Select Page

Key points in Security Operations

CISSP

Security and Cyber Threats

  • Hackers and Crackers: Individuals who attempt to breach systems to prove their skills as intruders.
  • Pseudo Flaw: A false vulnerability intentionally placed in a system to attract and mislead attackers.
  • Darknet: Unused network space that can be monitored for detecting unauthorized activities.
  • Noise and Perturbation: A technique of inserting bogus information into systems to mislead attackers.

Access Control and Privileges

  • Entitlement: Refers to the level of privileges granted to users during the initial provisioning of an account. An entitlement audit can help identify users with excessive privileges.
  • Aggregation (Privilege Creep): The gradual accumulation of unnecessary privileges by users, which can pose security risks.

Virtualization

  • Hypervisor: A software component that manages virtual environments and controls access to physical resources. It adds an additional attack surface and should be secured and regularly updated.

Legal and Forensic Considerations

  • Notebook: A bound notebook is preferred for legal investigations to ensure the integrity of recorded information.
  • Exigent Circumstances: Allows law enforcement officials to seize evidence without a warrant if there’s an immediate risk of evidence being destroyed.
  • Data Haven: A country or location with weak or unenforced laws concerning data protection.
  • Chain of Custody: Involves the collection, analysis, and preservation of data in a way that maintains its integrity for legal proceedings.
  • Forensics: Typically involves creating a bit-level copy of the disk to analyze the data without altering the original.

Data Protection and Privacy

  • FAIR Information Practices:
    • Openness: Transparency about data practices.
    • Collection Limitation: Limiting data collection to what is necessary.
    • Purpose Specification: Clearly specifying the purpose for data collection.
    • Use Limitation: Using data only for the specified purpose.
    • Data Quality: Ensuring data accuracy and relevance.
    • Individual Participation: Allowing individuals to participate in how their data is managed.
    • Security Safeguards: Protecting data with appropriate security measures.
    • Accountability: Holding entities responsible for complying with data protection practices.

Project Management

  • GANTT and PERT Charts: Tools for monitoring the progress and planning of projects.
  • Prototyping: Involves getting feedback from customers to refine a product or system during development.
  • Change Process: The first step in any change process should be obtaining management approval.

SQL and Databases

  • Basic SQL Commands:
    • Select
    • Update
    • Delete
    • Insert
    • Grant
    • Revoke
  • Bind Variables: Placeholders used in SQL queries to enhance database performance by reducing parsing and reusing execution plans.

Physical Security

  • Data Center Security:
    • Walls: Should extend from floor to ceiling.
    • Flooring: Should be a concrete slab that supports at least 150 pounds per square foot.
    • Windows: Data centers should have no windows to enhance security.
    • Air Conditioning: Should have its own Emergency Power Off (EPO) system.
  • Electronic Access Control (EAC): Involves systems like proximity readers, programmable locks, or biometric systems for controlling access.

Miscellaneous

  • Piggybacking: The act of looking over someone’s shoulder to gain unauthorized access to a system.

These points cover essential topics across various aspects of security, from technical details to project management and legal considerations. They are valuable for understanding the broader landscape of cybersecurity and physical security practices.

Latest Post:

Pin It on Pinterest