Download presentation
Presentation is loading. Please wait.
1
SSCP: A High-Speed Introduction to the Exam Domains
Intro to IT Security Access Controls Administration Auditing and Monitoring Risk, Response, and Recovery Cryptography Data Communications Malicious Code / Malware Testing Tips Domain 4 William F. Slater, III IT Consultant – Author – Teacher – Mentor SSCP, CISSP, MCSE, Security+
2
Agenda Domain Definition Risk Response Recovery Conclusion
3
Domain Definition
4
What Is Risk?
5
Major System Elements At Risk
6
Major System Elements At Risk
7
Major System Elements At Risk
8
Major System Elements At Risk
9
Threats
10
Vulnerability Any weakness in a system that can be exploited R = V x T
Risk = Vulnerability x Threat
11
Controls
12
Safeguards Controls that are put into place to provide some amount of protection to an asset.
13
Countermeasures
14
Exposure The amount or percentage of loss experienced should a threat exploit a vulnerability. Don’t forget things like the exposure of a company’s reputation and/or the brand.
15
Risk Analysis
16
Risk Assessment Loss of Confidentiality Loss of Integrity
Loss of Availability
17
Threats vs. Vulnerabilities
Threats exist and typically don’t change or change much over time Vulnerabilities are places where your IT assets are already weak.
18
Analyzing Risk
19
Quantitative Risk Analysis
20
Quantitative Risk Analysis
21
Quantitative Risk Analysis
22
Quantitative Risk Analysis
23
Qualitative Risk Analysis
24
Automated Risk Assessment
Automated Risk Analysis Tools have become quite popular and are big time savers.
25
Automated Risk Assessment
26
Risk Management Process of identifying, measuring, and controlling uncertain events.
27
An Effective Risk-Assessment Methodology
Taken from NIST’s website Risk = Threat x Vulnerability R = T x V
28
An Effective Risk-Assessment Methodology
29
An Effective Risk-Assessment Methodology
30
Response Those activities performed when a security-related incident occurs
31
Response Tools
32
Response Tools
33
Relationship of Incident Response to Incident Response to Contingency Planning
34
Incident Response Determining Which Protocol to Use:
35
Recovery
36
Restoration and Recovery
37
Conclusion Risk Management is essential to understanding to creating the right kind of BCP and DRP for an organization. Understanding Risk Management and creating a corresponding BCP and DRP is a likely place that SSCPs and CISSPs would be involved.
38
Questions and Answers
39
References & Text Resources
Corrigan, P. H. (1994). LAN Disaster Prevention and Recovery. Englewood Cliffs, NJ: Prentice Hall. Isaac, D. S. and Isaac, M. J. (2003). The SSCP Prep Guide. Indianapolis, IN: Wiley Publishing. Hansche, S., Berti, J. and Hare, C. (2004). Official (ISC)2 Guide to the CISSP Exam. Boca Raton, FL: Auerbach Publications. Harris, S. (2003). All-In-One CISSP Certification Exam Guide, second edition. Emeryville, CA: Osborne McGraw-Hill. Middleton, B. (2005). Cyber Crime Investigator’s Field Guide, second edition. Auerbach Publications: Boca Raton, FL. Pfleeger, C. P. and Pfleeger, S. L. (2003). Security in Computing, Third Edition. Upper Saddle River, NJ: Prentice Hall. Sandhu, R. J. (2002). Disaster Recovery Planning Crash Dump. Boston: Premier Press. Toigo, J. W. (2003). Disaster Recovery Planning: Preparing for the Unthinkable. Upper Saddle River, NJ: Prentice Hall. Wallace, M. and Webber, L. (2004) Disaster Recovery Handbook, The: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets. New York: AMACOM. Wold, G. and Shriver, R. (1998). Disaster Proof Your Business, University of Phoenix Edition. New York: McGraw-Hill Companies, Inc.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.