Chapter 3 - ISC2 | PDF | Access Control | Computer Network
0% found this document useful (0 votes)
68 views

Chapter 3 - ISC2

The document discusses department-specific disaster recovery plans, technical guides for backup systems, and full copies of critical plans for recovery team members. It also covers access control concepts including subjects, objects, rules, defense in depth, least privilege, privileged access management, separation of duties, physical access controls, monitoring, logical access controls, discretionary access control, mandatory access control, and role-based access control. Additionally, it discusses networking fundamentals such as hardware, software, protocols, encryption, local and wide area networks, and common network devices.

Uploaded by

Jamaal Jackson
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views

Chapter 3 - ISC2

The document discusses department-specific disaster recovery plans, technical guides for backup systems, and full copies of critical plans for recovery team members. It also covers access control concepts including subjects, objects, rules, defense in depth, least privilege, privileged access management, separation of duties, physical access controls, monitoring, logical access controls, discretionary access control, mandatory access control, and role-based access control. Additionally, it discusses networking fundamentals such as hardware, software, protocols, encryption, local and wide area networks, and common network devices.

Uploaded by

Jamaal Jackson
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

➢ Department-specific plans

➢ Technical guides for IT personnel responsible for implementing and


maintaining critical backup systems
➢ Full copies of the plan for critical disaster recovery team members

Official Notes:

https://learn.isc2.org/content/enforced/9541-CC-SPT-GLOBAL-1ED-1M/build/chapter_0
2/assets/EDU-CC-70185-ch02_Takeaway.pdf?ou=9541

Chapter 3:

Access Control Concepts:

❖ Controls Overview
➢ Subject: any entity that requests access to our assets
➢ Object: device, process, person, user, program, server, client or
other entity that responds to a request for service.
➢ Rule: an instruction developed to allow or deny access to an object
by comparing the validated identity of the subject to an access
control list.
❖ Defense in Depth
➢ Layered Defense:
■ Assets
■ Admin Controls
■ Tech Controls
■ Physical Controls
❖ Least Privilege
➢ Only have access to part of the system that you need to complete
job
❖ Privileged Access Management:
➢ Way to limit damages by keeping information compartmentalized
➢ Privileged Accounts are a way to do tis because these accounts are
owned by managers or admin
❖ Segregation Duties
➢ no one person should control an entire high-risk transaction from
start to finish
➢ Two-person Integrity
❖ Physical Access Controls
➢ Badge System and Gate Entry
➢ Crime Prevention through Environmental Design (CPTED)
➢ Biometrics
❖ Monitoring
➢ Cameras
➢ Logs
➢ Alarm Systems
➢ Security Guards
❖ Logical Access Controls
➢ Virtual Safeguards
❖ Discretionary Access Control (DAC)
➢ access control policy that is enforced over all subjects and objects
in an information system
❖ Mandatory Access Control (MAC)
➢ uniformly enforced across all subjects and objects within the
boundary of an information system
❖ Role-Based Access Control (RBAC)

Official Notes:

https://learn.isc2.org/content/enforced/9541-CC-SPT-GLOBAL-1ED-1M/build/chapter
_03/assets/EDU-CC-70255-ch03_Takeaway.pdf?ou=9541

Chapter 4:

Network Security:

❖ Networking:
➢ Hardware, Software, protocols and encryption
➢ Types:
■ Local Area Network (LAN)
■ Wide Area Network (WAN)
➢ Network Devices
■ Hub: Connect multiple devices
■ Switch: Intelligent hub to route to specific devices
■ Router: Control traffic on networks and between them

You might also like