Systems and Communications - Basic

Video Activity

This lesson covers Domain 15; system and communication protection. The basic security requirements are 3.13.1 and 3.13.2.

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

1 hour 27 minutes
Video Description

This lesson covers Domain 15; system and communication protection. The basic security requirements are 3.13.1 and 3.13.2.

Video Transcription
as we move forward into domain 15. We're looking at the requirement for system and communications protection. So here we're looking at how we communicate usually cross network, whether it's wireless communication or wire communication. Internal, external.
Ah, and we have a couple of basic security requirements. Now, we have a lot of derived requirements, but the two basic security requirements
we're gonna monitor, control and protect organizational communications
at the external boundaries and key internal boundaries. So, for instance, what we're gonna do is look to isolate, trusted from untrusted. Usually we assume the internal networks your trusted, the external or under our untrusted, or perhaps even semi trusted.
So we're gonna we're gonna certainly monitor and protect
the communications as it passes across those untrusted or semi trusted channels. The second basic requirement is we're gonna implement architectural design, software development and systems engineering principles that promote effective information security within the systems. Okay, so
architectural design goes right down to the elements of the trusted computer base. Those those elements like your processor in your memory.
Ah, the system designed of the operating system kernel reference monitor, security, Colonel, all of those very, very basic essential elements to enforce that security policy of a system
Software development techniques. If you take a look at NIST Special Publication 800-53 a on and we will have will be presenting a classroom that, uh, that dictates how we're going to implement security throughout the software development life cycle.
Now this special publication 800-1 60 talks about implementing security through the system security engineering process. So certainly otherness documents and other cyber classes to help you implement Basic Requirement $3.13 too.
Up Next