module 7 cyber notes

Ace your homework & exams now with Quizwiz!

5 places you can place info security department in your organization

- IT (most common) - Physical security - Administrative services - Insurance and risk management - legal

Friendly departures

- Include resignation, retirement, promotion, or relocation - employee accounts usually continue with new expire data - employees come and go at will, collect their belongings, and leave on their own

Hostile departures

- Includes termination for cause, permanent downsizing, temporary lay-off, or some instances of quitting - Employee collects all belongings and surrenders keys, keycards, and other company property - Employee is escorted out of building

things to be done when an employee is terminated

- access to the organizations systems must be disabled - removable media must be returned - hard drives must be secured - file cabinet locks are to be changed - office door lock is changed - keycard access revoked - personal effect must be removed from the organizations premises

consultants

- contracts are given to them which specify all requirements for information or facility access - security and tech consultants are prescreened, escorted through work areas, and subjected to nondisclosure agreements - their top priority isn't protection of their information but the companies

security manager main roles

- does the day-to-day operation of the infosec program - does the objectives identified by CISO and resolves issues with technicians

when interviewing a candidate, you should

- educate them on certifications and qualifications - limit the information provided to the candidate on the responsibilities and access rights - when doing on-site visits as part of interview, exercise caution when showing candidate around

business partners

- external business making strategic alliances to exchange info, integrate systems, or discuss operations - nondisclosure agreements are taken before any physical integration happens

contract employees

- hired to perform specific services for an organization - contract employees are escorted from room to room and in and out of facility - restrictions are negotiated into contract agreements when they are activated

whats included in background checks

- identity check - education and credential check - previous employment verification - references check - worker's compensation history - motor vehicle records - drug history - credit history

how people enter infosec careers

- law enforcement and military - technical IT professionals - college grads

Chief Information Security Officer (CISO) main roles

- manage the overall infosec program - drafts or approves infosec policies - works with CIO to make strategic plans, tactical plans, and works with security managers on operational plans - makes infosec budgets based on funding - sets priorities on purchase and implementation of infosec projects and tech -makes decisions/recommendations for recruiting, hiring, and firing -acts as spokesperson for info security team

temporary employees

- not usually effect by policies and obligations but if they violate them, possible actions are limited - access is limited to what they need to do

qualifications to be security manager

- often have CISSP (Certified Information Systems Security Professional) or CISM and bachelors in field - ability to draft mid and lower level policies, standards, and guidelines - budgeting, project management, and hiring/firing - ability to manage technicians

personnel control strategies include

- separation of duties - two-person control - job rotation -mandatory vacations to give an organization the ability to audit the work of an employee - need to know - least privilege

security technician main roles

- tasked to configure security hardware and software

qualifications to be security technician

- varied in organizations for expert, certified, or proficient - some experience with particular hardware and software - actual experience in using a technology required

7 big advice for infosec pros

1. always remember business before technology 2. technology provides elegant solutions for some problems but only exacerbates (worsens) others 3. never lose sight of the goal of protecting the organization's info asset 4. be heard and not seen 5. know more than you say; be more skillful than you let on 6. speak to users, not at them 7. your education is never complete

from 2019 to 2029, the infosec field should grow by

31%

Need to know

Defines the minimum level of access for subjects based on their job or business requirements

qualifications to be CISO

bachelor's degree in security or computer-related field CISM (certified information security manager) degree graduate degree experience as security manager

employees often feel threatened when an information security program is

being created or enhanced

for better hiring practices, upper management should learn more about

budgetary needs of information security function

when things are secured from an employee termination, that employee is

given an exit interview to remind them of contractual obligations and to get feedback

for betting hiring practices, IT and general management should

grant appropriate levels of influence and prestige to information security

Seperation of Duties

having tasks divided amongst multiple employees to reduce the breach of CIA triad

CISO needs to know both

infosec and physical security

most people enter infosec through

law enforcement/military and college grads

job rotation (task rotation)

multiple employees train to perform each critical task

Infosec should balance duty to monitor compliance with

needs for education training awareness customer service

EC-Council Certifications

offers: - CEH - CICISO - others in security awareness, fundamental, core, specialist, advanced and management areas

CompTIA certification

offers: - Security+ - CySA+ - PenTest+ - CASP+

ISACA Certifications

offers: - certified information systems manager (CISM) - certified in RISK and information systems control (CRISC) - certified in the Governance of Enterprise IT (CGEIT) - certified data privacy solutions engineer (CDPSE)

(ISC)^2 certifications

offers: - certified information systems security professional (CISSP) - systems security certified practitioner (SSCP) - certified secure software lifecycle professional (CSSLP) - certified Authorization Professional - Healthcare information security and privacy practitioner (HCISPP) - certified cloud security professional (CCSP)

SANS/GIAC certifications

offers: - cyber defense - industry control systems - offensive security - digital forensics and incident response - cloud security - management and leadership - GIAC security expert

employment contracts

once a candidate accepts a job offer, they have to agree with all the nondisclosure things

hiring employees is a

responsibility laden (overload/burden) with potential security pitfalls

Least privilege

restricts the employee in access depending on their need to know

when making job descriptions, organizations should avoid

revealing access privileges to prospective employees when advertising open positions

Things to do/use before certification test

self-study guides work experience training media formal training programs mentors and study partners

for better hiring practices, general management should learn more about

skills and qualifications for positions

organizations typically look for technically qualified information security generalists who has a

solid understanding of how an organization operates

how to organization select infosec pros

supply and demand of personnel skills experience credentials

for any type of termination, what must be done

the offices and information used by the employee must be inventoried, files must be stored or destroyed, and all property returned to organizational stores

two-person control (dual control)

two employees must review and approve each other's work

organizations look for candidates who understand (first 5)

−How an organization operates at all levels −That information security is usually a management problem and is seldom exclusively a technical problem −How to work with people and collaborate with end users and the importance of strong communication and writing skills −The role of policy in guiding security efforts, and the role of education and training in making employees and others part of the solution −Most mainstream IT technologies at a general level

4 issues that must be addressed when implementing information security

−Positioning and naming the security function −Staffing for or adjustments to the staffing plan −Assessing the impact of information security on every IT function −Integrating solid information security concepts into personnel management practices

organizations look for candidates who understand (last 4)

−The terminology of IT and information security −The threats facing an organization and how they can become attacks −How to protect an organization's information assets from attacks −How business solutions, including technology-based solutions, can be applied to solve specific information security problems


Related study sets

practice questions for maternity test 2

View Set

Chapter 21 (!) Blood Vessels and Circulation Quiz

View Set

Osteoarthritis & Parkinson's Disease In Class Assignment

View Set