Time
1 hour 34 minutes
Difficulty
Advanced
CEU/CPE
1

Video Transcription

00:00
in this lesson, we'll talk about the CIA. Tried
00:03
the principle of least privilege and separation of Judy's.
00:07
What is the C. I. A. Triad?
00:12
See A Triad stands for confidentiality, integrity and availability,
00:16
which are three tenets of cybersecurity.
00:19
The C I A tryout, which I suspect you are familiar with. If you're watching, this course
00:24
consists off confidentiality, integrity and availability.
00:27
There are several ways in which this triad effects enterprise Security Case Management
00:32
Festival security teams need to ensure that stakeholders only have as much access as required to perform their duties.
00:40
A stock analyst or incident responders, for example, should be able to both read and write to case management software,
00:47
whereas a size oh may only need read access. To be able to review case data and reports allowing greater access than is necessary violates the principle of lease privilege and can cause numerous issues related to confidentiality of case, data and evidence.
01:02
For the same reasons. Integrity needs to be top of mind for anyone involved in security case management.
01:08
If contemporaneous notes, case data or evidence is able to be modified by someone without the requisite authorization,
01:15
none of the results of a case or investigation can be relied upon
01:21
protecting the integrity of case data. And evidence is paramount to the success of a case management program and a security team off any type.
01:29
Finally,
01:30
availability should be a consideration as well.
01:33
If case data or a case management solution become unavailable during the course of an investigation,
01:38
valuable case data may be lost. While actions of being carried out,
01:42
it is vital to the success of a case that availability be made a priority.
01:47
What does the acronym C II Stanfel
01:52
C I. A. Stands for confidentiality, integrity and availability,
01:56
Sometimes to prevent confusion with the clandestine organization
02:00
the CIA try. It is actually the icy Try it
02:02
or the AI C. Try it
02:06
in this lesson we covered the CIA, tried the principle of lease privilege as well as separation of Judy's.

Up Next

Enterprise Security Case Management

In this online course about Enterprise Security Case Management, you will learn about tools and techniques which help cybersecurity practitioners manage evidence and related case data to preserve their integrity.

Instructed By

Instructor Profile Image
Seth Enoka
Consultant
Instructor