Page 130 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 130

Declassification is required once an asset no longer warrants the
               protection of its currently assigned classification or sensitivity level.

               Know the basics of COBIT. Control Objectives for Information and

               Related Technologies (COBIT) is a security concept infrastructure
               used to organize the complex security solutions of companies.

               Know the basics of threat modeling. Threat modeling is the
               security process where potential threats are identified, categorized,
               and analyzed. Threat modeling can be performed as a proactive
               measure during design and development or as a reactive measure once
               a product has been deployed. Key concepts include

               assets/attackers/software, STRIDE, PASTA, Trike, VAST,
               diagramming, reduction/decomposing, and DREAD.

               Understand the need to apply risk-based management
               concepts to the supply chain. Applying risk-based management
               concepts to the supply chain is a means to ensure a more robust and
               successful security strategy in organizations of all sizes. When

               purchases and acquisitions are made without security considerations,
               the risks inherent in those products remain throughout their
               deployment life span.
   125   126   127   128   129   130   131   132   133   134   135