CISSP考试指南笔记:7.6 预防和检测

The steps of this generalized process are described here:

  1. Understand the risk.

  2. Use the right controls.

  3. Use the controls correctly.

  4. Manage your configuration.

  5. Assess your operation.

Continuous Monitoring


NIST Special Publication 800-137, “Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations,” defines information security continuous monitoring as “maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions.”

the whole point of continuous monitoring is to determine if the controls remain effective at reducing risk to acceptable levels.

Finally, continuous monitoring involves deciding how to respond to the findings.

The metrics and measurements provide data that must be analyzed in order to make it actionable.

Continuous monitoring is a deliberate process. You decide what information you need, then collect and analyze it at a set frequency, and then you make business decisions with that information. Properly implemented, this process is a powerful tool in your prevention kit.

Firewalls


Once you have this control-risk pairing done, you can look at your network and decide where are the best places to locate firewalls to mitigate those risks.

The operational challenge is to both accurately track the current sets of rules and have a process to identify rules that must be added, modified, or deleted.

Finally, you need a plan to routinely assess the effectiveness of your firewall defenses.

Intrusion Detection and Prevention Systems


the main difference between an IDS and an IPS is that an IDS will only detect and report suspected intrusions, while an IPS will detect, report, and stop suspected intrusions.

The placement of network sensors is critical with IDSs/IPSs just as it is with firewalls.

False positives—that is, detecting intrusions when none happened—can lead to fatigue and desensitizing the personnel who need to examine each of these alerts.

false negatives are events that the system incorrectly classifies as benign, delaying the response until the intrusion is detected through some other means.

Perhaps the most important step toward reducing errors is to baseline the system.Baselining is the process of establishing the normal patterns of behavior for a given network or system.

剩余内容请关注本人公众号debugeeker, 链接为CISSP考试指南笔记:7.6 预防和检测

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值