application whitelisting
Corporate mobile devices
Virtual mobile infrastructure
Mobile
Android
ios
Web app security
OWASP
TLS/SSL
DLP
Data Ownership
Forensics
Patch Management
System Engineering
Vulnerability Management
Antivirus Management
User acceptance and policies
Asset on boarding and off boarding
Embedded systems security
Cyber physical security
Network segmentation
Application firewalls
Security layers
Version control
Monitoring
Network Security
OSI
TCP/IP
Port numbers
Tcp three way handshake
Protocol discovery using sniffer
Organization ipv 4 ranges
Network diagram
Attacks
Dos
Dns poisoning
Domain hijacking
Wireless networks
Secure encryption protocols
Wireless attacks
Network access control
Attacks on networks
Firewalls
Secure communication protocols
Authentication protocosl
Vedio/audio communication protocols
Social engineering attacks
Email security
Remote access security
Vpn
Tunneling
Virtualization
NAT
Identity and access management
Assets access
CIA triad for authentication/authorization/identification
Password manament
Best practices
Single sign on
Kerberos
Azure dc
Security Assessment and training
Security testing and assessment
External audits
Third party audits
Vulnerability assessments
Scap
Scom
Network discovery scanning
Network vulnerability scanning
Database vulnerability scanning
Penetrations testing
Secure code review
Log monitoring
Account management
Backup reviews
Security operations
Privilege management
Os baselining
Incident response
Preventive measure
Logging and monitoring
Security assessment and testing
Cyber Investigations
Forensics
Asset Security
Security Architecture and Engineering
Communication and Network Security
Identity and Access Management (IAM)
Security Assessment and Testing
Security Operations
Software Development Security
References:
https://blog.rsisecurity.com/what-is-the-purpose-of-cybersecurity-architecture/
https://blog.rsisecurity.com/what-is-cybersecurity-architecture/
https://www.simplilearn.com/book-resources-to-read-for-cissp-certification-exam-article
https://www.conqueryourexam.com/best-cissp-study-guides/https://www.reddit.com/r/cissp/comments/c6d0jt/my_personal_cissp_journey_and_recommended_study/
https://www.reddit.com/r/cissp/comments/fdd33d/received_4_books_which_ones_are_best/
Last updated
Was this helpful?