CISSP: Next target
I just finished my upgrade to Safe Certification and now will be going for CISSP certification. Wish my luck guys!
Some quotes
- Effective security plans anticipates change, focuses on specific and achievable objectives, potential problems, and serves as the basis of decision making.
- Operational plans are the shortest and most frequently updated
- Tactical plans are mid term plans and supports strategical plans.
- Strategic plans are the long term plans (usually 5 years) and usually includes risk assessment.
- Data classification is the primary means by which data is protected based on its need for secrecy, sensitivity and confidentiality.
- Data classification is the process of organizing objects, subjects, items into groups of similarities (value, cost, vulnerability, risk, power, privilege)
- Stratify the process of organizing and securing data based on assigned labels of
importance and sensitivity
. - Data classification also addresses how data is removed and destroyed.
- Security policy is used to assign responsibilities, define acceptable risks, define roles, specify audit requirements and indicate compliance.
- Security policy are not optional rather mandatory.
- Three types of security policies are regulatory, advisory and informative.