0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

CISSP Study Guide: Controls for Operational Security
By: Cybrary
December 16, 2022

Operational security is executed through various types of controls. These controls offer varying degrees of protection and fall into six broad categories: Preventive controls – designed to reduce damage and frequency of unintentional errors and to prevent unauthorized access to the system. Data validation mechanisms are examples of preventative operational security controls. Detective controls – used to detect errors ...

CISSP Study Guide: About Operations Controls
By: Cybrary
December 16, 2022

Operations controls are the methods used to preserve operational security. These include resource protection, hardware controls, software controls, privileged-entity controls, media controls, and physical access controls. Resource Protection: Resource protection is a safeguard from both loss and compromise of an organization’s computing resources, such as hardware, software, and data that is owned and used by the organization. Resource protection is ...

CISSP Study Guide: Auditing, Monitoring and Intrusion Detection
By: Cybrary
December 16, 2022

Operational security requires ongoing review of an operational system to verify system security controls are operating correctly and effectively. Consistent auditing and monitoring achieve this and both rely on accountability. Auditing and Audit Trails: Effective auditing is reliant on accountability, which is managed by logging the activities of users and system services that maintain the operating environment and the security mechanisms. ...

CISSP Study Guide: Monitoring and Intrusion Detection
By: Cybrary
December 16, 2022

Monitoring is making certain authenticated users are held accountable for their actions while logged onto a system, as well as tracking unauthorized or abnormal activities on a system and system failures. Accountability is achieved by noting the activities of users and system services that form the operating environment and security mechanisms. A log of activities provides a record for troubleshooting ...

CISSP Study Guide: Knowledge-Based and Behavior-Based IDS
By: Cybrary
December 16, 2022

Knowledge-Based IDS, also known as signature based, are reliant on a database of known attack signatures. Knowledge-based systems look closely at data and try to match it to a signature pattern in the signature database. If an incident matches a signature, the IDS registers that an attack has happened or is happening and responds with an alert, alarm or modification ...

CISSP Study Guide: The Knowledge Management Tool
By: Cybrary
December 16, 2022

Knowledge management is a comprehensive tool in that it utilizes all of the knowledge of the organization. It attempts to interconnect databases, document management, business processes, and information systems. It deciphers data that originates from these systems and automates the knowledge extraction. This knowledge discovery process takes the form of data mining with three main approaches: Classification approach — used ...

CISSP Study Guide: Malicious Code, Viruses and Worms
By: Cybrary
December 16, 2022

Malicious Code: Malicious code includes a series of programmed computer security threats that comprise various network, operating system, software, and physical security vulnerabilities to disburse malicious payloads to computer systems. This is any programmed code specifically designed to inflict, damage, penetrate, or break a system, and includes viruses, worms, Trojans horses, denial-of-service tools, logic bombs, and back doors. Harmful code ...

CISSP Study Guide: Logic Bombs, Trojan Horses and Active Content
By: Cybrary
December 16, 2022

Logic Bombs: Logic bombs are malicious code that corrupt a system but are dormant until they’re activated by the occurrence of one or more logical conditions, and deliver malicious payload to unsuspecting computer users. Simple logic bombs may be triggered according to system date or time while others may use more advanced specifications such as the removal of a file ...

CISSP Study Guide: Computer Forensics
By: Cybrary
December 16, 2022

What is Computer Forensics? Computer forensics is the investigation of computer crimes with the objective of identifying and prosecuting the perpetrator. It involves the collection, examination and safeguarding of information from and related to computer systems that can be used to pinpoint and prosecute the perpetrator. For this information to be admissible in a court of law as evidence, standard ...

CISSP Study Guide: The Computer Crime Investigation Process
By: Cybrary
December 16, 2022

Due to the ongoing business procedures of an organization, a computer crime investigation is complicated by several factors. The investigation process could affect critical operations. As such, it’s important to have an action plan in place for handling reports of suspected computer crimes, and a designated committee should be created beforehand. This committee should formulate prior correspondence with law enforcement, ...