Page 598 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 598

applying appropriate safeguards. These can (and do) range from
               technology solutions and controls to policies and procedures that

               manage risk and seek to limit or avoid losses, damage, unwanted
               disclosure, and so on.

               A reasonable understanding of countermeasure principles is always
               important when responding to vulnerabilities and threats. Some
               specific countermeasure principles are discussed in Chapter 2,
               “Personnel Security and Risk Management Concepts,” in the section

               “Risk Management.” But a common general principle is that of defense
               in depth. Defense in depth is a common security strategy used to
               provide a protective multilayer barrier against various forms of attack.
               It’s reasonable to assume that there is greater difficulty in passing bad
               traffic or data through a network heavily fortified by a firewall, an IDS,
               and a diligent administration staff than one with a firewall alone. Why
               shouldn’t you double up your defenses? Defense in depth (aka
               multilayered defense and diversity of defense) is the use of multiple

               types of access controls in literal or theoretical concentric circles. This
               form of layered security helps an organization avoid a monolithic
               security stance. A monolithic or fortress mentality is the belief that a
               single security mechanism is all that is required to provide sufficient
               security. Unfortunately, every individual security mechanism has a

               flaw or a workaround just waiting to be discovered and abused by a
               hacker. Only through the intelligent combination of countermeasures
               is a defense constructed that will resist significant and persistent
               attempts of compromise.


               Cloud-Based Systems and Cloud Computing


               Cloud computing is the popular term referring to a concept of
               computing where processing and storage are performed elsewhere
               over a network connection rather than locally. Cloud computing is
               often thought of as Internet-based computing or remote virtualization.
               Ultimately, processing and storage still occurs on computers
               somewhere, but the distinction is that the local operator no longer
               needs to have that capacity or capability locally. This also allows a
               larger group of users to leverage cloud resources on demand. From the

               end-user perspective, all the work of computing is now performed “in
   593   594   595   596   597   598   599   600   601   602   603