Security Architecture Design Principles - CISSP
ฝัง
- เผยแพร่เมื่อ 30 พ.ค. 2021
- This lesson describes the two sets of data principles discussed in the CISSP CBK official reference: Saltzer and Schroeder's The Protection of Information in Computer Systems and the ISO/IEC Technical Standard 19249.
- วิทยาศาสตร์และเทคโนโลยี
I'm really happy to have found your content. You are an excellent instructor. Thanks + Greetings from India. :)
Thank you. Glad I can help.
Um confident now.
Thanks
Glad I could help. Don't hesitate to ask questions.
First off, amazing video and highly educational. Thank you. Second off, are there any other factors besides risk and company budget that can determine emphasis on one of the security principles? Risk as in attacks that can possibly happen and that are presently occurring. Thank you again!
You're welcome, and thank you.
It's all about risk and budget. Risk shows management the possible business impact associated when security architecture gaps are identified and assessed. Management then has to decide how or if they want to manage the risk. Of management chooses mitigation, they have to decide how much budget they are willing to take away from other business needs for that purpose. Risk also includes any regulatory sanctions associated with failure to reasonably and appropriately implement security safeguards, including a security designed infrastructure, to achieve regulatory objectives and requirements.
In the real world, decisions to mitigate risk that come with significant cost usually result in dividing the mitigation steps into annual projects, spreading the cost over multiple annual budget periods. A strategic plan like this should be clearly documented and updated as needed.
Tom.
@@AdventuresinSecurity thank you!
Awesome!
Glad you think so!
Thanks
Thank you!
The Complete Mediation slide is incorrectly headed with the title 'Complete Remediation'
Youre amazing
Glad I could help.
Too many ads.