2023+CISM+Domain+1+Study+guide+by+ThorTeaches Com+v2 1
2023+CISM+Domain+1+Study+guide+by+ThorTeaches Com+v2 1
● We will be covering our govern, our values, vision, mission, our strategies, policies, standards, and
processes.
● We look at the policies, the procedures, the laws we need to adhere to.
● Data protection, the NIST Cyber Security framework, NIST Risk management framework, NIST 800-
37, 800-53, ISO 27001 and 27002
● We talk about the CIA triad, which is the foundation of Information Security.
● Administrative security controls, roles, and responsibilities.
● This should be what you are tested on for Domain 1 until the next planned CISM curriculum
change in 2027.
1 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
C-Level Executives (Senior Leadership) –
Ultimately Liable
● CEO: Chief Executive Officer.
● CIO: Chief Information Officer.
● CTO: Chief Technology Officer.
● CSO: Chief Security Officer.
● CISO: Chief Information Security Officer.
● CFO: Chief Financial Officer.
● Normal organizations obviously have more
C-Level executives, the ones listed here you
need to know.
Links on all these as well as ones from previous slides in the “Extras” lecture.
2 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
Defense in Depth – Also called Layered Defense or Onion Defense
● We implement multiple overlapping security controls to
protect an asset.
● This applies both to physical and logical controls.
o To get to a server, you may have to go through
multiple locked doors, security guards, man
traps.
o To get to the data, you may need to get past
firewalls, routers, switches, the server, and the
application’s security.
o Each step may have multiple security controls.
● No single security control secures an asset.
● By implementing Defense in Depth, you improve your
organization’s Confidentiality, Integrity, and Availability.
3 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
● Policies – Mandatory
o High level, non-specific.
o They can contain “Patches, updates, strong
encryption”
o They will not be specific to “OS, encryption
type, vendor Technology”
● Standards – Mandatory
o Describes a specific use of technology (All
laptops are W10, 64bit, 8gig memory, etc.)
● Guidelines – Non-Mandatory
o Recommendations, discretionary –
Suggestions on how you would to do it
● Procedures – Mandatory
o Low level step-by-step guides, specific.
o They will contain “OS, encryption type,
vendor Technology”
● Baselines (Benchmarks) – Mandatory
o Benchmarks for server hardening, apps, network. Minimum requirement, we can
implement stronger if needed.
4 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
Gap Analysis
● Identify the existing process:
o What are we doing?
● Identify the existing outcome:
o How well do we do it?
● Identify the desired outcome:
o How well do we want to do?
● Identify and document the gap:
o What is the difference between
now and desired result?
● Identify the process to achieve the desired outcome:
o How can we possibly get to the desired result?
● Develop the means to fill the gap:
o Build the tool or processes to get the result.
● Develop and prioritize Requirements to bridge the gap.
Organizational Finances
● OPEX vs. CAPEX:
o OPEX (Operating Expense) is the ongoing cost for running a product, business, or system.
(Keeping the lights on).
o CAPEX (Capital Expenditure) is the money a company spends to buy, maintain, or improve
its fixed assets, such as buildings, vehicles, equipment, or land.
● Business plans, roadmaps:
o We build our organizational business plans based on the organizations mission statement
and vision at the direction of senior leadership.
o We have 1-year, 3-year, and 5-year business plans and roadmaps.
5 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
● Fiscal years (budget year):
o We plan our budgets according to our organization’s fiscal year.
● We use:
o Encryption for data at rest (for instance AES256), full disk encryption.
o Secure transport protocols for data in motion. (SSL, TLS or IPSEC).
6 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
o Best practices for data in use - clean desk, no shoulder surfing, screen view angle
protector, PC locking (automatic and when leaving).
o Strong passwords, multi-factor authentication, masking, access control, need-to-know,
least privilege.
● We use:
o Cryptography (again).
o Check sums (This could be CRC).
o Message Digests also known as a hash (This could be MD5, SHA1 or SHA2).
o Digital Signatures – non-repudiation.
o Access control.
● We use:
o IPS/IDS.
o Patch Management.
o Redundancy on hardware power (Multiple power supplies/UPS’s/generators), Disks
(RAID), Traffic paths (Network design), HVAC, staff, HA (high availability) and much more.
o SLA’s – How much uptime do we want (99.9%?) – (ROI).
● The opposites of the CIA Triad are DAD (Disclosure, Alteration and Destruction).
o Disclosure – Someone not authorized getting access to your information.
o Alteration – Your data has been changed.
o Destruction – Your data or systems have been destroyed or rendered inaccessible.
7 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
Sensitive Information and Media Security
Sensitive Information
● Any organization has data that is considered sensitive for a variety of reasons.
● We want to protect the data from Disclosure, Alteration and Destruction (DAD).
● Data has 3 States: We want to protect it as well as we can in each state.
o Data at Rest (Stored data): This is data on disks, tapes,
CDs/DVDs, USB sticks
▪ We use disk encryption (full/partial), USB encryption,
tape encryption (avoid CDs/DVDs).
▪ Encryption can be hardware or software encryption.
o Data in Motion (Data being transferred on a network).
▪ We encrypt our network traffic, end to end encryption,
this is both on internal and external networks.
o Data in Use: (We are actively using the files/data, it can’t be
encrypted).
▪ Use good practices: Clean desk policy, print policy, allow no ‘shoulder surfing’,
may be the use of view angle privacy screen for monitors, locking computer
screen when leaving workstation.
8 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
● Formal Access Approval:
o Document from the data owner approving access to the data for the subject.
o Subject must understand all requirements for accessing the data and the liability involved
if compromised, lost, or destroyed.
o Appropriate Security Clearance is required as well as the Formal Access Approval.
● Need to know:
o Just because you have access does not mean you are allowed the data.
o You need a valid reason for accessing the data. If you do not have one you can be
terminated/sued/jailed/fined.
▪ Leaked information about Octomom Natalie Suleman cost 15 Kaiser employees
fines or terminations because they had no valid reason for accessing her file.
▪ We may never know who actually leaked the information. It may not be one of
the 15, but they violated HIPAA by accessing the data.
● Least privilege: Users have the minimum necessary access to perform their job duties.
9 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
o Management level, they assign sensitivity labels and backup frequency.
o This could be you or a data owner from HR, payroll, or other departments.
● Data custodians:
o These are the technical hands-on employees who do the backups, restores, patches,
system configuration. They follow the directions of the data owner.
● System owner:
o Management level and the owner of the systems that house the data.
o Often a data center manager or an infrastructure manager.
● Data controllers and data processors:
o Controllers create and manage sensitive data in the organization (HR/Payroll)
o Processors manage the data for controllers (Outsourced payroll)
● Security Administrators:
o Responsible for firewalls, IPS’ (Intrusion Prevention Systems), IDS’ (Intrusion Detection
Systems), security patches, create accounts, and assigns access to the data following the
data owners’ directions.
● Supervisors:
o Responsible for user behavior and assets created by the users. Directly responsible for
user awareness and needs to inform the security administrator if there are any changes to
user employment status, user access rights, or any other pertinent changes to an
employee’s status.
● Users:
o These are the users of the data. User awareness must be trained; they need to know what
is acceptable and what is not acceptable, and the consequences for not following the
policies, procedures, and standards.
● Auditors:
o Responsible for reviewing and confirming our security policies are implemented correctly,
we adhere to them, and that they provide the protection they should.
Ethics
ISACA professional Code of Ethics: You sign this before the exam.
1. Support the implementation of, and encourage compliance with, appropriate standards and
procedures for the effective governance and management of enterprise information systems and
technology, including audit, control, security, and risk management.
2. Perform their duties with objectivity, due diligence, and professional care, in accordance with
professional standards.
3. Serve in the interest of stakeholders in a lawful manner, while maintaining high standards of
conduct and character, and not discrediting their profession or the Association.
4. Maintain the privacy and confidentiality of information obtained in the course of their activities
unless disclosure is required by legal authority. Such information shall not be used for personal
benefit or released to inappropriate parties.
5. Maintain competency in their respective fields and agree to undertake only those activities they
can reasonably expect to complete with the necessary skills, knowledge, and competence.
6. Inform appropriate parties of the results of work performed including the disclosure of all
significant facts known to them that, if not disclosed, may distort the reporting of the results.
10 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
7. Support the professional education of stakeholders in enhancing their understanding of the
governance and management of enterprise information systems and technology, including audit,
control, security, and risk management.
Failure to comply with this Code of Professional Ethics can result in an investigation into a member's or certification
holder's conduct and, ultimately, in disciplinary measures.
11 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
● Civil Law (Tort Law):
o Individuals, groups, or organizations are the victims and proof must be “the majority of
proof”.
o Financial fines to “Compensate the victim(s)”.
● Administrative Law (Regulatory Law):
o Laws enacted by government agencies (FDA Laws, HIPAA, FAA Laws, etc.).
● Private Regulations:
o Compliance is required by contract (For instance PCI-DSS).
● Customary Law:
o Mostly handles personal conduct and patterns of behavior and it is founded in traditions
and customs of the area or region.
● Religious Law:
o Based on the religious beliefs in that area or country, they often include a code of ethics
and moralities which are required to be upheld.
● Liability:
o If the question is who is ULTIMATELY liable, the answer is Senior Leadership. This does not
mean you are not liable; you may be, that depends on Due Care.
Who is held accountable? Who is to blame? Who should pay?
● Due Diligence and Due Care:
o Due Diligence – The research to build the IT Security architecture of your organization,
best practices and common protection mechanisms, and research of new systems before
implementing.
o Due Care – Prudent person rule
▪ What would a prudent person do in this situation?
● Implementing the IT Security architecture, keep systems patched. If
compromised: fix the issue, notify affected users (Follow the Security
Policies to the letter).
Evidence
How you obtain and handle evidence is VERY important.
● Types of evidence:
o Real Evidence: Tangible and physical objects in IT Security: Hard disks, USB drives – NOT
the data on them.
o Direct Evidence: Testimony from a first-hand witness, what they experienced with their 5
senses.
o Circumstantial Evidence: Evidence to support circumstances for a point or other evidence.
o Corroborative Evidence: Supports facts or elements of the case; not facts on their own
but they support other facts.
12 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
● Hearsay:
o Not first-hand knowledge – normally inadmissible in a case.
o Computer-generated records, for us that means log files are considered hearsay, but case
law and updates to the Federal Rule of Evidence have changed that.
o Rule 803 provides for the admissibility of a record or report that was:
▪ “Made at or near the time by, or from information transmitted by, a person with
knowledge, if kept in the course of a regularly conducted business activity, and if it
was the regular practice of that business activity to make the memorandum,
report, record or data compilation.”
● Best Evidence Rule – The courts prefer the best evidence possible.
o Evidence should be accurate, complete, relevant, authentic, and convincing.
● Secondary Evidence – This is common in cases involving IT.
o Logs and documents from the systems are considered secondary evidence.
● Evidence Integrity – It is vital that the evidence’s integrity cannot be questioned.
o We do this with hashes.
o Any forensics is done on copies and never the originals.
o We check hash on both original and copy before and after the forensics.
● Chain of Custody – This is done to prove the integrity of the data; that no tampering was done.
o Who handled it?
o When did they handle it?
o What did they do with it?
o Where did they handle it?
Reasonable Searches
● The Fourth Amendment to the United States Constitution protects citizens from unreasonable
search and seizure by the government.
● In all cases, the court will determine if evidence was obtained legally.
● Exigent circumstances apply if there is an immediate threat to human life or of evidence
destruction.
● Your organization needs to ensure that our employees are aware their actions are monitored.
Privacy
● You as a citizen and consumer have the right that your Personally Identifiable Information (PII) is
being kept securely.
o There are a number of Laws and Regulations in place to do just that.
13 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
● US privacy regulation is a patchwork of laws, some overlapping and some areas with no real
protection.
● EU Law – Very pro-privacy, strict protection on what is gathered, how it is used and stored.
o There are a lot of large lawsuits against large companies for doing what is legal in the US
(Google, Apple, Microsoft, etc.)
Rules, Regulations, and Laws you should know for the exam (US)
● HIPAA (Not HIPPA) – Health Insurance Portability and Accountability Act:
o Strict privacy and security rules on handling of PHI (Protected Health Information).
● Security Breach Notification Law:
o NOT Federal, all 50 states have individual laws, know your state.
● Electronic Communications Privacy Act (ECPA):
o Protection of electronic communications against warrantless wiretapping.
o The Act was weakened by the Patriot Act.
● PATRIOT Act of 2001:
o Expands law enforcement electronic monitoring capabilities.
o Allows search and seizure without immediate disclosure.
● Computer Fraud and Abuse Act (CFAA) – Title 18 Section 1030:
o Most commonly used law to prosecute computer crimes.
● Gramm-Leach-Bliley Act (GLBA):
o Applies to financial institutions; driven by the Federal Financial Institutions.
● Sarbanes-Oxley Act of 2002 (SOX):
o Directly related to the accounting scandals in the late 90’s.
● Payment Card Industry Data Security Standard (PCI-DSS):
o Technically not a law, created by the payment card industry.
o The standard applies to cardholder data for both credit and debit cards.
o Requires merchants and others to meet a minimum set of security requirements.
o Mandates security policy, devices, control techniques, and monitoring.
14 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
● Right to access: Data controllers must be able to provide a free copy of an individual’s data if
requested.
● Right to erasure: All users have a “right to be forgotten”.
● Data portability: All users will be able to request access to their data “in an electronic format”.
● Data breach notification: Users and data controllers must be notified of data breaches within 72
hours.
● Privacy by design: When designing data processes, care must be taken to ensure personal data is
secure. Companies must ensure that only data is “absolutely necessary for the completion of
duties”.
● Data protection officers: Companies whose activities involve data processing and monitoring
must appoint a data protection officer.
Wassenaar Arrangement
Export/Import controls for Conventional Arms and Dual-Use Goods and Technologies.
● 41 countries are a part of the arrangement.
● Cryptography is considered “Dual-Use”.
o Iran, Iraq, China, Russia, and others have import restrictions on strong cryptography.
o If it is too strong it cannot be broken; they want to be able to spy on their citizens.
o Companies have to make “country specific” products with different encryption standards.
15 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
● The arrangement is used both to limit what countries want to export and to what some want to
import.
● It is the responsibility of the organization to know the laws concerning import/export from and to
a certain country.
● The Arrangement covers 10 Categories:
o Special materials and related equipment
o Materials processing
o Electronics
o Computers
o Telecommunications, "Information security”
o Sensors and "Lasers”
o Navigation and avionics
o Marine
o Aerospace and propulsion.
Intellectual Property
● Copyright © - (Exceptions: first sale, fair use).
o Books, art, music, software.
o Automatically granted and lasts 70 years after creator’s death or 95 years after creation
by/for corporations.
● Trademarks ™ and ® (Registered Trademark).
o Brand names, logos, slogans – Must be registered, is valid for 10 years at a time, can be
renewed indefinitely.
● Patents: Protects inventions for 20 years (normally) – Cryptography algorithms can be patented.
o Inventions must be:
▪ Novel (New idea no one has had before).
▪ Useful (It is actually possible to use, and it is useful to someone).
▪ Nonobvious (Inventive work involved).
● Trade Secrets.
o You tell no one about your formula, your secret sauce. If discovered anyone can use it;
you are not protected.
16 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
● Trade Secrets.
o While an organization can do nothing if their Trade Secret is discovered, how it is done can
be illegal.
● Cyber Squatting – Buying a URL you know someone else will need (gray area legally).
● Typo Squatting – Buying a URL that is VERY close to real website name (Can be illegal in certain
circumstances).
17 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
● Background checks:
o References, Degrees, Employment, Criminal, Credit history (less common, more costly).
o For sensitive positions the background check is an ongoing process.
● Privilege monitoring:
o The more access and privilege an employee have the more we keep an eye on their
activity.
o They are already screened more in depth and consistently, but they also have access to
many business-critical systems, we need to audit their use of that access.
o With more access comes more responsibility and scrutiny.
18 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
● User and Entity Behavior Analytics (UEBA):
o We use machine/deep learning to model typical and atypical user behavior, setting a
baseline.
o With the baseline, we can identify anomalies and threats sooner.
o For that we look at:
▪ Use cases – How do normal users use our network and data?
▪ Data sources – Data sources, normally a data lake/warehouse or SIEM, should not
be deployed directly.
▪ Analytics – To build the baseline and detect anomalies.
Cobit 5
● Principle 1: Meeting Stakeholder Needs 1.
o Enterprises have many stakeholders, and ‘creating Meeting
stakeholders
needs
value’ means different—and sometimes conflicting—
things to each of them.
o Governance is about negotiating and deciding amongst 5. Separating
Governance
2. Covering
the
different stakeholders’ value interests. 1. From
management
COBIT 5
Enterprise
End-to end
o The governance system should considerMeeting all stakeholders Principles
when making benefit, resource, and stakeholders
risk assessment
decisions.
needs
o For each decision, the following can and should be
asked: 4. Enabling a
Holistic
3. Applying a
Single
▪ Who receives the benefits? Approach Integrated
Framework
▪ Who bears the risk?
▪ What resources are required?
o Stakeholder needs have to be transformed into an enterprise’s practical
1.
strategy. Meeting
19 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
● Principle 3: Applying a Single, Integrated Framework 1.
o COBIT 5 aligns with the latest relevant other Meeting
stakeholders
needs
standards and frameworks used by enterprises:
▪ Enterprise: COSO, COSO ERM, ISO/IEC 9000,
ISO/IEC 31000 5. Separating
Governance 2. Covering
▪ IT-related: ISO/IEC 38500, ITIL, ISO/IEC From
management
the Enterprise
end-to-end
27000 series, TOGAF, PMBOK/PRINCE2, COBIT 5
Principles
CMMI
o This allows the enterprise to use COBIT 5 as the
overarching governance and management
3. Applying a
framework integrator. 4. Enabling a Single
Holistic Integrated
o ISACA plans a capability to facilitate COBIT user Approach Framework
20 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
enterprise. Information is required for keeping the organization running
and well governed, but at the operational level, information is very often
the key product of the enterprise itself.
6. Services, infrastructure, and applications: Include the infrastructure,
technology and applications that provide the enterprise with information
technology processing and services
7. People, skills and competencies: Are linked to people and are required
for successful completion of all activities and for making correct decisions
and taking corrective actions
21 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
ISO/IEC 27001 and 27002
● Most organizations have many different information security controls, if we do not have an
information security management system (ISMS), our controls are often disorganized and only
cover some of our organization.
● ISO/IEC 27001 is a management system that is used to bring information security under
management control and gives specific requirements. It is the framework, and we can get certified
against ISO27001.
● ISO/IEC 27002 provides best practice recommendations on information security controls for use
by those responsible for initiating, implementing, or maintaining ISMS. Much more in detail, how
we implement our ISMS.
22 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
● Tier 3: Information System.
o Step 2: Select Security Controls.
23 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
There are seven major objectives or this update
1. To provide closer linkage and communication between the risk management processes and
activities at the C-suite.
2. To institutionalize critical risk management preparatory activities at all risk management
levels.
3. To demonstrate how the NIST Cybersecurity Framework [NIST CSF] can be aligned with the
RMF and implemented using established NIST risk management processes.
4. To integrate privacy risk management processes into the RMF to better support the privacy
protection needs for which privacy programs are responsible.
5. To promote the development of trustworthy secure software and systems.
6. To integrate security-related, supply chain risk management (SCRM) concepts into the RMF.
7. To allow for an organization-generated control selection approach to complement the
traditional baseline control selection approach and support the use of the consolidated
control catalog in NIST Special Publication 800-53, Revision 5.
24 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
NIST Cyber Security Framework Rev. 1.1
25 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
Data Security Frameworks
We use standards, baselines, scoping, and tailoring to decide which controls we use, and how
we deploy them.
● Different controls are deployed for data at rest and data in motion.
● Some of the standards and frameworks used could be PCI-DSS, ISO27000, OCTAVE, COBIT, or ITIL.
● Scoping is determining which portion of a standard we will deploy in our organization.
o We take the portions of the standard that we want or that apply to our industry and
determine what is in scope and what is out of scope for us.
● Tailoring is customizing a standard to your organization.
o This could be, we will apply this standard, but we use a stronger encryption (AES 256bit).
● Certification: A system, and the security measures to protect it, meet the security requirements
set by the data owner or by regulations/laws.
● Accreditation: The data owner accepts the certification and the residual risk. This is required
before the system can be put into production.
Data Protection
● Digital Rights Management (DRM) - Uses technology and systems to protect copyrighted digital
media.
o Encryption – Regional DVDs.
o Permissions management and limiting access.
o Serial numbers, limit installations, expiry dates, IP addresses, geolocation, VPN.
o Copy restrictions: Copy, edit, saving, screenshots, screen recording, printing.
o Persistent authentication and audit trails.
o Tracking – watermarks or meta data embedded in files.
● Cloud Access Security Broker (CASB) – on-premises or cloud software between our users and our
cloud applications.
o Monitors user activity warns admins about possible malicious/dangerous actions, malware
prevention, protects against shadow IT, and enforces security policy compliance.
● Data Loss Prevention (DLP)
o Loss vs. leak.
o Data in use, in motion, and at rest.
o Network and endpoint DLP.
26 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
● ABAC - (Attribute Based Access Control) is where access to objects is granted based on subjects,
objects, and environmental conditions.
o Attributes could be:
▪ Subject (user) – Name, role, ID, clearance, etc.
o Object (resource) – Name, owner, and date of creation.
o Environment – Location, and/or time of access, and threat levels.
● RUBAC - (Rule Based Access Control) is access that’s granted based on IF/THEN
statements.
27 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
● Graham-Denning Model – uses Objects, Subjects, and Rules.
o The 8 rules that a specific subject can execute on an object are:
1. Transfer Access.
2. Grant Access.
3. Delete Access.
4. Read Object.
5. Create Object.
6. Destroy Object.
7. Create Subject.
8. Destroy Subject.
● Clark-Wilson - Integrity:
o Separates end users from the back-end data through ‘Well-
formed transactions’ and ‘Separation of Duties’.
o The model uses Subject/Program/Object.
▪ We have discussed the Subject/Object relationship
before, but this puts a program between the two.
▪ We don’t allow people access to our inventory when
they buy from us.
▪ We give them a limited functionality interface they
can access.
o Separation of duties:
▪ The certifier of a transaction and the implementer are different entities.
▪ The person making purchase orders should not be paying the invoices.
o Well-formed transactions are a series of operations that transition a system from one
consistent state to another consistent state.
28 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
● Brewer-Nash (Chinese Wall or Information Barriers):
o Designed to provide controls that mitigate conflict of interest in
commercial organizations and is built upon an information flow
model.
o No information can flow between the subjects and objects in a
way that would create a conflict of interest.
● Non-Interference Model:
o Ensures that any actions that take place at a higher security
level do not affect or interfere with actions that take place at a
lower level.
o The model is not concerned with data flow, but with what a
subject knows about the state of the system.
o Any changer by a higher-level subject will never be noticed by a lower-level subject.
29 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
● Security Modes - can be MAC or DAC (Mandatory or Discretionary Access Control):
o The systems contain information at
various levels of security classification.
o The mode is determined by:
▪ The type of users who will be
directly or indirectly accessing
the systems.
▪ The type of data, including
classification levels,
compartments, and categories
that are processed on the
system.
▪ The type of levels of users, their need to know, and formal access approvals that
the users will have.
o Dedicated security mode - All users must have:
▪ Signed NDA for ALL information on the system.
▪ Proper clearance for ALL information on the system.
▪ Formal access approval for ALL information on the system.
▪ A valid need to know for ALL information on the system.
▪ users can access ALL data.
o System High Security Mode - All users must have:
▪ Signed NDA for ALL information on the system.
▪ Proper clearance for ALL information on the
system.
▪ Formal access approval for ALL information on
the system.
▪ A valid need to know for SOME information on
the system.
▪ All users can access SOME data, based on their
need to know.
o Compartmented Security Mode - All users must have:
▪ Signed NDA for ALL information on the system.
▪ Proper clearance for ALL information on the system.
▪ Formal access approval for SOME information they will access on the system.
▪ A valid need to know for SOME information on the system.
▪ All users can access SOME data, based on their need to know and formal access
approval.
o Multilevel Security Mode - (Controlled Security Mode) - All users must have:
▪ Signed NDA for ALL information on the system.
▪ Proper clearance for SOME information on the system.
▪ Formal access approval for SOME information on the system.
▪ A valid need to know for SOME information on the system.
▪ All users can access SOME data, based on their need to know, clearance and
formal access approval.
30 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
Artificial Intelligence
● Intelligence exhibited by machines, rather than humans or other animals.
● What true AI is, is a topic of discussion, what was considered AI years
ago we have achieved and when once goal is reached the AI
definition is tweaked a little.
● From what we are seeing published we do in my mind not currently
have true AI, but very highly simulated intelligence, that being said
IBM and Google do seem to be getting a lot closer.
● It is also used when a machine mimics cognitive functions that
humans associate with other human minds, such as learning and
problem solving.
● AI currently defined as advice that perceives its environment and
takes actions that maximize its chance of success at some goal, not
through experience/programming, but through reasoning.
● Expert systems:
o A computer system that emulates the decision-making ability of a human expert.
o Designed to solve complex problems by reasoning about knowledge, represented mainly
as if–then rules rather than through conventional procedural code.
o An expert system is divided into two subsystems:
▪ The knowledge base represents facts and rules.
▪ The inference engine applies the rules to the known facts to deduce new facts and
can also include explanation and debugging abilities.
● ANN's (Artificial neural networks):
o Computing systems inspired by the biological neural networks that constitute animal
brains, we make decisions based on 1000’s of memories, stories, the situation and many
other factors, the ANN tries to emulate that.
o The systems learn and progressively improve their performance, to do tasks, generally
without task-specific programming.
o They can learn to identify images that contain geckos by analyzing example images that
have been manually labeled as "gecko" or "no gecko" and using the analytic results to
identify geckos in other images.
o They are mostly used in areas that are difficult to express in a traditional computer
algorithm using rule-based programming.
o An ANN is based on a collection of connected units called artificial neurons.
o Each connection (synapse) between neurons can transmit a signal to another neuron.
o Typically, neurons are organized in layers, different layers may perform different
transformations on their inputs.
o Signals travel from the first input to the last output layer, at times after traversing the
layers multiple times.
31 | Page
https://thorteaches.com/
CISM Domain 1 Lecture notes
● GP (Genetic Programming):
o A technique where computer programs are encoded as a set of genes that are then
modified (evolved) using an evolutionary algorithm often a GA (Genetic Algorithm).
o The results are computer programs able to perform well in a predefined task.
o The methods used to encode a computer program in an artificial chromosome and to
evaluate its fitness with respect to the predefined task are central in the GP technique and
still the subject of active research.
o GP evolves computer programs, traditionally represented in memory as tree structures.
o Trees can be easily evaluated in a recursive manner.
o Every tree node has an operator function, and every terminal node has an operand,
making mathematical expressions easy to evolve and evaluate.
o Traditionally GP favors the use of programming languages that naturally embody tree
structures for example, Lisp or other functional programming languages.
● We will be covering our govern, our values, vision, mission, our strategies, policies, standards, and
processes.
● We look at the policies, the procedures, the laws we need to adhere to.
● Data protection, the NIST Cyber Security framework, NIST Risk management framework, NIST 800-
37, 800-53, ISO 27001 and 27002
● We talked about the CIA triad, which is the foundation of Information Security
● Administrative security controls, roles, and responsibilities.
● This should be what you are tested on for Domain 1 until the next planned CISM curriculum
change in 2027.
32 | Page
https://thorteaches.com/