{"id":2489,"date":"2020-01-09T21:54:43","date_gmt":"2020-01-09T21:54:43","guid":{"rendered":"http:\/\/wiki.thomasandsofia.com\/?p=2489"},"modified":"2020-01-09T21:54:43","modified_gmt":"2020-01-09T21:54:43","slug":"cissp-domain-1-security-and-rick-management","status":"publish","type":"post","link":"https:\/\/wiki.thomasandsofia.com\/?p=2489","title":{"rendered":"CISSP Domain 1: Security and Rick Management"},"content":{"rendered":"<h1>Section 9 &#8211; The CIA Triad<\/h1>\n<h2>The CIA Triad (aka AIC)<\/h2>\n<ul>\n<li>Confidentiality\n<ul>\n<li>Keep our secret secret and only allow access to those who need it.<\/li>\n<\/ul>\n<\/li>\n<li>Integrity\n<ul>\n<li>How do you know someone didn&#8217;t alter your data?<\/li>\n<\/ul>\n<\/li>\n<li>Availability\n<ul>\n<li>Ensure the data is available to people that need it when they need it<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Confidentiality<\/h2>\n<ul>\n<li>Data at rest (storage)\n<ul>\n<li>Cryptography (Encryption) &#8211; very quick and light weight<\/li>\n<\/ul>\n<\/li>\n<li>Data in motion (transit)\n<ul>\n<li>SSL, TLS, IPSEC<\/li>\n<\/ul>\n<\/li>\n<li>Data in use\n<ul>\n<li>Clean Desk\n<ul>\n<li>no password stickys<\/li>\n<li>flip confidential pages upside down<\/li>\n<li>shred after use<\/li>\n<li>Training is important<\/li>\n<\/ul>\n<\/li>\n<li>no shoulder surfing<\/li>\n<li>PC locking<\/li>\n<li>Monitor masks (viewing angles)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>Confidentiality Threats<\/h3>\n<ul>\n<li>Social engineering<\/li>\n<li>Key Loggers<\/li>\n<li>Cameras<\/li>\n<li>Stenography\n<ul>\n<li>Hiding malicious code in an image<\/li>\n<\/ul>\n<\/li>\n<li>IOT\n<ul>\n<li>Compromise a smart tv, thermostat to gain access to a network<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Integrity<\/h2>\n<ul>\n<li>Cryptography<\/li>\n<li>Check Sum (CRC)<\/li>\n<\/ul>\n<p>5:37<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Section 9 &#8211; The CIA Triad The CIA Triad (aka AIC) Confidentiality Keep our secret secret and only allow access to those who need it. Integrity How do you know someone didn&#8217;t alter your data? Availability Ensure the data is available to people that need it when they need it Confidentiality Data at rest (storage) ..<\/p>\n<div class=\"clear-fix\"><\/div>\n<p><a href=\"https:\/\/wiki.thomasandsofia.com\/?p=2489\" title=\"read more...\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54],"tags":[],"class_list":["post-2489","post","type-post","status-publish","format-standard","hentry","category-cissp"],"_links":{"self":[{"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/posts\/2489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2489"}],"version-history":[{"count":1,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/posts\/2489\/revisions"}],"predecessor-version":[{"id":2490,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/posts\/2489\/revisions\/2490"}],"wp:attachment":[{"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}