SY0 601 Session 2
SY0 601 Session 2
Some security models and researchers identify other properties that secure systems
should exhibit. The most important of these is non-repudiation.
means that a subject cannot deny doing something, such as creating, modifying, or
sending a resource. For example, a legal document, such as a will, must usually be
witnessed when it is signed. If there is a dispute about whether the document was
correctly executed, the witness can provide evidence that it was.
IT professionals working in a role with security responsibilities must be competent in
a wide range of disciplines, from network and application design to procurement and
take to protect the confidentiality, availability, and integrity of sensitive data and
security policy to support the goals of the might be very different for a school
these organizations, or any other organization (in any sector of the economy, whether
profit-making or non-profit-making) should have the same interest in ensuring that its
responsibilities will depend on the size and hierarchy of an organization, but these
(ICT) or accounting.
However, the goals of a network manager are not always well-aligned with the
goals of security; network management focuses on availability over confidentiality.
Consequently, security is increasingly thought of as a dedicated function or business
unit with its own management structure.
Managers may have responsibility for a domain, such as building control, ICT, or
accounting.
Non-technical staff have the responsibility of complying with policy and with any
relevant legislation.
External responsibility for security (due care or liability) lies mainly with directors
or owners, though again it is important to note that all employees share some
measure of responsibility.
A security operations center (SOC) is a location where security professionals
monitor and protect critical information assets across other business functions, such
establish, maintain, and finance, they are usually employed by larger corporations, like
operations departments or teams can lead to silos, where each team does not work
test, and release software faster and more reliably. Many consider a DevOps approach
to administration as the only way organizations can take full advantage of the potential
contact for the notification of security incidents. This function might be handled by the
functions is often the responsibility of the IT department. There are many different
ways of thinking about how IT services should be governed to fulfill overall business
company policies and provide checklists of procedures, activities, and technologies that
should ideally be in place. Collectively, these procedures, activities, and tools can be
divided into three broad categories, representing the way the control is implemented:
firmware). For example, firewalls, anti-virus software, and OS access control models
are technical controls. Technical controls may also be described as logical controls.
For example, security guards and training programs are operational controls rather
include risk identification or a tool allowing the evaluation and selection of other
security controls.
Security controls can also be classified in types according to the goal or function they
perform:
—the control acts to eliminate or reduce the likelihood that an attack can
succeed. A preventative control operates before an attack can take place. IPS or Access
control lists (ACL) configured on firewalls and file system objects are preventative-
controls.
—the control may not prevent or deter access, but it will identify and
the progress of an attack. Logs provide one of the best examples of detective-type
controls.or IDS
system that can restore data that was damaged during an intrusion. Another
ISO 27001 is part of an overall 27000 series of information security standards, also known
as 27K
NIST Cybersecurity Framework
A cybersecurity framework ( ) is a list of activities and objectives undertaken to
mitigate risks. The use of a framework allows an organization to make an objective
statement of its current cybersecurity capabilities, identify a target level of capability,
and prioritize investments to achieve that target. This is valuable for giving a structure
to internal risk management procedures and provides an externally verifiable
statement of regulatory compliance. Frameworks are also important because they save
an organization from building its security program in a vacuum, or from building the
program on a foundation that fails to account for important security concepts.
There are many different frameworks, each of which categorize cybersecurity activities
and controls in slightly different ways. These frameworks are non-regulatory in the
sense that they do not attempt to address the specific regulations of a specific industry
but represent "best practice" in IT security governance generally. Most organizations
will have historically chosen a particular framework; some may use multiple
frameworks in conjunction.
Most frameworks are developed for an international audience; others are focused on
a domestic national audience. Most of the frameworks are associated with certification
programs to show that staff and consultants can apply the methodologies successfully.
The National Institute of Standards and Technology ( ) Cybersecurity Framework
( ) is a relatively new addition to the IT governance space and distinct from other
frameworks by focusing exclusively on IT security, rather than IT service provision more
generally (nist.gov/cyberframework). It is developed for a US audience and focuses
somewhat on US government, but its recommendations can be adapted for other
countries and types of organizations.
NIST's Risk Management Framework ( ) pre-dates the CSF. Where the CSF focuses
on practical cybersecurity for businesses, the RMF is more prescriptive and principally
intended for use by federal agencies (csrc.nist.gov/projects/risk-management/rmf-
overview).
As well as its cybersecurity and risk frameworks, NIST is responsible for issuing the
Federal Information Processing Standards ( ) plus advisory guides called Special
Publications (csrc.nist.gov/publications/sp). Many of the standards and technologies
covered in CompTIA Security+ are discussed in these documents.