From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
System security principles
From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep
System security principles
- [Brad] Welcome back to Cybrary's ISSEP course. I'm your instructor, Brad Rhodes. We're going to jump into system security principles and I bet you can guess what they are. So in this lesson, we're going to talk about confidentiality, integrity, and availability. Ah, confidentiality, the first leg of the CIA triad. And this is pretty straightforward. This is how we ensure that only folks that need access to assets, and I'm going to use that term generally, and assets could be systems, software, hardware, data, yada, yada, all that kind of stuff, right, we want to make sure that folks that are authorized to have the access they need. Pretty straightforward, right? And the second side of that is to make sure that those who are not authorized don't get access. Pretty straightforward. Really, remember this. Confidentiality is about authorization. All right, next one, integrity, in the CIA triad, right? This is really to ensure that our data isn't being messed with, right, and that we can…
Contents
-
-
-
-
-
Objectives and security planning and design overview2m 37s
-
(Locked)
Stakeholder requirements3m 55s
-
(Locked)
Threats and resilience6m 1s
-
(Locked)
System security principles2m 26s
-
(Locked)
Context, CONOPS, and requirements documents5m 11s
-
(Locked)
Functional analysis3m 11s
-
(Locked)
Requirements traceability3m 29s
-
(Locked)
Trade-off studies3m 45s
-
(Locked)
Module summary2m 55s
-
-
-
-
-
-
-