Activity
Mon
Wed
Fri
Sun
Oct
Nov
Dec
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
What is this?
Less
More

Memberships

CISSP Study Group

1.5k members • Free

CISSP Study Group+

13 members • $99/m

313 contributions to CISSP Study Group
Risk Assessment Best Practices
To ace the CISSP exam, especially concerning Risk Assessment, here's a breakdown of best practices you should master: 1. Understand Core Risk Management Concepts: - Risk Triad: Thoroughly grasp the relationship between threats, vulnerabilities, and assets. Remember: Threat x Vulnerability = Risk. - Confidentiality, Integrity, and Availability (CIA Triad): Understand how risk assessment aims to protect these fundamental security principles. - Risk Management Process: Familiarize yourself with the cyclical process: Identification: Recognizing assets, threats, and vulnerabilities. Analysis: Evaluating the likelihood and impact of risks. Evaluation: Prioritizing risks based on their severity. Treatment: Selecting and implementing controls (mitigate, accept, avoid, transfer). Monitoring and Review: Continuously tracking risks and the effectiveness of controls. 2. Master Risk Assessment Methodologies: - Qualitative Risk Assessment: Understand how to use descriptive scales (high, medium, low) to assess likelihood and impact. Be familiar with tools like probability/impact matrices. - Quantitative Risk Assessment: Know how to calculate potential financial losses using metrics like: Asset Value (AV) Exposure Factor (EF) Single Loss Expectancy (SLE = AV * EF) Annualized Rate of Occurrence (ARO) Annualized Loss Expectancy (ALE = SLE * ARO)   - Hybrid Approaches: Recognize that many real-world risk assessments combine qualitative and quantitative methods. 3. Know How to Identify and Value Assets: - Tangible vs. Intangible Assets: Understand the difference and how to value both (e.g., data, reputation, intellectual property). - Asset Classification: Be familiar with categorizing assets based on sensitivity and criticality to the business. Inaccurate valuation leads to ineffective controls. 4. Understand Threat and Vulnerability Analysis: - Threat Modeling: Learn techniques like STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege) to identify potential threats.   - Vulnerability Assessments and Penetration Testing: Understand their purpose in identifying weaknesses. - Threat Intelligence: Recognize the importance of staying informed about current and emerging threats.
0 likes • Jul 7
@Benson Lucas You are welcome😊
0 likes • Jul 7
@Vincent Primiani Thank you my friend 😊
Practice Questions
What is the MOST important element when considering the effectiveness of a training program for Business Continuity (BC) and Disaster Recovery (DR)? A. Management support B. Consideration of organizational need C. Technology used for delivery D. Target audience
1 like • Jul 7
@Owen Chin My pleasure
1 like • Jul 7
@Owen Chin Thank you
Practice Question
Your company is adopting a DevSecOps approach for a new application that handles payment card information. During development, a developer suggests disabling input validation temporarily to accelerate integration testing. What is the BEST response from a security perspective? A. Allow the change, provided it is reversed before production deployment. B. Deny the request and enforce secure coding practices at all times. C. Suggest using synthetic test data and maintain all security controls. D. Use a separate insecure test environment to allow faster progress.
0 likes • Jul 7
The correct answer is: C. Suggest using synthetic test data and maintain all security controls. Why: In a DevSecOps environment, security is integrated continuously throughout development, including testing phases. Disabling input validation, even temporarily it can introduce risks such as: - Testing with real sensitive data, exposing it to potential leaks. - Development and testing environments becoming vulnerable to injection or other attacks. - Risk of changes not being properly reversed or missed before production. - Using synthetic (fake, non-sensitive) test data avoids exposing real payment card information during testing. - Maintaining all security controls ensures that security is embedded from start to finish, preserving secure coding practices. - It allows testing to proceed without compromising security or compliance. Why "B" Deny the request and enforce secure coding practices at all times is incorrect answer: While B is a Good principle but may block developer productivity without offering a practical alternative.
Practice Questions
Which of the following is most helpful in applying the principle of LEAST privilege? A. Establishing a sandboxing environment B. Setting up a Virtual Private Network (VPN) tunnel C. Monitoring and reviewing privileged sessions D. Introducing a job rotation program
1 like • Jul 7
The correct answer is: C. Monitoring and reviewing privileged sessions. Here's why: The Principle of Least Privilege means that users, processes, and systems should only have the minimum level of access necessary to perform their functions -> No-More, No -Less. To apply and enforce this principle effectively, it's critical not just to assign permissions correctly, but to monitor and review how elevated privileges are being used — which is exactly what Option C provides.
Practice Question
You’re consulting for a healthcare organization that stores patient records in a hybrid cloud environment. The data is classified as "Highly Confidential." A developer in the team has requested access to production data to troubleshoot issues. The organization lacks a robust data classification enforcement policy. What is the BEST course of action? A. Allow the developer read-only access under supervision. B. Mask or anonymize the data before granting limited access. C. Grant access after requiring the developer to sign a confidentiality agreement. D. Deny access and escalate the request to the compliance team.
0 likes • Jul 7
The correct answer is: B. Mask or anonymize the data before granting limited access. Here's why: You are dealing with "Highly Confidential" patient records in a healthcare organization, which likely means Protected Health Information (PHI) under HIPAA or similar regulations. The request comes from a developer needing access for troubleshooting, not for clinical or authorized operational use — so direct access to identifiable production data is inappropriate and risky. Additionally: - Mask or anonymize the data before granting limited access. - Data masking/anonymization allows developers to perform troubleshooting without exposing sensitive information. - It balances security and business need — the developer can work on the issue using representative data without accessing live PHI. - Supports privacy by design and reduces risk of regulatory violations.
1-10 of 313
Fouad Ahmed
6
1,240points to level up
@fouad-ahmed-2832
Passionate about simplifying security concepts and fostering collaborative learning to help others succeed in their CISSP certification journey

Active 18d ago
Joined Oct 25, 2024
Boston, MA
Powered by