🕹️
Ghoulsec Vault
Website Toolbase
  • Welcome !
  • 🗃️Exam Prep Notes
    • 📔CEH V13 (Master Edition)
      • Module 02: Footprinting and Reconnaissance
      • Module 03: Scanning Networks
      • Module 04: Enumeration
      • Module 05: Vulnerability Analysis
      • Module 06: System Hacking
      • Module 07: Malware Threats
      • Module 08: Sniffing
      • Module 09 : Social Engineering
      • Module 10: Denial of Service
      • Module 11: Session Hijacking
      • Module 12: Evading IDS, Firewalls , Honeypots
      • Module 13: Hacking web servers
      • Module 14: Hacking Web Applications
      • Module 15:SQL Injection
      • Module 16: Wireless Attacks
      • Module 17: Hacking Mobile Platforms
      • Module 18: IoT & OT Hacking
      • Module 19 : Cloud Computing
      • Module 20 : Cryptography
    • 📘ISC2 -Certified in Cyber Security
      • Chapter -1 Security Principals
      • Chapter -2 Disaster Recovery,Business Continuity & Incident Response
      • Chapter -3 Access Control Concepts
      • Chapter -4 Network Security
      • Chapter -5 Security Operations
    • 📗AZ - 900
      • Basics of Cloud Computing
        • Economic of Scale
        • CapEx & OpEx
        • Consumption based model
        • Cloud Deployment Models
        • Shared Responsibility Model
        • Data centers, Regions & Availability Zones & Geographyies in Azure
        • Resources & Resource Group
        • Azure Access Tools
        • Azure Service Lifecycle
        • Azure SLAs
        • Azure Cloud Adoption Framework
      • Azure Services
        • Azure Computing Services
        • Azure Networking Services
        • Azure Storage Services
        • Azure Database Service
        • Azure Marketplace
        • Big Data & Azure
        • Azure Serverless Computing
        • IoT & Azure
        • Other Azure Services
        • Azure Resource Locks & Resource Tags
        • Azure Security Services
          • Security Groups
          • Routing Tables
          • Azure Firewall
          • Azure DDOS Protection
          • Azure Identity & Access Management (Azure AD)
          • Azure RBAC
          • Azure Security Center
          • Azure Key Vault
      • Azure policies & Blueprints
      • Azure Cost Management
      • Azure Core Tenents
    • 📗SC - 900
      • Zero Trust Model
      • Shared Responsibility Model
      • Defense in Depth
      • Security Controls
      • CIA Triad
      • Encryption / Hashing / Signing
      • Microsoft Security & Compliance Principals
      • Common Identity Attacks
      • Microsoft Identity as Primary Security Perimeter
      • Modern Authentication with Azure AD
      • Azure AD Identity Types
      • Azure External Identities
      • Hybrid Identities
      • Authentication Methods & Password Protection
      • Conditional Access
      • Azure AD Roles & RBAC
      • Governance in Azure AD
      • Azure Identity Protection
      • Azure NSG, DDOS, Firewall
      • Azure Bastion & Keyvault
      • Azure Encryption
      • Azure CSPM
      • Azure Security Center
      • Azure Defender
        • Microsoft O365 Defender
        • Azure Sentinel
      • Microsoft Cloud App Security
      • Microsoft Intune
      • Microsoft Complaince Manager
      • Information Protection
      • Microsoft insider risk capabilities
    • 📔AWS Cloud Practitioner
      • Cloud Deployment
        • AWS Global Infrastructure
      • AWS Cloud Essentials
        • AWS SNS
          • AWS SQS
      • AWS Compute & Container Services
        • AWS EC2
          • Elasticity & Agility
        • AWS Serverless Computing
        • AWS Container Services
        • AWS Beanstalk
        • AWS Load Balancing
      • AWS Storage & Databases
      • AWS Networking
      • AWS Security
        • AWS Organisation
        • AWS Compliance
        • AWS DDOS
        • Additional Security Services
      • AWS Monitoring & Analytics
        • Other Analytics Services
      • AWS Pricing & Support
      • AWS Migration & Innovation
        • Migration Statergies
        • AWS Snow Family
        • AWS Transfer Family
        • Innovation on AWS
      • AWS Well Architecture Framework
      • Other AWS Services
  • 🧑‍💻Cyber Security Base
    • Ghoul's Den
    • Cheatsheets
    • SSL Handbook
      • Installing OpenSSL
      • Encrypting Web Servers using SSL
      • Compiling .pfx file using openssl
      • De-compiling .pfx file
      • Zimbra Mail Server SSL renew
      • SSL Certificates
    • ☁️Cloud Security
      • Amazon Web Services (AWS)
        • AWS - IAM & Policy Management
        • AWS Organization
        • AWS - Roles (Assume Role)
        • AWS - EC2 (Elastic Computing)
        • AWS - VPC
        • AWS - Bastion Host
        • AWS Application Load Balancer
        • AWS Auto Scaling Group
        • AWS WAF
        • AWS - VPC Peering
        • AWS Transit Gateway
        • AWS NAT Gateway
        • AWS - Route 53
        • AWS Certificates Manager
        • AWS Network Load Balancer (NLB)
    • 🕸️Network Security
      • Firewalls
        • Sophos - Security Suite
          • Sophos Firewalls
      • VPN
        • VPNs
          • Wireguard Tunneling
          • StrongSwan Gateway VPN Server on Ubuntu
      • IP Address and IP Subnetting
      • Basic to Advance Networking Materials
    • 🧑‍💻VAPT
      • Sample Report Templete
      • OWASP
        • OWASP Web Application Security & WebGoat
      • Web Application testing checklist
        • Client Side Penetration Testing
          • Clickjacking
          • Websockets
          • CSRF
          • XSS Filters
        • Server Side Penetration Testing
        • Advanced Web Application Pentesting
          • OAuth
          • JWT Injection
          • Server Side Templete Injection
    • ☄️GRC
      • ISMS AUDIT PLAN
      • CIS Compliance Windows
    • 🔍Forensic
      • Forensic Tools
      • EMAIL Forensics
      • File header forensics
    • Trend Micro
      • Deep Security
        • Installation & Prerequisite
          • Microsoft SQL server 2022
          • Postgres 16 Core
          • Installation
    • Practical Malware Analysis & API Threats
  • 🕹️Server are fun !
    • Securing Linux
      • Securing SSH
      • Sudoers
      • UFW (Uncomplicated FW)
      • Unattended Upgrades
      • Password Complexiety
      • Auditing Linux
      • Samba - SMB
      • NFS - Network File System
      • FTP
      • AIDE
    • Servers
      • Linux Sever
        • OpenLDAP Server Setup
          • ldap-account-manager
          • Securing OpenLDAP
          • OpenLDAP client setup
          • Checking LDAP setup
        • Users & Groups
        • Password Policy
        • File & File Permissions
        • Automatic Updates
        • Adding GUI to Ubuntu Server
        • DNS Server
        • NTP Server
      • Windows Sever
        • Deep dive into Windows Server
        • Windows server Installation
        • Disable IPv6
        • Disable Server Manager on startup
        • Promoting OS to AD server
        • AD DNS
        • AD DHCP
        • AD Activation
        • AD Users & Groups
        • AD FileServer
        • Adding Users into AD
        • Bulk Importing users into Domain
        • Windows AD Resources
        • Group Policy Editor
          • Creating First Policy
          • Restricting CMD & Powershell
          • Password Policies
          • Audit Policies
          • Log Retention Policy
          • Windows Defender Firewall
          • Patch Management & Window Updates
        • Setting Up local accounts for windows hosts
    • Hacking Systems
      • Linux Systems
        • Battery Charge Threshold (Linux)
        • Metasploitable OS Complete Solved
      • Tricking Windows
        • Bitlocker & Time based policy bypass
    • Monitoring HeartBeats
    • RAID Technology
    • Managing Partitions
      • Parted
      • Fdisk
      • LVM
        • Re-claiming unused disk space
        • Adding physical volume into VG
        • Removing physical volume from VG
      • SWAP Memory
    • Virtualization
      • Proxmox
        • Proxmox VE Installation
        • Default Storage Expansion
        • Proxmox Network Link Aggegration
        • NAT Interface Configuration
        • Importing disk into proxmox
        • Creating an LVM Thin Pool
        • Proxmox IAM
  • 🙍‍♂️Dan the AI Expert
    • Ollama Ollama ...
      • Ollama
        • Ollama models
        • Open Web UI & Ollama Integration
    • Microsoft Presentation using AI
  • 🛡️Security Operations
    • Wazuh - Open Source XDR. Open Source SIEM.
      • Components
      • Deployment Methods
      • Installation
        • Single Node Installation
          • Wazuh Indexer Installation
          • Wazuh Server Installation
          • Wazuh Dashboard Installation
          • Single node deployment with Script
        • Managing multiple Wazuh clusters with Cross-Cluster Search
          • Cluster Configuration
          • Set up Cross-Cluster Search
        • Upgrading Wazuh Central Components
        • Uninstalling Wazuh
      • Custom Decoder & Rules
        • Pfsense Decoders
        • Pfsense Rules
      • Security Operations Center Tools (Wazuh)
    • IRIS-DFIR / Case Management
    • Graylog & ElasticSearch
    • Zabbix NMS
      • Zabbix Installation
      • Zabbix Database Management
        • Zabbix Database backup
        • Zabbix Database restore
        • MySQL Replication (M-M)
        • MySQL Replication (M-W)
      • Zabbix Geomap Setup
      • Adding Hosts into Zabbix
      • Zabbix Hostgroups
      • Auto Registration Hosts Zabbix
      • Zabbix Globalscrips
      • Zabbix HA Cluster
      • Zabbix Proxy
      • Zabbix Notifications
      • Zabbix Maintainance
      • Zabbix User Management & Authentication
      • Zabbix Housekeeping
      • Scheduled Reporting
      • Service Monitoring using Zabbix
  • Git the master!!
    • Configuring git
    • Git Branches
    • Undoing changes
    • Git - Cheat sheet
    • My first git...
Powered by GitBook
On this page
  • CIA Triad
  • Threat & Risk Management Process
  • Risk management process
  • Security Controls
  • Governance
  • Chapter Resouces :
  1. Exam Prep Notes
  2. ISC2 -Certified in Cyber Security

Chapter -1 Security Principals

PreviousISC2 -Certified in Cyber SecurityNextChapter -2 Disaster Recovery,Business Continuity & Incident Response

Last updated 1 month ago

CIA Triad

The CIA Triad is a widely used model in information security that represents the three core principles essential for ensuring the security and confidentiality of information. These principles are:

  1. Confidentiality: Ensures that information is only accessible to those who are authorized to access it. This principle helps protect sensitive data from unauthorized access, such as through encryption or access control mechanisms.

  2. Integrity: Ensures that the information remains accurate, consistent, and unaltered unless authorized. Integrity involves protecting data from being modified, corrupted, or deleted, ensuring that it can be trusted.

  3. Availability: Ensures that information and systems are accessible and usable when needed by authorized users. This principle focuses on ensuring that systems are operational and data can be accessed in a timely manner, typically through backups and redundancy.

Together, these three principles form the foundation of information security practices.


Threat & Risk Management Process

Risk:

Risk refers to the potential for harm or loss to an organization's assets, systems, or data due to vulnerabilities or threats. It is the likelihood that a threat will exploit a vulnerability and cause damage, and the impact of that damage. Risk is typically assessed based on the probability of an event occurring and the potential severity of its consequences.

  • Risk = Likelihood × Impact

  • For example, the risk of a data breach might be higher if an organization does not have adequate security measures in place, and the impact could be severe if sensitive data is exposed.

Threat:

A threat is any potential cause of an incident that could harm or compromise the security of information, systems, or infrastructure. Threats can be intentional (like cyberattacks) or unintentional (like natural disasters or human error). A threat becomes a risk when it can exploit vulnerabilities in a system.

  • Examples of threats include hackers, malware, social engineering, natural disasters, and even employee negligence.

Risk management process

Risk Identification
  • Goal: To clearly identify and communicate risks within an organization.

  • Key Points:

    • All employees, regardless of their role or level, have a responsibility to identify potential risks in their respective areas of work.

    • Identifying risks early helps in understanding them and allows organizations to take protective measures.

    • Risk identification helps in safeguarding the organization’s assets, operations, and people from potential harm.

Risk Assessment
  • Goal: To assess and evaluate risks in a structured way, estimating both the likelihood and potential impact of identified risks.

  • Key Points:

    • The process involves identifying risks and estimating the potential impact on various aspects of the organization, such as:

      • Operations: Including mission-critical functions, reputation, and public image.

      • Assets: The physical, intellectual, and digital assets of the organization.

      • Individuals: The impact on employees, stakeholders, and customers.

      • Other Organizations: The effect on partners, suppliers, or collaborators.

      • Nation: In the case of risks that could have broader implications, such as in critical infrastructure or national security.

    • Risk assessment leads to a prioritized risk management strategy, where each identified risk is linked to specific goals, objectives, assets, or processes within the organization.

Risk Treatment (Management Options)

Once risks are identified and assessed, they need to be treated using one of the following approaches:

  1. Accept the Risk:

    • Definition: This means acknowledging that the risk exists and choosing not to take action to mitigate or eliminate it.

    • When it's used: Typically used for risks that are minor, with low impact or likelihood, or where the cost of mitigation is greater than the potential damage.

    • Example: Accepting the risk of a low-cost data loss in a non-critical system.

  2. Avoid the Risk:

    • Definition: Risk avoidance involves eliminating the risk altogether by changing plans, processes, or actions to avoid the exposure to the risk.

    • When it's used: When the risk is deemed too high to tolerate or manage.

    • Example: Avoiding the risk of a particular vulnerability by not using outdated software or hardware.

  3. Reduce (Mitigate) the Risk:

    • Definition: Risk mitigation involves implementing measures to reduce the likelihood of the risk occurring or reducing its potential impact if it does occur.

    • When it's used: The most common approach, as it aims to lower risks to acceptable levels.

    • Example: Implementing firewalls, encryption, or employee training to reduce the risk of a cyberattack.

  4. Transfer or Share the Risk:

    • Definition: Risk transference involves shifting the responsibility for the risk to a third party. This often involves outsourcing certain services or purchasing insurance.

    • When it's used: When the organization wants to shift the financial consequences of the risk to another party.

    • Example: Purchasing cyber insurance to cover potential financial losses from a data breach or outsourcing IT services to a company with better security practices.


Security Controls

Security controls are measures implemented to safeguard an organization's information, systems, and assets from risks and threats. These controls can be categorized into Physical, Technical, and Administrative controls, each addressing different aspects of security.

Physical security controls are measures designed to protect the physical infrastructure, facilities, and equipment of an organization. These controls focus on preventing unauthorized access to physical spaces and protecting against physical threats such as theft, vandalism, or natural disasters.

  • Examples:

    • Access control systems: Keycards, biometric scanners, or security guards that restrict access to buildings, server rooms, or restricted areas.

    • Surveillance cameras: CCTV cameras to monitor and record activity in critical areas.

    • Locks and barriers: Physical locks, gates, fences, or safes to secure valuable assets and prevent unauthorized entry.

    • Environmental controls: Fire suppression systems, water leak detectors, and temperature controls to protect against environmental hazards.

Technical security controls (also called logical controls) involve the use of technology to protect systems, networks, and data from unauthorized access, misuse, or attacks. These controls focus on safeguarding the organization's digital assets through various software and hardware measures.

  • Examples:

    • Firewalls: Devices or software that monitor and filter network traffic to prevent unauthorized access and attacks.

    • Encryption: Protecting data by converting it into a coded format to prevent unauthorized access, both for data at rest (stored) and in transit (moving across networks).

    • Intrusion Detection and Prevention Systems (IDPS): Systems that detect and block suspicious or malicious network traffic and activities.

    • Multi-factor authentication (MFA): Requiring multiple forms of verification to ensure that only authorized users can access systems or data.

    • Antivirus and anti-malware software: Programs designed to detect, prevent, and remove malicious software such as viruses and trojans.

Administrative controls focus on the policies, procedures, and practices that govern the organization’s security efforts. These controls ensure that security is maintained through effective management, training, and oversight.

  • Examples:

    • Security policies and procedures: Written guidelines and protocols that define how security should be managed within the organization (e.g., password policies, incident response plans).

    • Employee training and awareness: Programs that educate staff about security best practices, such as identifying phishing attempts or securing sensitive information.

    • Risk management processes: Identifying, assessing, and mitigating risks through regular risk assessments and the implementation of appropriate countermeasures.

    • Incident response and recovery planning: Developing and practicing procedures to respond to security incidents (e.g., data breaches, cyberattacks).

    • Access control policies: Defining and enforcing rules regarding who has access to specific systems and data, ensuring that individuals can only access the resources necessary for their job.


Governance

  1. Procedures : The detailed steps to complete a task that support departmental or organizational policies.

  2. Policies : Put in place by organizational governance, such as executive management, to provide guidance to all activities to ensure that the organization supports industry standards and regulations.

  3. Standards : Often used by governance teams to provide a framework to introduce policies and procedures in support of regulations.

  4. Regulations : Commonly issued in the form of laws, usually from government (not to be confused with governance) and typically carry financial penalties for non-compliance.


Chapter Resouces :

🗃️
📘
383KB
CC-Chapter1.pdf
pdf