Asset Security: CISSP, #2
()
About this ebook
Asset Security is one of the eight domains of the Certified Information Systems Security Professional certification, or as it is commonly referred to as the CISSP. Asset Security has 6 domains namely; Information and Asset classification, Data and System ownership, Privacy protection, Appropriate retention, Data security controls and Handling requirements.
Selwyn Classen
A seasoned and highly qualified IT/IS professional with over 20 years working experience within the Petrochemical industry (i.e. Supply chain management, Knowledge management, Product and Quality management, Business analysis and processing) including the Telecommunications industry.
Read more from Selwyn Classen
Risk Management and Information Systems Control Rating: 5 out of 5 stars5/5Incident Management Rating: 0 out of 5 stars0 ratings
Related to Asset Security
Titles in the series (8)
Security and Risk Management: CISSP, #1 Rating: 4 out of 5 stars4/5Security Engineering: CISSP, #3 Rating: 0 out of 5 stars0 ratingsAsset Security: CISSP, #2 Rating: 0 out of 5 stars0 ratingsCommunication and Network Security: CISSP, #4 Rating: 0 out of 5 stars0 ratingsIdentity and Access Management: CISSP, #5 Rating: 0 out of 5 stars0 ratingsSecurity Operations: CISSP, #7 Rating: 0 out of 5 stars0 ratingsSecurity Assessment and Testing: CISSP, #6 Rating: 2 out of 5 stars2/5Software Development Security: CISSP, #8 Rating: 0 out of 5 stars0 ratings
Related ebooks
Security Operations: CISSP, #7 Rating: 0 out of 5 stars0 ratingsSecurity Engineering: CISSP, #3 Rating: 0 out of 5 stars0 ratingsSecurity Assessment and Testing: CISSP, #6 Rating: 2 out of 5 stars2/5Identity and Access Management: CISSP, #5 Rating: 0 out of 5 stars0 ratingsCISSP Exam Study Guide: NIST Framework, Digital Forensics & Cybersecurity Governance Rating: 5 out of 5 stars5/5Security and Risk Management: CISSP, #1 Rating: 4 out of 5 stars4/5Building Effective Cybersecurity Programs: A Security Manager’s Handbook Rating: 4 out of 5 stars4/5Information Protection Playbook Rating: 0 out of 5 stars0 ratingsSecurity Operations Center - SIEM Use Cases and Cyber Threat Intelligence Rating: 0 out of 5 stars0 ratingsCISSP:Cybersecurity Operations and Incident Response: Digital Forensics with Exploitation Frameworks & Vulnerability Scans Rating: 0 out of 5 stars0 ratingsInformation Security Governance: A Practical Development and Implementation Approach Rating: 0 out of 5 stars0 ratingsSecurity Controls Evaluation, Testing, and Assessment Handbook Rating: 0 out of 5 stars0 ratingsOperationalizing Information Security: Putting the Top 10 SIEM Best Practices to Work Rating: 0 out of 5 stars0 ratingsInformation Security A Practical Guide: Bridging the gap between IT and management Rating: 5 out of 5 stars5/5Cybersecurity Jobs & Career Paths: Find Cybersecurity Jobs, #2 Rating: 0 out of 5 stars0 ratingsAuthorizing Official Handbook: for Risk Management Framework (RMF) Rating: 0 out of 5 stars0 ratingsCybersecurity Design Principles: Building Secure Resilient Architecture Rating: 0 out of 5 stars0 ratingsCISA Exam-Testing Concept-Classification of Information Assets (Domain-5) Rating: 3 out of 5 stars3/5Building a Practical Information Security Program Rating: 5 out of 5 stars5/5Selling Information Security to the Board: A Primer Rating: 0 out of 5 stars0 ratingsInfosec Management Fundamentals Rating: 5 out of 5 stars5/5Cyber Essentials: A guide to the Cyber Essentials and Cyber Essentials Plus certifications Rating: 0 out of 5 stars0 ratingsModern Cybersecurity Practices: Exploring And Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization Rating: 0 out of 5 stars0 ratingsThe Chief Information Security Officer: Insights, tools and survival skills Rating: 1 out of 5 stars1/5IT Security Concepts Rating: 5 out of 5 stars5/5Cyber Essentials: A Pocket Guide Rating: 5 out of 5 stars5/5Designing and Building Security Operations Center Rating: 3 out of 5 stars3/5Managing Modern Security Operations Center & Building Perfect Career as SOC Analyst Rating: 0 out of 5 stars0 ratings
Teaching Methods & Materials For You
The Three Bears Rating: 5 out of 5 stars5/5Fluent in 3 Months: How Anyone at Any Age Can Learn to Speak Any Language from Anywhere in the World Rating: 3 out of 5 stars3/5Speed Reading: Learn to Read a 200+ Page Book in 1 Hour: Mind Hack, #1 Rating: 5 out of 5 stars5/5Becoming Cliterate: Why Orgasm Equality Matters--And How to Get It Rating: 4 out of 5 stars4/5How to Diagnose and Fix Everything Electronic, Second Edition Rating: 4 out of 5 stars4/5The Science of Making Friends: Helping Socially Challenged Teens and Young Adults Rating: 5 out of 5 stars5/5How to Take Smart Notes. One Simple Technique to Boost Writing, Learning and Thinking Rating: 4 out of 5 stars4/5Speed Reading: How to Read a Book a Day - Simple Tricks to Explode Your Reading Speed and Comprehension Rating: 4 out of 5 stars4/5Weapons of Mass Instruction: A Schoolteacher's Journey Through the Dark World of Compulsory Schooling Rating: 4 out of 5 stars4/5Principles: Life and Work Rating: 4 out of 5 stars4/5The 5 Love Languages of Children: The Secret to Loving Children Effectively Rating: 4 out of 5 stars4/5Lies My Teacher Told Me: Everything Your American History Textbook Got Wrong Rating: 4 out of 5 stars4/5Good to Great: Why Some Companies Make the Leap...And Others Don't Rating: 4 out of 5 stars4/5Personal Finance for Beginners - A Simple Guide to Take Control of Your Financial Situation Rating: 5 out of 5 stars5/5Verbal Judo, Second Edition: The Gentle Art of Persuasion Rating: 4 out of 5 stars4/5Financial Feminist: Overcome the Patriarchy's Bullsh*t to Master Your Money and Build a Life You Love Rating: 5 out of 5 stars5/5Grit: The Power of Passion and Perseverance Rating: 4 out of 5 stars4/5A study guide for Frank Herbert's "Dune" Rating: 3 out of 5 stars3/5Jack Reacher Reading Order: The Complete Lee Child’s Reading List Of Jack Reacher Series Rating: 4 out of 5 stars4/5Why Are You Still Sending Your Kids to School? Rating: 5 out of 5 stars5/5The 5 Love Languages of Teenagers: The Secret to Loving Teens Effectively Rating: 4 out of 5 stars4/5The Four-Hour School Day: How You and Your Kids Can Thrive in the Homeschool Life Rating: 5 out of 5 stars5/5From 150 to 179 on the LSAT Rating: 4 out of 5 stars4/5The Chicago Guide to Grammar, Usage, and Punctuation Rating: 5 out of 5 stars5/5
Reviews for Asset Security
0 ratings0 reviews
Book preview
Asset Security - Selwyn Classen
While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
ASSET SECURITY
First edition. April 2, 2020.
Copyright © 2020 Selwyn Classen.
Written by Selwyn Classen.
Table of Contents
Introduction
CISSP - Asset Security
What's Asset Security and What's Next?
Information and Asset Classification
Introduction to Information and Asset Classification
Common Classification Levels
CMDB and Classification
Classification Impacts on Access
Control Decisions Based on Classification
Conclusion
Data and System Ownership
Introduction to Data and System Ownership
What Is Data and System Ownership?
How to Identify Data and System Ownership
Structured Is Easier to Determine than Unstructured
CMDB and Ownership
Conclusion
Privacy Protection
Introduction to Privacy Protection
What Is Privacy Protection?
What is the Type of Data that is related to Privacy Protection?
How Is Privacy Protection Related to Data Classification?
International Privacy Landscape
CMDB and Privacy Protection
Conclusion
Appropriate Retention
Introduction to Appropriate Retention
What Is Appropriate Retention?
Common Data Retention Requirements
Shouldn't I Keep My Data Forever?
Destruction of Data
CMDB and Appropriate Retention
Conclusion
Data Security Controls
Introduction to Data Security Controls
What Are Data Security Controls?
Classification and Data Security Controls
Access Control Methodologies
Cryptography Methods
Automation Is Your Friend for Data Security Controls
Conclusion
Handling Requirements
Introduction to Handling Requirements
What Are Handling Requirements?
How Does Classification Impact Handling Requirements?
Common Handling Requirements
Conclusion
Introduction
Asset Security
In this course, we will be discussing Asset Security. Asset Security is one of the eight domains of the Certified Information Systems Security Professional certification, or as it is commonly referred to - the CISSP. Asset Security also has six domains, which are broken down into the other modules of this course. In this course, we will start off with information and asset classification, followed by data and system ownership. Then we will talk about privacy protection, followed by appropriate retention, then we will talk about data security controls, and lastly, handling requirements.
What is Asset Security and What is Next?
Now, let us start talking about Asset Security. What is it? What are the assets? What does it mean to provide security to an asset? In summary, this course is focused on increasing the value your information security program provides to the build-out of some underlying concepts that drive downstream automation and integration of disparate parts of your organization's business and supporting IT components. So what is next? In the next module, we are going to talk about Information and Asset Classification. What are the information and asset classification? How does information and asset classification relate to the other modules? And why is it essential for this course?
Information and Asset Classification
Introduction to Information and Asset Classification
Information and Asset Classification is one of the six subdomains of the Asset Security domain of the Certified Information Systems Security Professional certification, or as it is commonly referred to as the CISSP. An effective information and asset classification program and processes are one of the cornerstones of any well-run information security program, ultimately providing more efficient use of the