Cybersecurity Analysis An Overview
Cybersecurity Analysis An Overview
CYBERSECURITY ANALYSIS
An Overview: The Elements of Cybersecurity Analysis
(Modules 1-9)
Cybersecurity Analysis
(CCA)
An Overview:
The Elements of Cybersecurity Analysis
(Modules 1-9)
International Institute of Business Analysis, Toronto, Ontario, Canada.
IEEE-Computer Society. Los Alamitos, California. United States of America.
©
2020 International Institute of Business Analysis and IEEE-Computer Society.. All rights reserved.
Print Edition ISBN: 978-1-927584-18-7
PDF Edition ISBN: 978-1-927584-19-4
This document is provided to the business analysis community for educational purposes. IIBA® does not warrant that it is
suitable for any other purpose and makes no expressed or implied warranty of any kind and assumes no responsibility for
errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use
of the information contained herein.
IIBA®, the IIBA® logo, BABOK® and Business Analysis Body of Knowledge® are registered trademarks owned by International
Institute of Business Analysis. CBAP® is a registered certification mark owned by International Institute of Business Analysis.
Certificate in Cybersecurity Analysis (CCA), Certified Business Analysis Professional, ECBA, EEP, and the EEP logo are
trademarks owned International Institute of Business Analysis
No challenge to the status or ownership of these or any other trademarked terms contained herein is intended by the
International Institute of Business Analysis.
Any inquiries regarding this publication, requests for usage rights for the material included herein, or corrections should be
sent by email to info@iiba.org.
2
Table of Contents
i
Table of Contents
ii
Table of Contents
Module 9: Operations
9.1 Incident Response, Recovery, and Remediation 223
9.2 Metrics and Reporting 228
9.3 Risk Logging and Mitigation Tracking 231
9.4 Operational Risk Ownership 234
9.5 Computer Forensics: SOC, SIEM 236
9.6 Future Proofing your Security Posture 239
iii
Table of Contents
iv
Module 1: Introduction to
1 Cybersecurity Analysis
1
IIBA and IEEE Perspective: Overview of Concepts and Approach to Improving Cybersecurity Module 1: Introduction
1.1.1 Overview
• Cybersecurity Imperative
• The expansion of technology in our business and in our lives has
made cybersecurity a top of mind concern for enterprises,
government, and individuals.
• IIBA Perspective
• Governance and Risk
• Infrastructure and Networking
• Applications and Information integrity
• Business Analysis (BA) Focal Points
• Analysis is the basis of planning and preparation for a secure cyber
environment.
• Business Analysis is about understanding the requirements, the
value, and in cybersecurity context it is about building in not bolting
on security into everything we work on.
IIBA Perspective
• Governance and Risk
• Understanding the enterprise environment is critical
• BAs work with the business, the architects, the security specialists in
establishing the security framework and governance processes; this
requires very senior BA task involvement
• Infrastructure and Networking
• Key in every enterprise – BA’s work in generally traditional way to go
between the business and the technical team to assure business
needs are effectively part of the requirements and plan and
collaborate on key initiatives. BA’s also are support to operations
• Applications and Information integrity
• BAs play a critical role in assuring that the security requirements, the
data integrity issues, the interface and integration components, and
the functional and non-functional requirements are met. This applies
across Agile, DevOps, and SDLC methods. It applies to applications/
solution maintenance and iterations. It applies to making sure the
application or solution requirements are met while maintaining
overall security controls in this layer. Most BA’s will work at this level.
2
Module 1: Introduction to Cybersecurity AnalysisIIBA and IEEE Perspective: Overview of Concepts and Approach to
• Privacy
• Digital Rights
• Organization Risk Assessment
• Risk Analysis
• Disaster Recovery and Business Continuity
• Business case Development
• Understanding Security Controls
• CIA Triad – Confidentiality – Integrity – Availability
• Threats and Vulnerabilities
• Impacts
.2 Solution Delivery
• SDLC and Security Planning
• Requirements Definition and Analysis
• Solution Security – Applications
• Solution Security – Databases
• Solution Security – Web
• Change Impact Analysis
3
IIBA and IEEE Perspective: Overview of Concepts and Approach to Improving Cybersecurity Module 1: Introduction
1.1.8 Summary
• Cybersecurity remains a critical concern for all enterprises and is an
essential knowledge area for the business and for all BAs and many other
professionals. No longer just a technical skill.
• BAs have an obligation to develop basic knowledge and competency in
the effective use of cybersecurity tools and approaches to information
and process management.
• IIBA and IEEE have partnered to provide a robust perspective on what the
business and the business analyst need to know to be prepared for
today’s challenges. The training and the certification give everyone the
opportunity to learn key concepts needed to perform, and the credibility
of a joint certification to demonstrate core competency.
• The information provided is a broad-based set of the basics of
cybersecurity designed around the kind of analysis needed to assist in the
overall cybersecurity solution, but leverages the collaboration of the
business, the analyst, the architects and the technology experts to create
a safe and secure cyber environment.
4
Module 1: Introduction to Cybersecurity Analysis Importance of Security
5
Importance of Security Module 1: Introduction to Cybersecurity Analysis
1.Billingsley, Luanne. Cybersmart: Protect the Patient, Protect the Data. Journal of
Radiology Nursing Volume 38, Issue 4. Elsevier Inc. December 2019. https://
www.sciencedirect.com/science/article/abs/pii/
S1546084319301737?via%3Dihub.
2.Techopedia.com. Definition - What does Identity Theft mean?. https://
www.techopedia.com/definition/13637/identity-theft.
3. Techpanther. All about Ethical Hacking. Techpanther. October 2017. https://
www.techpanther.in/2017/10/all-about-ethical-hacking.html.
4..The European Centre of Technology. The Importance of Cyber Security. https:/
/theect.org/importance-cyber-security/?
5.Seetharaman, R. Risk integration is key to better cybersecurity management.
Gulf Times. February 23 2019. https://amp.gulf-times.com/story/623073/
Risk-integration-is-key-to-better-cybersecurity-ma.
6.Cybersecurity Ventures. Annual Cybercrime Report. Cybercrime Magazine.
2019. https://cybersecurityventures.com/hackerpocalypse-cybercrime-
report-2016.
7.Ibid.
6
Module 1: Introduction to Cybersecurity Analysis Importance of Security
7
Importance of Security Module 1: Introduction to Cybersecurity Analysis
8
Module 1: Introduction to Cybersecurity Analysis IT Functions & Roles
1.3.1 Introduction
• BAs who have not worked in an IT field, or whose experience is not with a
large, mature IT business, will need to understand the functions and
responsibilities of the IT teams in order to perform effectively in the
cybersecurity space.
• Of course, not all IT departments are alike, and range in size and
capabilities. This module intends to cover common IT roles with which
the BA would typically interact.
• BAs are the link between the business and technology. In a cybersecurity
setting from an infrastructure perspective, the business in the most direct
sense, is IT, which means the IT departments are your clients.
• BAs are also the first line of defense when protecting data assets and are
involved with eliciting the rules to manage data assets.
9
IT Functions & Roles Module 1: Introduction to Cybersecurity Analysis
• The BA's domain can range from being highly technical to being business
focused depending on the nature of their assignment. There can be a
steep learning curve depending on your background, experience and the
related industry.
• Although cybersecurity may be considered by many as an “IT Security’s
job”, it is in fact everyone’s responsibility, particularly those in IT.
• The BA working in cybersecurity must understand how cybersecurity
plays a role in each of these departments’ services.
1.3.3 IT Leadership
10
Module 1: Introduction to Cybersecurity Analysis IT Functions & Roles
1.The Open Group. Open Group Architecture Framework (TOGAF). Van Haren
Publishing. April 2018.
11
IT Functions & Roles Module 1: Introduction to Cybersecurity Analysis
1.3.7 IT Operations
• Operations is responsible for “keeping the lights on”; ensuring that the
technology used by the business to operate, is available.
• Some key functions performed by IT Operations include:
• Provisioning of personal computers and mobile devices
• Maintaining infrastructure
• Change management
• Service support/incident management
• Network and firewall security management
• Directory management and access control
• Asset management
• Maintaining databases
12
Module 1: Introduction to Cybersecurity Analysis IT Functions & Roles
13
IT 101 - 1: The Pieces Module 1: Introduction to Cybersecurity Analysis
Introduction to IT 101
Recognizing that not all BAs come from an IT background, we created these three
IT 101 modules to provide learners with a high level, basic introduction to some
of the key IT concepts that are important to be familiar with when performing
business analysis in cybersecurity.
The modules are roughly divided into three sections, and each section ends with
a few words on how the concepts introduced are relevant to the BA in
cybersecurity. The sections are:
• IT 101 - 1: The Pieces (p. 14)
• IT 101 - 2: Using & Managing the Pieces (p. 18)
• IT 101 - 3: Advancement (p. 24)
14
Module 1: Introduction to Cybersecurity Analysis IT 101 - 1: The Pieces
15
IT 101 - 1: The Pieces Module 1: Introduction to Cybersecurity Analysis
computing element for the application form, and will handle the
processing logic and the database storage and retrieval functions.
• A Client-Server computing model allows client computers to request
services from the shared resources of a server. This allows for processing
and storage optimization of an application, with centralized control of the
data storage and its security.
16
Module 1: Introduction to Cybersecurity Analysis IT 101 - 1: The Pieces
1.4.6 Platforms
• A computer is made up of several parts including the processor, memory,
disc/data storage, network interface, power supply, and other
components.
• The computer platform is controlled by software which is referred to as
the operating system. The operating system on a typical personal
computer is Microsoft Windows or Apple IOS while on a server that may
be Unix or Windows Server. Virtualization software such as VMware is also
able to share computing resources and create virtual machines within a
single computer device.
• Platform as a Service:PaaS is a way that the entire environment can be
shared in the cloud. This means that the computing platform lives outside
a customer premise and often it provides specialized software services. A
cloud based shopping cart experience may be considered a PaaS when
combined with a cloud based buyer-connecting seller platform. Some
computing platforms are more comprehensive and cover all the
infrastructure components, and are referred to as Infrastructure as a
Service (IaaS) or if just a single application with defined functionality in
software is referred to as Software as a Service - SaaS.
17
IT 101 - 2: Using & Managing the Pieces Module 1: Introduction to Cybersecurity Analysis
Re-introduction to IT 101
Recognizing that not all BAs come from an IT background, we created these three
IT 101 modules to provide learners with a high level, basic introduction to some
of the key IT concepts that are important to be familiar with when performing
business analysis in cybersecurity.
The modules are roughly divided into three sections, and each section ends with
a few words on how the concepts introduced are relevant to the BA in
cybersecurity. The sections are:
• IT 101 - 1: The Pieces (p. 14)
• IT 101 - 2: Using & Managing the Pieces (p. 18)
• IT 101 - 3: Advancement (p. 24)
18
Module 1: Introduction to Cybersecurity Analysis IT 101 - 2: Using & Managing the Pieces
19
IT 101 - 2: Using & Managing the Pieces Module 1: Introduction to Cybersecurity Analysis
20
Module 1: Introduction to Cybersecurity Analysis IT 101 - 2: Using & Managing the Pieces
• Agile is a mindset which is iterative rather than linear. The work effort
starts with a general description of solution outcomes and a clear value
statement rather than with detailed requirements and design. The
requirement details and design are progressive with each iteration. The
outcome of each iterative cycle emphasizes workable product as a
priority over written artifacts. This mindset has shown to increase the
time to market for many (not all) initiatives. Common specifics in this area
include SCRUM, KANBAN, and Lean. 1
24 hr
2–4
weeks
Shippable
Product Sprint
Sprint Product Retrospective
Backlog Backlog
Showcase
Feedback Loop
21
IT 101 - 2: Using & Managing the Pieces Module 1: Introduction to Cybersecurity Analysis
22
Module 1: Introduction to Cybersecurity Analysis IT 101 - 2: Using & Managing the Pieces
23
IT 101 - 3: Advancement Module 1: Introduction to Cybersecurity Analysis
Re-introduction to IT 101
Recognizing that not all BAs come from an IT background, we created these three
IT 101 modules to provide learners with a high level, basic introduction to some
of the key IT concepts that are important to be familiar with when performing
business analysis in cybersecurity.
The modules are roughly divided into three sections, and each section ends with
a few words on how the concepts introduced are relevant to the BA in
cybersecurity. The sections are:
• IT 101 - 1: The Pieces (p. 14)
• IT 101 - 2: Using & Managing the Pieces (p. 18)
• IT 101 - 3: Advancement (p. 24)
24
Module 1: Introduction to Cybersecurity Analysis IT 101 - 3: Advancement
25
IT 101 - 3: Advancement Module 1: Introduction to Cybersecurity Analysis
26
Module 1: Introduction to Cybersecurity Analysis IT 101 - 3: Advancement
27
The Role of Business Analysis in Cybersecurity Module 1: Introduction to Cybersecurity Analysis
1.7.1 Overview
A Guide to the Business Analysis Body of Knowledge® (BABOK® Guide) defines
Business Analysis as the practice of enabling change in an enterprise by
defining needs and recommending solutions that deliver value to
stakeholders.
BAs in the IT industry are the interface between business and technology; we
are interpreters and translators. A BA can work in cybersecurity in a number
of possible capacities:
• introducing new security services/processes/technology via projects;
• supporting security operations;
• as a BA outside security (even outside IT) who must engage with the IT
Security team and operate within security frameworks/requirements.
In this environment, the ‘Business’ or the most immediate client is IT, so it is
more technical than other business stakeholder groups. The BA needs to be
able to create Requirements around the application they are working on, and
to work with the appropriate security expert to ensure the requirements and
voice of the business are well understood and built into solutions.
28
Module 1: Introduction to Cybersecurity Analysis The Role of Business Analysis in Cybersecurity
• What sets the subject of cybersecurity apart from other business areas in
which BAs practice is that a working, technical understanding of the
business itself is critical.
1.Barrios, Joe. Five Key Roles For The Business Analyst in Cybersecurity. https://
www.joebarrios.com/roles-business-analyst-in-cybersecurity/.
29
The Role of Business Analysis in Cybersecurity Module 1: Introduction to Cybersecurity Analysis
30
Module 1: Introduction to Cybersecurity Analysis The Role of Business Analysis in Cybersecurity
31
Governance Perspectives of Cybersecurity Module 1: Introduction to Cybersecurity Analysis
1.8.1 Introduction
• A fundamental task that Business Analysis Practitioners (BAs) perform is
Stakeholder Analysis.
• In the cybersecurity domain, depending on the work being undertaken,
and where within the organization the work is being performed, those
who affect/will be affected by the initiative will vary:
• Initiatives of an enterprise level will naturally require decision makers
and influencers sitting at an executive or senior leadership level.
• Security strategizing and planning at the infrastructure level may
require a higher level of leadership engagement as well, but those in
the director and management levels will likely hold much of the
accountability and responsibility for these initiatives.
• In terms of solution delivery and operations, those from the business
side as well as more tactical level IT management will be playing
more significant roles in application-related projects and day-to-day
operational activities.
• Input from security professionals within the organization will be essential
at all levels of responsibility.
• The purpose of this module is to provide you with considerations and
questions to ask when defining which group or individual(s) must be
assigned roles of Responsible for, Accountable for, Consulted on, and
Informed of, decisions related to your assignment.
32
Module 1: Introduction to Cybersecurity Analysis Governance Perspectives of Cybersecurity
33
Governance Perspectives of Cybersecurity Module 1: Introduction to Cybersecurity Analysis
34
Module 1: Introduction to Cybersecurity Analysis Governance Perspectives of Cybersecurity
• "A" in RACI can also be used to represent Approve – the one who
makes and owns decisions.
• Consulted: Provides subject matter expertise, feedback, professional
advice; engages in two-way communication with the responsible or
accountable actors.
• Informed: Does not actively participate in the decision, task or deliverable
execution, but must be made aware of the outcome/output in order to
perform
It is possible to have the same individual identified in both the Accountable
and Responsible roles for a given task or deliverable.
Although it is possible and feasible to have a person or role assigned to more
than one participation type for a given task, it is best practice to assign only
one whenever possible.
1.8.6 Considerations
• BAs working on cybersecurity initiatives should be very clear on their role
and level of participation in terms of responsibility for each task and
deliverable.
• The BA may be directly involved in the development of the RACI, and if so,
there are some questions to consider when assigning stakeholders to
roles:
• R: Which department is typically responsible and therefore likely best
equipped? Who has capacity and influence to get the job done?
• A: Which organization will be provisioning the resources for this
activity and must live with the outcome? Who in that organization has
the right level of authority for this decision?
• C: Who knows about specific aspects of this work; whose input is
essential? Are there groups in the organization that have an oversight
or professional obligation to consult on the item?
• I: Who will be affected by this work or decision? Who will need to
inform others of the outcome, perhaps external to the organization?
• Cybersecurity should be a consideration for all initiatives; if a
cybersecurity professional is not on your team or part of your RACI, you
must get them there!
35
Governance Perspectives of Cybersecurity Module 1: Introduction to Cybersecurity Analysis
1.8.7 Examples
Gap Analysis R C C C C A - I
Business Case R A C C C C - -
Test Strategy C A C C C C R I
Training Plan C A - C C C - R
Org Risk C R R C C C A I
Assessment
Risk Treatment C R R I I I A I
Plan
Certification I R C C I I A I
Audit
ISMS C A R C I C C C
Management
36
Module 1: Introduction to Cybersecurity Analysis Governance Perspectives of Cybersecurity
NOTES
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
37
Governance Perspectives of Cybersecurity Module 1: Introduction to Cybersecurity Analysis
NOTES
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
38
Module 2: Enterprise Security
2 Concepts
1. Security Accountability
2. Cost of Securing an Organization
3. Outsourcing for Cybersecurity Expertise and Services
4. Risk Tolerance
5. Compliance
6. Best Practices and Benchmarking
7. Data Privacy
8. Data Privacy Nuances
9. Digital Rights Management (DRM)
10.Audit – Internal and External
39
Security Accountability Module 2: Enterprise Security Concepts
40
Module 2: Enterprise Security Concepts Security Accountability
41
Cost of Securing an Organization Module 2: Enterprise Security Concepts
42
Module 2: Enterprise Security Concepts Cost of Securing an Organization
platform, the user does not install anything but rather simply logs in and
uses the providers application for a subscription fee. SaaS security is the
responsibility of the SaaS provider.
• Risk-based assessment: are used to identify those items or areas that
present the highest risk, vulnerability, exposure and potential effects on
the enterprise, for inclusion in the IS annual audit plan. 1
43
Cost of Securing an Organization Module 2: Enterprise Security Concepts
44
Module 2: Enterprise Security Concepts Outsourcing for Cybersecurity Expertise and Services
45
Outsourcing for Cybersecurity Expertise and Services Module 2: Enterprise Security Concepts
• Intrusion Prevention Service (IPS): Live in the same area of the network
as a firewall, between the outside world and the internal network. IPS
proactively deny network traffic based on a security profile if that packet
represents a known security threat. 1
• Demilitarized Zone (DMZ): A screened (firewalled) network segment that
acts as a buffer zone between a trusted and untrusted network; typically
used to house systems such as web servers that must be accessible from
both internal networks and the internet. 2
1.Ibid.
2.ISACA. Cybersecurity Fundamentals Glossary. ISACA. 2016. https://
www.isaca.org/Pages/Glossary.aspx.
3..Maria, by Gitanjali. What is MSSP and how it helps small business IT security.
GetApp.com. March 2019. https://lab.getapp.com/what-is-mssp/.
46
Module 2: Enterprise Security Concepts Outsourcing for Cybersecurity Expertise and Services
47
Risk Tolerance Module 2: Enterprise Security Concepts
48
Module 2: Enterprise Security Concepts Risk Tolerance
49
Compliance Module 2: Enterprise Security Concepts
2.5 Compliance
1. Business Analysis Practitioner (BA) Focal Points
2. Key Terms and Definitions
3. Use Cases
4. Related Risks
5. Frameworks
6. Standards
50
Module 2: Enterprise Security Concepts Compliance
1.Ibid
2.Ibid.
51
Compliance Module 2: Enterprise Security Concepts
2.5.5 Frameworks
• Information Security Management Systems (ISMS):
• a set of policies, procedures, technical and physical controls to
protect the confidentiality, availability and integrity of information,
which can be applied to the entire organization or a specific area
• a systematic approach for establishing, implementing, operating,
monitoring, reviewing, maintaining and improving an organization’s
information security to meet business objectives by effectively
treating and managing risks
• supports IT and business management process with controls for
technical and business risks related to people, resources, assets and
processes, based on a risk assessment and the organization's risk
tolerance
1
52
Module 2: Enterprise Security Concepts Compliance
2.5.6 Standards
• ISO/IEC 27000 series: Information security management standard by the
International Organization for Standardization (ISO) and the International
Electrotechnical Commission (IEC); helps organizations protect their
information through effective technology, auditing and testing
practices, organizational processes and staff awareness programs.
• Data Protection Act 2018 (DPA 2018): Sets out the framework for data
protection law in the UK; updates and replaces the Data Protection Act
1998 and came into effect on May 25, 2018.
• General Data Protection Regulation of May 2018 (GDPR): A regulation in
EU law on data protection and privacy for all individual citizens; sets out
the key principles, rights and obligations for most processing of personal
data.
• Personal Information Protection and Electronic Documents Act (PIPEDA):
A Canadian law relating to data privacy; governs how private sector
organizations collect, use and disclose personal information in the course
of commercial business.
• Although the U.S. does not have a single overarching piece of legislation
for privacy protection, acts such as the Health Insurance Portability and
Accountability Act (HIPAA) may be applicable to standards compliance.
53
Best Practices and Benchmarking Module 2: Enterprise Security Concepts
54
Module 2: Enterprise Security Concepts Best Practices and Benchmarking
55
Data Privacy Module 2: Enterprise Security Concepts
2.7.1 Overview
• Data Privacy refers broadly to the need to protect sensitive information;
the largest area of concern currently is the personal information of
individuals.
• Data Privacy encompasses appropriate use of data as well as its
protection from loss or theft.
• Data Privacy is an emerging global concern and regulations vary by
jurisdiction.
56
Module 2: Enterprise Security Concepts Data Privacy
57
Data Privacy Module 2: Enterprise Security Concepts
58
Module 2: Enterprise Security Concepts Data Privacy Nuances
59
Data Privacy Nuances Module 2: Enterprise Security Concepts
60
Module 2: Enterprise Security Concepts Data Privacy Nuances
• Minimal data collection can make the user experience pleasant and
efficient.
• Know Why You Need It
• Document rationale for each field to confirm that you are using only
what you need.
• For information in sensitive or protected data categories, confirm
with your Legal team that you can use that data for that purpose.
• Leverage Access Control to Regulate Use
• Field-based access control allows you to hide sensitive information
from job roles that do not need it; for example, a bank’s customer
service department might have access to your account number, but a
security guard in the same bank should not.
• Row-based access control can be especially effective. For example,
many HR systems allow access only to the records of employees who
are in a manager’s direct reporting line. Row-based access control
can also help focus users only on data relevant to themselves and
their tasks. For international applications, consider row-based access
control that limits a user to transactions only in his or her geography.
• Remove Obsolete Data
• Strong retention policies that delete or archive data when it becomes
obsolete are another way of minimizing data.
• Note that removal of obsolete data also has positive application
benefits, such as improved performance.
• Many sensitive data are also subject to data retention regulations
which may require data to be kept for a certain length of time – check
with Legal.
• Disassociate or Remove Identifying Information
• Data can be made more private by removing it from the context of
other data. When managing personal data, a good practice is to
disassociate the identifying information (such as names and birth
dates) from the sensitive information (such as health status or bank
routing numbers) as much as can be permitted by the application.
• There are several techniques to accomplish this:
• Pseudonymization: The practice of assigning an artificial identifier
to replace personal (often identifying) information. The key
distinction between pseudonymization and anonymization is that
pseudonymization is reversible, usually by lookup in another
database.
• Anonymization: The practice of permanently disassociating
personal information from a record. Anonymization is irreversible;
once the data has been anonymized, the association to a real
person should be impossible to construct.
• Data Masking: The practice of replacing “real” personal
information with dummy data. If you are constructing test systems
with a copy of production data, masking personal information as
the data is imported is a best practice.
• Data Scrambling or Shuffling: The act of permuting identifying
information so that it no longer is associated with itself – for
example, swapping first name, last name, and birth date between
records in a dataset until the data no longer represent real
people.
61
Digital Rights Management (DRM) Module 2: Enterprise Security Concepts
62
Module 2: Enterprise Security Concepts Digital Rights Management (DRM)
63
Digital Rights Management (DRM) Module 2: Enterprise Security Concepts
64
Module 2: Enterprise Security Concepts Audit – Internal and External
1.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
2.Ibid.
65
Audit – Internal and External Module 2: Enterprise Security Concepts
1.Kurchina, Paul. The Five Most Common Cybersecurity Risks - and How to Fight
Back. D!gitalist Magazine. April 2018. https://www.digitalistmag.com/cio-
knowledge/2018/04/02/5-most-common-cybersecurity-risks-how-to-fight-
back-06037803.
2.Official Journal of the European Union Regulation (EU) 2016/679 (General Data
Protection Regulation). May 2018. https://gdpr-info.eu/.
66
Module 2: Enterprise Security Concepts Audit – Internal and External
67
Audit – Internal and External Module 2: Enterprise Security Concepts
NOTES
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
____________________________________________________________________________
68
Module 2: Enterprise Security Concepts Audit – Internal and External
NOTES
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
69
Audit – Internal and External Module 2: Enterprise Security Concepts
70
Module 3: Enterprise Risk
3
1. Risk Management & Control Assurance Framework
2. Organizational Risk Assessment
3. Risk Analysis: Threat Risk Assessments
4. Risk Analysis: Vulnerability Assessments
5. Business Case Development
6. Disaster Recovery and Business Continuity
71
Risk Management & Control Assurance Framework Module 3: Enterprise Risk
• Reviews and audits generally reveal findings that must be tracked and
managed to ensure that timely changes are made, and risk management
documentation is updated to reflect the adjustments.
72
Module 3: Enterprise Risk Risk Management & Control Assurance Framework
3.1.4 Frameworks
• National Institute of Standards & Technology (NIST) Cyber Security
Framework: Consists of standards, guidelines, and best practices to
manage cybersecurity-related risk and help to promote the protection
and resilience of critical infrastructure and other sectors important to the
economy and national security.
• ISO 27001: Although published and intended as a certification standard,
the implementation guidance also represents a cybersecurity framework
for organizations to follow when establishing an Information Security
Management System (ISMS), practice, and program.
• COBIT (Control Objectives for Information and related Technology):
A business framework for the Governance and Management of Enterprise
IT. Although this is a governance-level framework, it aligns and maps to
other major operational-level guidelines, standards, frameworks and
compliance rules.
73
Organizational Risk Assessment Module 3: Enterprise Risk
74
Module 3: Enterprise Risk Organizational Risk Assessment
75
Organizational Risk Assessment Module 3: Enterprise Risk
76
Module 3: Enterprise Risk Risk Analysis: Threat Risk Assessments
77
Risk Analysis: Threat Risk Assessments Module 3: Enterprise Risk
3.3.5 Methodology
• Whether an automated tool or manual process or framework is used to
conduct a TRA, there are some key steps that are taken. The exact
number of steps will vary across models, but in general, a Threat Risk
Assessment will require you to:
• Determine the scope of your Threat Risk Assessment: which
assets will be included.
• For each asset, identify potential vulnerabilities that can lead to
threats.
• For each vulnerability, identify the threats that could potentially lead
to a breach.
78
Module 3: Enterprise Risk Risk Analysis: Threat Risk Assessments
79
Risk Analysis: Vulnerability Assessments Module 3: Enterprise Risk
80
Module 3: Enterprise Risk Risk Analysis: Vulnerability Assessments
81
Risk Analysis: Vulnerability Assessments Module 3: Enterprise Risk
82
Module 3: Enterprise Risk Business Case Development
83
Business Case Development Module 3: Enterprise Risk
84
Module 3: Enterprise Risk Business Case Development
85
Disaster Recovery and Business Continuity Module 3: Enterprise Risk
86
Module 3: Enterprise Risk Disaster Recovery and Business Continuity
87
Disaster Recovery and Business Continuity Module 3: Enterprise Risk
88
Module 3: Enterprise Risk Disaster Recovery and Business Continuity
NOTES
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
89
Disaster Recovery and Business Continuity Module 3: Enterprise Risk
NOTES
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
90
Module 4: Cybersecurity Risks and
4 Controls
4.1.1 Introduction
• Cybersecurity Risks and Controls begins to dive deeper into the technical
application of the information covered in the previous three parts.
• In very general terms, cybersecurity is about identifying IT Risk: where
your systems and information are vulnerable to known and unknown
threats and putting countermeasures – or controls – in place to mitigate
those risks.
• In this module, we will introduce some key concepts around IT Risk and
Security Controls and provide a high-level overview of how the key
components of risk models relate and are applied to reduce overall
organizational cyber risk.
91
Understanding Security Controls and IT Risk: Part 1 Module 4: Cybersecurity Risks and Controls
92
Module 4: Cybersecurity Risks and Controls Understanding Security Controls and IT Risk: Part 1
93
Understanding Security Controls and IT Risks: Part 2 Module 4: Cybersecurity Risks and Controls
94
Module 4: Cybersecurity Risks and Controls Understanding Security Controls and IT Risks: Part 2
95
Understanding Security Controls and IT Risks: Part 2 Module 4: Cybersecurity Risks and Controls
1.Ibid.
2.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
96
Module 4: Cybersecurity Risks and Controls Understanding Security Controls and IT Risks: Part 2
• Is it Reliable?
• Is it independent from other countermeasures (no overlap)?
• Is it Easy to use?
• Is it Automated?
• Is it Sustainable?
• Is it Secure?
• Does it protect CIA (confidentiality, integrity, and availability) of
assets?
• Can it be Backed-out in event of an issue?
• Does it create no additional issues during operation?
• Does it leave no residual data from its function?
1
1.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
97
CIA Triad Module 4: Cybersecurity Risks and Controls
4.3.2 C: Confidentiality
• Ensures that data or an information system is accessed by only an
authorized person.
• Ensures that data is not made available or disclosed to unauthorized
individuals, entities, or processes.
• User IDs and passwords, access control lists (ACL) and policy-based
security are some of the methods through which confidentiality is
achieved. 3
• NIST Special Publication 800-60v1r1 defines the Security Objective of
the Confidentiality aspect of information:
Preserving authorized restrictions on information access and
disclosure, including means for protecting personal privacy and
proprietary information. 4
98
Module 4: Cybersecurity Risks and Controls CIA Triad
4.3.3 I: Integrity
• Integrity assures that the data or information system can be trusted and
is edited by only authorized persons and remains in its original state when
at rest.
• Integrity means assuring the accuracy and completeness of data over its
entire lifecycle.
• Data encryption and hashing algorithms are key processes in providing
integrity. 2
1.Ibid.
2.Techopedia.com. Definition - What does Integrity mean?.https://
www.techopedia.com/definition/10284/integrity.
99
CIA Triad Module 4: Cybersecurity Risks and Controls
4.3.4 A: Availability
• Data and information systems are available when required; computing
systems used to store and process information, the security controls
used to protect it, and the communication channels used to access it
must be functioning correctly. 3
• Hardware maintenance, software patching/upgrading, and network
optimization ensure availability. 4
100
Module 4: Cybersecurity Risks and Controls CIA Triad
101
Applying Controls Module 4: Cybersecurity Risks and Controls
102
Module 4: Cybersecurity Risks and Controls Applying Controls
1.National Institute of Standards and Technology (NIST). NIST SP 800: 53, 54,
55, 56, 57, 58. U.S. Department of Commerce. 2015, 2019, 2008, 2018, 2016,
2005.
103
Applying Controls Module 4: Cybersecurity Risks and Controls
PROTECT (PR) Awareness and Training (PR.AT): PR.AT-2, -3, -4, -5:
The organization’s personnel and Privileged users, third-party
partners are provided cybersecurity stakeholders, senior
awareness education and are executives, physical and
trained to perform their cybersecurity
cybersecurity-related duties and personnel understand their
responsibilities consistent with roles and responsibilities.
related policies, procedures, and
agreements.
104
Module 4: Cybersecurity Risks and Controls Applying Controls
105
Cybersecurity Threats: Part 1 Module 4: Cybersecurity Risks and Controls
106
Module 4: Cybersecurity Risks and Controls Cybersecurity Threats: Part 1
Craft or Create Attack Tools Craft phishing and other attacks and
counterfeit entities, create and operate
false-fronts to inject malicious
components.
107
Cybersecurity Threats: Part 1 Module 4: Cybersecurity Risks and Controls
108
Module 4: Cybersecurity Risks and Controls Cybersecurity Threats: Part 1
109
Cybersecurity Threats: Part 1 Module 4: Cybersecurity Risks and Controls
T Tampering Integrity
R Repudiation Non-reputability
1.Praerit Garg and Loren Kohnfelder. The STRIDE Threat Model. Microsoft
Corporation. November 2009. https://docs.microsoft.com/en-us/previous-
versions/commerce-server/ee823878(v=cs.20)?redirectedfrom=MSDN.
2.Bruce Schneier. Attack Trees. Dr. Dobb's Journal. December 1999. https://
www.schneier.com/academic/archives/1999/12/attack_trees.html.
110
Module 4: Cybersecurity Risks and Controls Cybersecurity Threats: Part 1
111
Cybersecurity Threats: Part 2 Module 4: Cybersecurity Risks and Controls
112
Module 4: Cybersecurity Risks and Controls Cybersecurity Threats: Part 2
113
Cybersecurity Threats: Part 2 Module 4: Cybersecurity Risks and Controls
1.National Institute of Standards and Technology (NIST). NIST SP 800 30, 32, 94.
U.S. Department of Commerce. 2012, 2001, 2007.
2.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
114
Module 4: Cybersecurity Risks and Controls Cybersecurity Vulnerabilities: Part 1
4.7.1 Definitions
• Vulnerability:
• A weakness of an asset or group of assets that can be exploited by
one or more threats, where an asset is anything that has value to the
organization, its business operations and their continuity, including
information resources that support the organization's mission. 1
• A flaw or weakness in system security procedures, design,
implementation, or internal controls that could be exercised
(accidentally triggered or intentionally exploited) and result in a
security breach or a violation of the system's security policy. 2
• A weakness in the design, implementation, operation or internal
control of a process that could expose the system to adverse threats
from threat events. 3
115
Cybersecurity Vulnerabilities: Part 1 Module 4: Cybersecurity Risks and Controls
1.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
2.International Organization for Standardization (ISO). ISO/IEC FIDIS 27005.
Information technology - Security techniques - Information Security risk
management 3rd Edition. International Organization for Standardization (ISO).
2018.
116
Module 4: Cybersecurity Risks and Controls Cybersecurity Vulnerabilities: Part 1
117
Cybersecurity Vulnerabilities: Part 2 Module 4: Cybersecurity Risks and Controls
1.Ibid.
118
Module 4: Cybersecurity Risks and Controls Cybersecurity Vulnerabilities: Part 2
1.Ibid.
119
Cybersecurity Vulnerabilities: Part 2 Module 4: Cybersecurity Risks and Controls
1.Ibid.
2.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
3.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
120
Module 4: Cybersecurity Risks and Controls Cybersecurity Vulnerabilities: Part 2
• Authenticated scans:
• Directly access network-based assets using secure shell (SSH) or
remote desktop protocol (RDP)
• Authenticate using provided system credentials
• Provide detailed and accurate information about the operating
system and installed software, including configuration issues and
missing security patches 1
• Unauthenticated scans:
• Typically used by threat actors or security analysts trying to
determine the security posture of externally accessible assets
• Unable to provide detailed information about the asset's operating
system and installed software
2
121
Cybersecurity Vulnerabilities: Part 2 Module 4: Cybersecurity Risks and Controls
• Once an attacker has exploited one vulnerability, they may gain access to
other machines, so the process repeats i.e. look for new vulnerabilities
and attempt to exploit them. This process is referred to as pivoting.
1.Ryan. Summarizing the Five Phases of Penetration Testing. Cybrary. May 2015.
https://www.cybrary.it/2015/05/summarizing-the-five-phases-of-
penetration-testing/
122
Module 4: Cybersecurity Risks and Controls Adverse Impacts
4.9.1 Overview
• Impact to business operations or assets is a factor when identifying
controls to treat risks.
• The higher the negative potential impact, the more controls required to
protect against the associated threats.
• Overall risk posed by a threat is a product of the likelihood of its
occurrence and the severity of its potential adverse impact on the
organization.
• Organizations can describe adverse impacts in terms of:
• the potential harm caused to organizational operations and assets,
individuals, other organizations, or
• failure to achieve one or more security objectives (i.e., confidentiality,
integrity, or availability)
• When conducting Impact Analysis, NIST goes on to suggest that
organizations state:
• the process used to conduct impact determinations;
• assumptions related to impact determinations;
• credible sources and methods for obtaining impact information; and
• the rationale for the conclusions reached regarding impact
determinations.
1
123
Adverse Impacts Module 4: Cybersecurity Risks and Controls
124
Module 4: Cybersecurity Risks and Controls Adverse Impacts
Type of Examples
IMPACT
HARM TO • Inability to perform current or future missions/business
OPERATIONS functions
• Harms due to noncompliance (e.g. financial costs, sanctions)
• Direct financial costs
• Relational harms: damage to trust relationships or reputation
125
Adverse Impacts Module 4: Cybersecurity Risks and Controls
1.Ibid.
126
Module 4: Cybersecurity Risks and Controls Risks and Controls – Putting It All Together
127
Risks and Controls – Putting It All Together Module 4: Cybersecurity Risks and Controls
4.10.2 Overview
• Security controls are technical and/or process tools that are implemented
to provide targeted protection against specific threats to organizations’
assets and business operations.
• Control selection requires thorough analysis of system vulnerabilities, the
threats that put systems at risk, and the impact on business should a
threat event occur.
• There are various tools and methodologies available to aid in conducting
these IT Security Risk assessments.
• A common framework is the NIST SP 800-30 Guide for Conducting Risk
Assessments.
• The ISO 27001 standard, Annex A provides an extensive list of common
controls that are designed to target and be assigned to each threat risk
identified.
• The preceding modules in Part 4 of this course described each factor of
risk calculations and how they can be derived.
• The following table shows how to tabulate the factors to determine risks,
which can then be prioritized for targeted control assignment.
1 2 3 4 5 6 7 8 9 10 11 12 13
Threat Source Likelihood
Vulnerabilitie
Likelihood of Overall
Threat Threat Characteristics s and Severity and Level of
Relevance of Attack Initiated Likelihoo Risk
Event Sources Predisposing Pervasiveness Impact
Initiation Attack d
Capability Intent Targeting Conditions
Succeeds
...which
...that an event will be
...that could could be
Likelihood one or more of initiated and will result
initiate the exploited
the threat sources in adverse impact
event
initiates the threat event
...of vulnerabilities and of Risk = Likelihood x
predisposing conditions Impact
1.Ibid.
128
Module 4: Cybersecurity Risks and Controls Risks and Controls – Putting It All Together
1 2 3 4 5 6 7 8 9 10 11 12 13
Threat Source Likelihood
Vulnerabilitie
Likelihood of Overall
Threat Threat Characteristics s and Severity and Level of
Relevance of Attack Initiated Likelihoo Risk
Event Sources Predisposing Pervasiveness Impact
Initiation Attack d
Capability Intent Targeting Conditions
Succeeds
Very Low Very Low Very Low Very Low Low Low
1.Ibid.
2.Ibid.
129
Risks and Controls – Putting It All Together Module 4: Cybersecurity Risks and Controls
130
Module 4: Cybersecurity Risks and Controls Risks and Controls – Putting It All Together
131
Risks and Controls – Putting It All Together Module 4: Cybersecurity Risks and Controls
132
Module 4: Cybersecurity Risks and Controls Risks and Controls – Putting It All Together
133
Risks and Controls – Putting It All Together Module 4: Cybersecurity Risks and Controls
NOTES
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
___________________________________________________________________________
134
Module 4: Cybersecurity Risks and Controls Risks and Controls – Putting It All Together
NOTES
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
135
Risks and Controls – Putting It All Together Module 4: Cybersecurity Risks and Controls
136
Module 5: Securing the Layers
5
1. Physical Security
2. Endpoint Security
3. Network Security: Security Architecture
4. Network Security: Firewalls
5. Network Security: Anti-Virus/Anti-Malware
6. Network Security: Segregation
7. System Security: Servers
8. Platform Security
9. Product Security: Threat Models
10.Product Security: Embedded Systems
11.Product Security: Internet of Things
137
Physical Security Module 5: Securing the Layers
138
Module 5: Securing the Layers Physical Security
139
Endpoint Security Module 5: Securing the Layers
140
Module 5: Securing the Layers Endpoint Security
141
Network Security: Security Architecture Module 5: Securing the Layers
1.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
2.Ibid.
142
Module 5: Securing the Layers Network Security: Security Architecture
1.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
2.Ibid.
3.ISACA. Cybersecurity Fundamentals Glossary. ISACA. 2016. https://
www.isaca.org/Pages/Glossary.aspx.
4.McGraw, Gary. Thirteen principles to ensure enterprise system security.
TechTarget. January 2013. https://searchsecurity.techtarget.com/opinion/
Thirteen-principles-to-ensure-enterprise-system-security.
5.Ibid.
6.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
143
Network Security: Security Architecture Module 5: Securing the Layers
144
Module 5: Securing the Layers Network Security: Firewalls
145
Network Security: Firewalls Module 5: Securing the Layers
1.Robinson, Chad. Best Practices for Firewall Deployments. CSO. October 2002.
https://www.csoonline.com/article/2113273/best-practices-for-firewall-
deployments.html.
2.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
3.Ibid.
146
Module 5: Securing the Layers Network Security: Firewalls
147
Network Security: Anti-Virus/Anti-Malware Module 5: Securing the Layers
1.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
148
Module 5: Securing the Layers Network Security: Anti-Virus/Anti-Malware
149
Network Security: Segregation Module 5: Securing the Layers
1.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
150
Module 5: Securing the Layers Network Security: Segregation
151
System Security: Servers Module 5: Securing the Layers
1.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
2.ITSRM. Mandatory Security Baselines. CERN Computer Society. June 2010.
https://security.web.cern.ch/security/rules/en/baselines.shtml.
3.International Standards Organization. ISO/IEC 11889-1:2015 Information
Technology - Trusted platform module library - Part 1: Architecture. ISO. August
2015.
4.ISACA. Cybersecurity Fundamentals Glossary. ISACA. 2016. https://
www.isaca.org/Pages/Glossary.aspx.
5.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
6.Ibid.
7.Ibid.
152
Module 5: Securing the Layers System Security: Servers
1.Ibid.
2.ISACA. Cybersecurity Fundamentals Glossary. ISACA. 2016. https://
www.isaca.org/Pages/Glossary.aspx.
3.Ibid.
4.Gartner. Gartner Information Technology Glossary: P2p. https://
www.gartner.com/en/information-technology/glossary/p2p-peer-to-peer.
5.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
153
System Security: Servers Module 5: Securing the Layers
1.Ibid.
154
Module 5: Securing the Layers Platform Security
155
Platform Security Module 5: Securing the Layers
156
Module 5: Securing the Layers Platform Security
157
Product Security: Threat Models Module 5: Securing the Layers
1.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
2.OWASP. Threat Modeling Cheat Sheet. https://owasp.org/www-project-cheat-
sheets/cheatsheets/Threat_Modeling_Cheat_Sheet.html.
3.ISACA. Cybersecurity Fundamentals Glossary. ISACA. 2016. https://
www.isaca.org/Pages/Glossary.aspx.
4.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
5.National Institute of Standards and Technology (NIST). NIST SP 800 154: Guide
to Data-Centric System Threat Modeling. U.S. Department of Commerce.
September 2016.
158
Module 5: Securing the Layers Product Security: Threat Models
159
Product Security: Threat Models Module 5: Securing the Layers
1.Ibid.
160
Module 5: Securing the Layers Product Security: Embedded Systems
1.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015
2.EDN. Embedded Systems Security - Part 1: Security requirements. February
2013. https://www.edn.com/embedded-systems-security-part-1-security-
requirements/.
3.Ibid.
4.Wolf, Marko and André Weimerskirch. Hardware Security Modules for
Protecting Embedded Systems. ESCRYPT Inc. https://
pdfs.semanticscholar.org/54c2/
485b78e0e084225c0d3a04bc7a7a5deef727.pdf.
161
Product Security: Embedded Systems Module 5: Securing the Layers
1.Ibid.
2.Gipper, Jerry. Securing embedded systems based on Open System Architectures.
Vita Technologies. http://vita.mil-embedded.com/articles/securing-based-
open-system-architectures/.
3.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
162
Module 5: Securing the Layers Product Security: Internet of Things
163
Product Security: Internet of Things Module 5: Securing the Layers
1.Salgy, Susan. 7 ways to secure the IoT in your enterprise. Techbeacon. https://
techbeacon.com/security/7-ways-secure-iot-your-enterprise.
164
Module 5: Securing the Layers Product Security: Internet of Things
NOTES
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
165
Product Security: Internet of Things Module 5: Securing the Layers
NOTES
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
166
Module 6: Data Security
6
1. Data Security At Rest: Information Classification & Categorization
2. Data Security In Transit: Encryption and Keys
3. Data Security In Transit: SSL/TLS
4. Data Security In Transit: Digital Signature and Identification
167
Data Security At Rest: Information Classification & Categorization Module 6: Data Security
168
Module 6: Data Security Data Security At Rest: Information Classification & Categorization
• Classifying Information:
• Once information and systems have been categorized, classification
is used to determine appropriate security initiatives to protect the
categorized information, i.e. how documents, data, and systems
containing the categorized information must be handled, stored,
transmitted, accessed, published, destroyed, etc. 1
• Identifying and applying project specific security controls within a
Software Development Lifecycle (SDLC).
• Defining and updating a baseline set of security controls, based on
industry standards, for an organization.
1.Ibid.
169
Data Security In Transit: Encryption and Keys Module 6: Data Security
170
Module 6: Data Security Data Security In Transit: Encryption and Keys
• Key Pair: Comprised of a public and a private key. The keys are generated
at the same time and are associated with one another. The public key can
be freely shared with any party and, due to a mathematical relationship,
can be used to encrypt messages that only the private key can
decrypt. This is a one-way ability, meaning that the public key has
no ability to decrypt anything it writes. The private key should be kept
entirely secret and should never be shared with
another party. The private key is the only component capable of
decrypting messages using the associated public key.
• Hash Function: Takes what are potentially long messages and generates
a unique output value derived from the content of the message. The
output is commonly referred to as the message digest and is used to
validate that a message originated from a particular user and to ensure
that the message was not modified in transit between the two parties. 1
• Public Key Infrastructure (PKI): An infrastructure that enables users of
a basically nonsecure public network (such as the Internet) to exchange
data and money securely and privately through the use of a public and a
private cryptographic key pair that is obtained and shared through a
trusted authority. 2
1.Ibid.
2.Norton. Norton Glossary: PKI public key infrastructure. https://us.norton.com/
online-threats/glossary/p/pki-public-key-infrastructure.html.
3.Norton. Norton Glossary: key. https://us.norton.com/online-threats/glossary/
k/key.html.
171
Data Security In Transit: Encryption and Keys Module 6: Data Security
172
Module 6: Data Security Data Security In Transit: SSL/TLS
173
Data Security In Transit: SSL/TLS Module 6: Data Security
174
Module 6: Data Security Data Security In Transit: Digital Signature and Identification
1.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
175
Data Security In Transit: Digital Signature and Identification Module 6: Data Security
1.Ibid.
2.ISACA. Cybersecurity Fundamentals Glossary. ISACA. 2016. https://
www.isaca.org/Pages/Glossary.aspx.
3.Ibid.
4.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
5.Ibid.
6.Digicert and QuoVadis. Digital Certificate Use Cases. QuoVadis. https://
www.quovadisglobal.co.uk/DigitalCertificates/UserCertificates/
Digitalcertificate_Uses.aspx.
176
Module 6: Data Security Data Security In Transit: Digital Signature and Identification
177
Data Security In Transit: Digital Signature and Identification Module 6: Data Security
NOTES
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
178
Module 6: Data Security Data Security In Transit: Digital Signature and Identification
NOTES
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
179
Data Security In Transit: Digital Signature and Identification Module 6: Data Security
180
Module 7: User Access Control
7
1. Directory Management
2. Authorization
3. Authentication and Access Control
4. Privileged Account Management
5. Users and Security Awareness
7.1.1 Overview
• A directory is a comprehensive database designed to centralize the
management of data about an assortment of company entities, and will
typically contain a hierarchy of objects storing information about users,
groups, systems, servers, printers, etc. 1
• Directory Management is the practice of creating, operating, and
maintaining the entire directory file system, and is an enabler of user
access control.
• In a hierarchical file system, a directory contained inside another
directory is called a subdirectory. The terms parent and child are often
used to describe the relationship between a subdirectory and the
directory in which it is cataloged, the latter being the parent.
1.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
181
Directory Management Module 7: User Access Control
182
Module 7: User Access Control Directory Management
183
Directory Management Module 7: User Access Control
184
Module 7: User Access Control Authorization
7.2 Authorization
1. Business Analysis Practitioner (BA) Focal Points
2. Key Terms and Definitions
3. Use Cases
4. Software Licensing
5. Related Risks
6. Technology Controls
7. Process Controls
185
Authorization Module 7: User Access Control
1.Ibid.
2.Microsoft Azure. Common use-cases and scenarios for Azure Active Directory
Domain Services. October 2019. https://docs.microsoft.com/en-us/azure/
active-directory-domain-services/scenarios.
186
Module 7: User Access Control Authorization
187
Authentication and Access Control Module 7: User Access Control
188
Module 7: User Access Control Authentication and Access Control
• Virtual Private Network (VPN): A secure private network that uses the
public telecommunications infrastructure to transmit data. 1
• Single Sign On (SSO): Systems are integrated to enable the user to sign in
only once and have access to all required applications. Although
convenient for users and password management, it is not the most secure
feature.
• Principle of Least Privilege: A user has access to ONLY the assets and
data they require to perform their role – nothing more.
• Segregation of Duties (SoD): An internal control concept of having more
than one person required to complete a task, intended to prevent fraud
and error. For example, a user cannot approve their own expenses.
• Privileged Account Management (PAM): Establishing and maintaining
access rights and controls for users who require elevated privileges to an
entity for a particular administrative or support function. The four most
common use cases for privileged access are; Root or Built-in
Administrator; Service Account; Administrator Account; and, Power User. 2
1.Ibid.
2.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
3.ISACA. Cybersecurity Fundamentals Glossary. ISACA. 2016. https://
www.isaca.org/Pages/Glossary.aspx.
4.Bishop, Matt. Computer Security: art and science. Addison-Wesley. 2004. http:/
/research.omicsgroup.org/index.php/Access_Control_Matrix.
189
Authentication and Access Control Module 7: User Access Control
190
Module 7: User Access Control Authentication and Access Control
191
Privileged Account Management Module 7: User Access Control
1.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
2.ISACA. Cybersecurity Fundamentals Glossary. ISACA. 2016. https://
www.isaca.org/Pages/Glossary.aspx.
192
Module 7: User Access Control Privileged Account Management
193
Privileged Account Management Module 7: User Access Control
194
Module 7: User Access Control Users and Security Awareness
195
Users and Security Awareness Module 7: User Access Control
196
Module 7: User Access Control Users and Security Awareness
NOTES
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
197
Users and Security Awareness Module 7: User Access Control
NOTES
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
198
Module 8: Solution Delivery
8
1. SDLC and Solution Security Planning
2. Requirements and Security Engineering
3. Requirements and Solution Development
4. Solution Security: Applications
5. Solution Security: Databases
6. Solution Security: Web
7. Change Impact Analysis
199
SDLC and Solution Security Planning Module 8: Solution Delivery
200
Module 8: Solution Delivery SDLC and Solution Security Planning
8.1.4 Approaches
• Security requirements will include access controls, data protection and
performance expectations, such as enforcement or notifications
and vulnerabilities within the enterprise or organization.
• Waterfall
• Security requirements are documented within non-functional
requirements.
• Agile
• Security requirements can be expressed within the acceptance or
success criteria to ensure developers and quality assurance tasks
are aware of the security requirement.
201
Requirements and Security Engineering Module 8: Solution Delivery
8.2.1 Overview
• This module discusses one of the core Business Analysis practices –
Requirements Gathering and Analysis – but in a very specific context.
Some technical teams refer to this domain as Security Engineering.
• The degree of BA involvement in these activities will vary, but the key role
of the BA who does participate is around Requirements Gathering and
Analysis. Documenting and maintaining these requirements is key to
ensuring the architecture and designs align with the organization’s core
goals and strategic direction.
• The next module discusses Requirements in the more typical context –
Solution Development – and the BA’s cybersecurity activities in that
broader area.
1.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
202
Module 8: Solution Delivery Requirements and Security Engineering
8.2.5 Approach
• Establish key design principles and guidelines
• Fundamental statements of belief, mandatory elements (or optional
guidelines) that will restrict the overall design and establish key
priorities for protection
• Provide the high level (business) requirements for secure design
• Establish detailed requirements: functional and non-functional
• Functional requirements address what the design must do or
accomplish: security services to include, assets to protect,
common threats to address, vulnerabilities identified, and controls
• Non-functional requirements focus on the qualities of the services,
including reliability and performance
1.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
2.Ibid.
203
Requirements and Security Engineering Module 8: Solution Delivery
• When approved, these requirements are used to guide the next phase:
the creation of security designs.
1
1.Ibid.
2.International Institute of Business Analysis. A Guide to the Business Analysis
Body of Knowledge® version 3. International Institute of Business Analysis.
2015.
204
Module 8: Solution Delivery Requirements and Solution Development
1.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
2.Ibid.
205
Requirements and Solution Development Module 8: Solution Delivery
206
Module 8: Solution Delivery Requirements and Solution Development
207
Solution Security: Applications Module 8: Solution Delivery
1.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
2.Gartner. Gartner Information Technology Glossary: Software as a Service
(SaaS). https://www.gartner.com/en/information-technology/glossary/
software-as-a-service-saas.
208
Module 8: Solution Delivery Solution Security: Applications
209
Solution Security: Applications Module 8: Solution Delivery
1.Ibid.
210
Module 8: Solution Delivery Solution Security: Databases
1.ICS. Official (ISC)² Guide to the CISSP CBK, Fourth Edition. Auerbach
Publications. March 2015.
211
Solution Security: Databases Module 8: Solution Delivery
1.Ibid.
2.Gartner. Gartner Information Technology Glossary: Dbms (database
Management System). https://www.gartner.com/en/information-technology/
glossary/dbms-database-management-system.
3.Ibid.
212
Module 8: Solution Delivery Solution Security: Databases
213
Solution Security: Web Module 8: Solution Delivery
214
Module 8: Solution Delivery Solution Security: Web
1.Ibid.
2.Ibid.
3.Ibid.
4.Gartner. Garter Information Technology Glossary: Cloud Access Security Brokers
(CASBs). https://www.gartner.com/en/information-technology/glossary/
cloud-access-security-brokers-casbs.
5.Arsenault, Cody. 11 Web Application Security Best Practices. Keycdn. March
2019. https://www.keycdn.com/blog/web-application-security-best-
practices.
215
Solution Security: Web Module 8: Solution Delivery
1.Ibid.
2.Gartner. Garter Information Technology Glossary: Cloud Access Security Brokers
(CASBs). https://www.gartner.com/en/information-technology/glossary/
cloud-access-security-brokers-casbs.
3.Prescott, Susan. The top 10 web application security risks. AT&T Business.
https://www.business.att.com/learn/tech-advice/the-top-10-web-
application-security-risks.html.
216
Module 8: Solution Delivery Change Impact Analysis
8.7.1 Introduction
• Impact Analysis (IA) is an important process in the overall strategy to
become resilient against cyber threats and attacks. IA is a critical step in
planning for a new solution and is generally required before performing a
risk assessment and the resulting change to the business.
• Another goal of an IA is to identify the relationships and dependencies a
business function has with other activities, both internal and external to
the organization. 1
• A Solution IA identifies the considerations that will impact people,
process, and technology within the organization. This step will be the
foundation for developing the solution to minimize impact across the
organization.
• This module focuses on the business impacts potentially introduced by
requirements related to cybersecurity.
• The focus of this module is not to be confused with business impact
analysis, the disaster recovery, or outage, impact analysis which is
covered in another module.
217
Change Impact Analysis Module 8: Solution Delivery
218
Module 8: Solution Delivery Change Impact Analysis
NOTES
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
219
Change Impact Analysis Module 8: Solution Delivery
NOTES
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
220
Module 8: Solution Delivery Change Impact Analysis
221
Change Impact Analysis Module 8: Solution Delivery
222
Module 9: Operations
9
1. Incident Response, Recovery, and Remediation
2. Metrics and Reporting
3. Risk Logging and Mitigation Tracking
4. Operational Risk Ownership
5. Computer Forensics: SOC, SIEM
6. Future Proofing your Security Posture
223
Incident Response, Recovery, and Remediation Module 9: Operations
224
Module 9: Operations Incident Response, Recovery, and Remediation
225
Incident Response, Recovery, and Remediation Module 9: Operations
1.Ibid.
226
Module 9: Operations Incident Response, Recovery, and Remediation
227
Metrics and Reporting Module 9: Operations
228
Module 9: Operations Metrics and Reporting
229
Metrics and Reporting Module 9: Operations
230
Module 9: Operations Risk Logging and Mitigation Tracking
231
Risk Logging and Mitigation Tracking Module 9: Operations
232
Module 9: Operations Risk Logging and Mitigation Tracking
1.Long, Richard. Monitoring Risk: Tracking Your Risk Mitigation Strategies. MHA
Consulting. November 2017. https://www.mha-it.com/2017/11/07/monitoring-
risk/.
233
Operational Risk Ownership Module 9: Operations
234
Module 9: Operations Operational Risk Ownership
9.4.3 Responsibilities
• Typically the Risk Owner is responsible for:
• Either following the organization's level of risk tolerance, or
establishing a risk tolerance level appropriate for their domain
• Identifying risks within their business unit, assessing them, and
determining treatment plans
• Ensuring risks and mitigation plans are documented, communicated
and reported appropriately
• Tracking, monitoring risks and mitigation effectiveness, and
remediating any gaps
• Integrating risk identification and management into operational
activities, and fostering a culture of risk awareness
• Stay aware of internal and external changes and advancements and
how risks may be introduced or affected
235
Computer Forensics: SOC, SIEM Module 9: Operations
236
Module 9: Operations Computer Forensics: SOC, SIEM
237
Computer Forensics: SOC, SIEM Module 9: Operations
238
Module 9: Operations Future Proofing your Security Posture
239
Future Proofing your Security Posture Module 9: Operations
240
Module 9: Operations Future Proofing your Security Posture
• The long-term trend is that this will grow significantly and create a need
to have more ability to control the cloud security using newer technology
approaches.
241
Future Proofing your Security Posture Module 9: Operations
9.6.10 Summary
• Cybersecurity remains a critical concern for all enterprises and is an
essential knowledge area for the business and for all BAs and many other
professionals. No longer just a tech skill.
• Business analysis practitioners have an obligation to develop basic
knowledge and competency in the effective use of cybersecurity tools
and approaches to information and process management.
• IIBA and IEEE have partnered to provide a robust perspective on what the
business and the business analyst need to know to be prepared for
today’s challenges. The training and the certification give everyone the
opportunity to learn key concepts needed to perform, and the credibility
of a joint certification to demonstrate core competency.
• The information provided is a broad-based set of the basics of
cybersecurity designed around the kind of analysis needed to assist in the
overall cybersecurity solution, but leverages the collaboration of the
business, the analyst, the architects and the technology experts to create
a safe and secure cyber environment.
242
Module 9: Operations Future Proofing your Security Posture
NOTES
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
243
Future Proofing your Security Posture Module 9: Operations
NOTES
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
244
Module 9: Operations Future Proofing your Security Posture
245
Unfilled cybersecurity jobs worldwide will
reach 3.5 million by 2021.
More than 300,000 cybersecurity jobs in the U.S. are unfilled,
and postings are up 74% over the past five years.
https://thehill.com/opinion/cybersecurity/365802-cyber-jobs-are-available-but-americans-dont-realize-they-are-qualified
Contributors:
Holly VanHelden (Lead SME), Principal IT Consultant, Iron Key Business Analytic Consulting
Allan Parrish, Associate Vice President for Research and Professor of Computer Science and Engineering, Mississippi State University
Bindu Channaveerappa, Business Analysis Consultant and Director of IIBA UK London Communities
Kevin Haines, Program Director, Sr BSA, Principal Consultant at Online Business Systems
Rich Hilliard, Software Systems Architect and Chair Engineering Disciplines, IEEE Computer Society
© 2019 International Institute of Business Analysis and IEEE Computer Society. All rights reserved.