2 cissp ® Official Study Guide Eighth Edition


Understand need-to-know and the principle of least privilege



Download 19,3 Mb.
Pdf ko'rish
bet678/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   674   675   676   677   678   679   680   681   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Understand need-to-know and the principle of least privilege.
Need-to-know and the 
principle of least privilege are two standard IT security principles implemented in secure 
networks. They limit access to data and systems so that users and other subjects have 
access only to what they require. This limited access helps prevent security incidents and 
helps limit the scope of incidents when they occur. When these principles are not followed, 
security incidents result in far greater damage to an organization.
Understand separation of duties and job rotation.
Separation of duties is a basic security 
principle that ensures that no single person can control all the elements of a critical func-
tion or system. With job rotation, employees are rotated into different jobs, or tasks are 
assigned to different employees. Collusion is an agreement among multiple persons to per-
form some unauthorized or illegal actions. Implementing these policies helps prevent fraud 
by limiting actions individuals can do without colluding with others.


730
Chapter 16 

Managing Security Operations
Understand the importance of monitoring privileged operations.
Privileged entities are 
trusted, but they can abuse their privileges. Because of this, it’s important to monitor all 
assignment of privileges and the use of privileged operations. The goal is to ensure that 
trusted employees do not abuse the special privileges they are granted. Monitoring these 
operations can also detect many attacks because attackers commonly use special privileges 
during an attack.
Understand the information lifecycle.
Data needs to be protected throughout its entire 
lifecycle. This starts by properly classifying and marking data. It also includes properly 
handling, storing, and destroying data.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   674   675   676   677   678   679   680   681   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish