Cyber Attacks

Understand Requirements for Investigation Types

2020-07-15T12:27:54+00:00Tags: , , , , , , , , , , , |

Understand Requirements for Investigation Types Investigations and incident management must often be conducted simultaneously in a well-coordinated and controlled manner to ensure that the initial actions of either activity don’t destroy evidence or cause further damage to the organization’s assets. In this part of this tutorial, we'll take a look at requirements for investigation [...]

Conduct or Facilitate Security Audits

2020-06-24T12:15:02+00:00Tags: , , , , , , , , , , , , , , |

Conduct or Facilitate Security Audits Security audits should occur on a daily basis according to the policy fixed in place by the organization. Internal auditing normally occurs more frequently than external or third-party auditing. Internal Security auditing should be an ongoing task of the security team. Process of aggregating log data is not very [...]

Analyze Test Output and Generate a Report

2020-07-15T12:31:30+00:00Tags: , , , , , , , , , , , , , , , , , , |

Analyze Test Output and Generate a Report Security experts must be able to analyze log and test data, and report this information in meaningful ways, to senior management teams so they are alert of possible risks or harm, and make informed security decisions. Organizations usually have different levels of management. Security professionals need to [...]

Conduct Security Control Testing- Part 2

2020-07-15T12:45:53+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Conduct Security Control Testing- Part 2 This page is dedicated to continuing the Conduct Security Control Testing title. In this part of this tutorial, we'll take a look at control testing to help you understand the different aspects of control testing. You can see the previous section here. Log Reviews Reviewing various security logs [...]

Conduct Security Control Testing- Part 1

2020-07-15T12:43:43+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Conduct Security Control Testing- Part 1 One of the most important topics in CISSP course is conduct security control testing. In this part of this tutorial, we'll take a look at control testing to help you understand the different aspects of control testing. Security control testing employs various tools and techniques, including vulnerability assessments, [...]

Manage the Identity and Access Provisioning Lifecycle

2020-07-16T06:41:38+00:00Tags: , , , , , , , , , , , , |

Manage the Identity and Access Provisioning Lifecycle The life cycle consists of the assignment of privileges through roles and designation. The following design, a typical identity and provisioning life cycle consists of these steps: Enrolment of user or create user Determining roles, privileges, and access requirements to systems and applications Provisioning user accounts to [...]

Manage Identification and Authentication

2020-07-16T06:39:28+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Manage Identification and Authentication of People, Devices, and Services In this part of this tutorial, we'll take a look at Manage Identification and Authentication of People, Devices, and Services to help you understand the different aspects of authentication. Identity Management Implementation The core activity within identity and access management (IAM) is the management of [...]

Control Physical and Logical Access to Assets

2020-07-16T06:04:46+00:00Tags: , , , , , , , , , , , , , , , , , |

Control Physical and Logical Access to Assets Controlling access to assets is one of the central approaches to security. In this section; an asset includes information, systems, devices, and facilities. Systems An organization’s systems include any IT systems, which provide one or more services. Like a SQL Server, a FTP server, a Domain Controller, [...]

Go to Top