For the CISSP: Domain 1 Q&A

Q: What is security management?

A: Security management refers to the identification, assessment, mitigation, and monitoring of security risks in an organization. It involves developing policies, procedures, and controls to protect assets, information, and systems from threats and vulnerabilities. The goal of security management is to ensure that an organization’s security posture aligns with its business objectives and regulatory requirements.

Q: What are the principles of access control?

A: The principles of access control are confidentiality, integrity, and availability. Confidentiality ensures that only authorized individuals can access sensitive data or information. Integrity ensures that data and information remain accurate and trustworthy over time. Availability ensures that data and information are accessible when needed by authorized individuals.

Q: What is a security model?

A: A security model is a formal representation of how an organization’s security policies, procedures, and controls are implemented and enforced. Security models typically include a set of rules and guidelines that define allowable actions, access rights, and responsibilities for users and systems. There are several types of security models, such as the Bell-LaPadula model, the Biba model, and the Clark-Wilson model.

Q: What is a security baseline?

A: A security baseline is a set of security policies and controls that define the minimum security requirements for an organization’s systems and applications. It typically includes guidelines for password management, user authentication, access controls, network security, and other security-related elements. Security baselines are important for ensuring that all systems in an organization meet a minimum level of security and compliance.

Q: What is the difference between symmetric and asymmetric encryption?

A: Symmetric encryption uses the same key to encrypt and decrypt data, while asymmetric encryption uses different keys for encryption and decryption. Symmetric encryption is faster and more efficient, but it requires that the key be securely shared between the sender and receiver. Asymmetric encryption is slower but more secure, as the private key used for decryption is never shared or exposed to other parties. Asymmetric encryption is commonly used for digital signatures and secure key exchange. 

Q: What is security risk assessment?

A: Security risk assessment is the process of identifying, analyzing, and assessing potential risks to an organization’s information assets. It involves gathering data about existing threats, vulnerabilities, and control weaknesses in order to determine the likelihood of a successful attack or incident occurring. Risk assessments also evaluate the potential impact that such events could have on an organization’s operations and overall security posture. The results of a security risk assessment are used to prioritize mitigation efforts and develop strategies for mitigating identified risks.

Leave a comment