SlideShare a Scribd company logo
CompTIA CySA+ Domain 5: Compliance
and Assessment
www.infosectrain.com | sales@infosectrain.com
www.infosectrain.com | sales@infosectrain.com
www.infosectrain.com | sales@infosectrain.com
CYSA+ Domains:
1.Threat and Vulnerability Management
2.Software and Systems Security
3.Security Operations and Monitoring
4.Incident Response
5.Compliance & Assessment
In this blog, we will discuss the fifth domain of CySA+: Compliance and Assessments.
In this domain, you will understand three important concepts:
1.The importance of data privacy and protection
2.Security concepts in support of organizations’ risk mitigation
3.Policies, frameworks, procedures, and controls are critical
www.infosectrain.com | sales@infosectrain.com
1. Importance of data privacy and protection
In any organization, there are many key pieces of information like
loyalty schemes, customer data, transactions, employee records, or
data collection that need to be protected from unauthorized access.
Protecting sensitive data is very important because it may contain
information about your current staff, business partners, clients, and
shareholders.
Data privacy is important since individuals who engage online need to
trust that their data will be handled carefully. Organizations use data
protection practices in order to demonstrate to their customers and
users that they can be trusted with their data.
In this concept, you will learn:

Recommended for you

How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx

With the advent of the digital age, businesses have gone digital with the help of adequate enterprise networking setup that comprises IT infrastructures that provides connectivity among users, devices, and applications.

enterprise network
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdf

With the advent of the digital age, businesses have gone digital with the help of adequate enterprise networking setup that comprises IT infrastructures that provides connectivity among users, devices, and applications.

enterprise network
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx

With the advent of the digital age, businesses have gone digital with the help of adequate enterprise networking setup that comprises IT infrastructures that provides connectivity among users, devices, and applications.

enterprise network
www.infosectrain.com | sales@infosectrain.com
1.Privacy vs. Security: Privacy and security are intertwined. Privacy refers to
whatever control you have over your personal information and how it is
utilized. Consider the privacy terms that you are required to read and agree
to when you download new smartphone apps. In contrast, security relates
to how your personal information is safeguarded, like your data and various
facts about you.
2.Technical controls: Technical controls use a variety of technologies to
minimize vulnerabilities. A few examples of technical controls are firewalls,
encryption, IDSs, the principle of least privilege, and antivirus software.
3.Non-technical controls: Unlike technical controls, non-technical controls
include such actions and things as procedures, administrative policies, and
standards for the full range of information security, including privacy
domains and assigned responsibilities.
www.infosectrain.com | sales@infosectrain.com
2. Security concepts in support of organizations’ risk mitigation
In this section, you will understand the below-mentioned concepts:
1. Risk identification process: Risk identification is the process of determining
which risks may harm the project. The main advantage of this procedure is that
it documents current risks and offers the project team information and the
capacity to predict occurrences.
2. Risk prioritization: The process of deciding which risks to act on first is known
as risk prioritizing. This should be based on the likelihood of a risk and its
potential consequence. Risk prioritizing may be accomplished by assessing the
risks to your company to decide which ones are more likely to occur and which
ones will have a greater impact. For evaluation, a risk prioritization matrix might
be employed.
3. Business impact analysis: A business impact analysis (BIA) is the process of
identifying the criticality of company activities and the resources required to
maintain operational resilience and continuity of operations during and after a
business interruption.
4. Training and exercises: In this section, you will learn about:
www.infosectrain.com | sales@infosectrain.com
 Red team: A “red team” is a group that pretends to be an enemy or rival
and gives security input from that vantage point. Red teams are utilized
in a variety of sectors, including cybersecurity, airport security, the
military, and intelligence organizations.
 Blue team: A blue team is a group of people that analyze information
systems to assure security, uncover security holes, test the efficacy of
each security measure, and ensure that all security measures remain
effective after installation.
 The White team: The team oversees and evaluates the cyber defense
competition. They are also in charge of documenting ratings for the Blue
Teams on usability and security supplied by the Green and Red Teams,
respectively. The White Team also examines security reports and grades
them based on accuracy and countermeasures.
www.infosectrain.com | sales@infosectrain.com
3. Policies, frameworks, procedures, and controls
In this section, you will learn about:
1. Frameworks: A security framework is a collection of national and international
cybersecurity regulations and practices designed to protect vital infrastructure. It
contains detailed recommendations for businesses on how to handle personal
information contained in systems in order to reduce their exposure to security-
related threats.
2. Policies and procedures: This section reveals:
 Password policy: A password policy is a collection of guidelines to improve
computer security by helping users create and use strong passwords. A password
policy is frequently included in an organization’s formal policies and may be taught
as part of security awareness training.
 Acceptable use policy: A company’s acceptable use policy should refer to the safe
and ethical use of email and the internet as a whole. A code of conduct outlines
the acceptable use policy, such as what websites users can access, how they can
log on to the network, etc.
 Data retention: Data retention rules govern the maintenance of persistent data
and records to fulfill legal and corporate data archiving needs.

Recommended for you

QI Security Framework_v2007_7
QI Security Framework_v2007_7QI Security Framework_v2007_7
QI Security Framework_v2007_7

The document provides an overview of Quantiq International Group's Security Framework. It begins with an agenda for the framework overview, walkthrough, and in-depth discussion. It then introduces why a security framework is needed due to rapidly changing business models and technologies used to enhance processes. The Quantiq Security Framework (QSF) is presented as a top-down, methodological approach to establish assumptions, concepts, values and practices to secure the business. It covers business components, confidentiality-integrity-availability, security domains, technology options, the ISO 17799 cycle, and a PDCA process to manage security areas through a business lens.

D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62

The "Security and Risk Management" domain of the CISSP CBK addresses frameworks, policies, concepts, principles, structures, and standards used to establish criteria for protecting information assets. It also addresses assessing protection effectiveness, governance, organizational behavior, and creating security awareness education and training plans. The domain covers understanding and applying concepts of confidentiality, integrity, and availability, as well as applying security governance principles and understanding compliance, legal/regulatory issues, professional ethics, developing security policies, and business continuity requirements.

The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide

This document provides an overview and introduction to Microsoft's Security Risk Management Guide. It discusses the challenges of managing security risks in today's environment and introduces a four-phase security risk management process developed by Microsoft. The process uses both qualitative and quantitative risk assessment methods to identify, analyze, and prioritize security risks. It then provides frameworks for making risk management decisions and measuring the effectiveness of security controls. The guide is intended to help organizations of all sizes establish a formal security risk management program to proactively manage risks in a cost-effective manner.

tsrmg
www.infosectrain.com | sales@infosectrain.com
3.Control types: There are a few different control types; they are:
 Managerial control: A person with managerial control has the power, directly
or indirectly, to direct or cause the direction of the management or policies of
the organization, whether by exercising voting rights, by contract, or in any
other manner.
 Operational Control: Operational control refers to the authority to handle
subordinate forces, including organizing and operating them, assigning tasks,
determining objectives, and giving authoritative directions required to
complete the mission.
 Preventive control: A preventative control prevents a loss or an error from
occurring. Physical property protection and segregation of duties are examples
of preventive controls. Generally, these controls are built into a process so that
they are applied continuously.
www.infosectrain.com | sales@infosectrain.com
CySA+ with InfosecTrain:
InfosecTrain is one of the leading training platforms that offers consultancy
services, certifications, and training on cybersecurity and information security.
Our accredited trainer will help you gain the analytic skills to detect and defend
against cyberattacks in an organization. Our courses are available in live
instructor-led and self-paced sessions, making it easy to complete your training
journey. Join InfosecTrain’s CompTIA CySA+ training program to get cyber
analytic skills that can enhance your career in the cyber world.
About InfosecTrain
• Established in 2016, we are one of the finest
Security and Technology Training and
Consulting company
• Wide range of professional training programs,
certifications & consulting services in the IT
and Cyber Security domain
• High-quality technical services, certifications
or customized training programs curated with
professionals of over 15 years of combined
experience in the domain
www.infosectrain.com | sales@infosectrain.com
Our Endorsements
www.infosectrain.com | sales@infosectrain.com

Recommended for you

The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide

This document provides an overview and introduction to Microsoft's Security Risk Management Guide. It discusses the challenges of managing security risks in today's environment and introduces a four-phase security risk management process developed by Microsoft. The process uses both qualitative and quantitative risk assessment methods to identify, analyze, and prioritize security risks. It then provides frameworks for making risk management decisions and measuring the effectiveness of security controls. The guide is intended to help organizations of all sizes establish a formal security risk management program to proactively manage risks in a cost-effective manner.

Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training

The document provides an overview of designing and developing an effective security awareness and training program. It defines security awareness training, discusses why such programs are important, and outlines best practices for doing it correctly. The presentation agenda includes defining security awareness training, discussing its importance, and presenting Mittal Technologies' security awareness training solution. The document then provides details on developing effective security awareness training, including establishing goals and success criteria, designing the program, developing training content at different levels, and tracking results.

leadershipadvice
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdf
Cyber Audit | Cyber Crime | Network Security |  Cyber Security Audit- 2023.pdfCyber Audit | Cyber Crime | Network Security |  Cyber Security Audit- 2023.pdf
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdf

A cyber audit evaluates an organization's cyber security measures to identify vulnerabilities, assess compliance, and recommend improvements. It encompasses critical areas such as risk assessment, compliance and regulations, network and infrastructure security, data protection, security policies and procedures, employee awareness and training, incident response and business continuity, vendor management, and audit findings and recommendations. By conducting a thorough cyber audit, organizations gain insights into their cyber security strengths and weaknesses, enabling them to enhance their defenses, mitigate risks, and maintain a secure digital environment.

#cyberaudit#cybersecurity#informationsecurity
Why InfosecTrain Global Learning Partners
Flexible modes
of Training
Tailor Made
Training
Post training
completion
Certified and
Experienced Instructors
Access to the
recorded
sessions
www.infosectrain.com | sales@infosectrain.com
Our Trusted Clients
www.infosectrain.com | sales@infosectrain.com
CompTIA CySA Domain 5 Compliance and Assessment.pptx
Contact us
Get your workforce reskilled
by our certified and
experienced instructors!
IND: 1800-843-7890 (Toll Free) / US: +1 657-221-1127 /
UK : +44 7451 208413
sales@infosectrain.com
www.infosectrain.com

Recommended for you

Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure

Connection's Security Practice offers solutions and services to counteract increased cybersecurity risks. They take a comprehensive approach focusing on protection, detection and reaction. Their experts assess vulnerabilities, develop prioritized remediation plans, and implement the right security solutions. They also provide managed security services for ongoing monitoring and risk management.

Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure

Connection's Security Practice offers solutions and services to help organizations address increasing cybersecurity threats and risks. They take a comprehensive approach focusing on protecting systems, detecting security issues, and reacting quickly to potential breaches. Their services include security assessments, risk analysis, implementation of security solutions, and ongoing managed security services to help organizations manage threats continuously. They take a unified approach considering people, processes, technology, and the overall security lifecycle to help organizations define and manage security risks.

Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!

The document discusses Georgia State University's information security plan, which was developed based on the ISO 17799 standard. It summarizes the 12 domains covered by the ISO standard and how the university assessed its current security state in each domain. The plan aims to provide comprehensive and prioritized security objectives and action plans to improve information security protections over multiple years.

More Related Content

Similar to CompTIA CySA Domain 5 Compliance and Assessment.pptx

Security policy.pdf
Security policy.pdfSecurity policy.pdf
Security policy.pdf
Md. Sajjat Hossain
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
AbuHanifah59
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
harsh arora
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
NeilStark1
 
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdf
NeilStark1
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
NeilStark1
 
QI Security Framework_v2007_7
QI Security Framework_v2007_7QI Security Framework_v2007_7
QI Security Framework_v2007_7
Hong Sin Kwek
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
AlliedConSapCourses
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
Sergey Erohin
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
Sergey Erohin
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
Swati Gupta
 
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdf
Cyber Audit | Cyber Crime | Network Security |  Cyber Security Audit- 2023.pdfCyber Audit | Cyber Crime | Network Security |  Cyber Security Audit- 2023.pdf
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdf
Cyber Security Experts
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
Tyler Carlson
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
Prahlad Reddy
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
Tammy Clark
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
Laura Benitez
 
SOC 2 Certification Unveiled: Understanding the Core Principles
SOC 2 Certification Unveiled: Understanding the Core PrinciplesSOC 2 Certification Unveiled: Understanding the Core Principles
SOC 2 Certification Unveiled: Understanding the Core Principles
ShyamMishra72
 
What Are The Six Pillars Of Cybersecurity.pdf
What Are The Six Pillars Of Cybersecurity.pdfWhat Are The Six Pillars Of Cybersecurity.pdf
What Are The Six Pillars Of Cybersecurity.pdf
SumitKala7
 
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
Afour tech
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practices
phanleson
 

Similar to CompTIA CySA Domain 5 Compliance and Assessment.pptx (20)

Security policy.pdf
Security policy.pdfSecurity policy.pdf
Security policy.pdf
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdf
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
QI Security Framework_v2007_7
QI Security Framework_v2007_7QI Security Framework_v2007_7
QI Security Framework_v2007_7
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdf
Cyber Audit | Cyber Crime | Network Security |  Cyber Security Audit- 2023.pdfCyber Audit | Cyber Crime | Network Security |  Cyber Security Audit- 2023.pdf
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdf
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
 
SOC 2 Certification Unveiled: Understanding the Core Principles
SOC 2 Certification Unveiled: Understanding the Core PrinciplesSOC 2 Certification Unveiled: Understanding the Core Principles
SOC 2 Certification Unveiled: Understanding the Core Principles
 
What Are The Six Pillars Of Cybersecurity.pdf
What Are The Six Pillars Of Cybersecurity.pdfWhat Are The Six Pillars Of Cybersecurity.pdf
What Are The Six Pillars Of Cybersecurity.pdf
 
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practices
 

More from Infosectrain3

Turning off Autofill.pdf
Turning off Autofill.pdfTurning off Autofill.pdf
Turning off Autofill.pdf
Infosectrain3
 
Targeted Ransomware.pdf
Targeted Ransomware.pdfTargeted Ransomware.pdf
Targeted Ransomware.pdf
Infosectrain3
 
Exploring-Biometrics-Security-&-Privacy-Concerns (1).pdf
Exploring-Biometrics-Security-&-Privacy-Concerns (1).pdfExploring-Biometrics-Security-&-Privacy-Concerns (1).pdf
Exploring-Biometrics-Security-&-Privacy-Concerns (1).pdf
Infosectrain3
 
LoT & 5G Threats Unveiled1.pdf
LoT & 5G Threats Unveiled1.pdfLoT & 5G Threats Unveiled1.pdf
LoT & 5G Threats Unveiled1.pdf
Infosectrain3
 
Security tips for Travelers.pdf
Security tips for Travelers.pdfSecurity tips for Travelers.pdf
Security tips for Travelers.pdf
Infosectrain3
 
Threat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdf
Threat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdfThreat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdf
Threat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdf
Infosectrain3
 
SOC 2 Type 2 Checklist - Part 1 - V2.pdf
SOC 2 Type 2 Checklist - Part 1 - V2.pdfSOC 2 Type 2 Checklist - Part 1 - V2.pdf
SOC 2 Type 2 Checklist - Part 1 - V2.pdf
Infosectrain3
 
The Cyber Villains.pdf
The Cyber Villains.pdfThe Cyber Villains.pdf
The Cyber Villains.pdf
Infosectrain3
 
Types of Servers in Computing.pdf
Types of Servers in Computing.pdfTypes of Servers in Computing.pdf
Types of Servers in Computing.pdf
Infosectrain3
 
Types of Web Application Firewalls (1).pdf
Types of Web Application Firewalls (1).pdfTypes of Web Application Firewalls (1).pdf
Types of Web Application Firewalls (1).pdf
Infosectrain3
 
Google's AI Red Team.pdf
Google's AI Red Team.pdfGoogle's AI Red Team.pdf
Google's AI Red Team.pdf
Infosectrain3
 
A to Z Guide Data Privacy in Operational Technology.pdf
A to Z Guide Data Privacy in Operational Technology.pdfA to Z Guide Data Privacy in Operational Technology.pdf
A to Z Guide Data Privacy in Operational Technology.pdf
Infosectrain3
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptx
Infosectrain3
 
Interview Questions for Microsoft Azure Architect Technologies AZ-303.pptx
Interview Questions for Microsoft Azure Architect Technologies AZ-303.pptxInterview Questions for Microsoft Azure Architect Technologies AZ-303.pptx
Interview Questions for Microsoft Azure Architect Technologies AZ-303.pptx
Infosectrain3
 
Interview Questions for Microsoft Azure Architect Design AZ-304.pptx
Interview Questions for Microsoft Azure Architect Design AZ-304.pptxInterview Questions for Microsoft Azure Architect Design AZ-304.pptx
Interview Questions for Microsoft Azure Architect Design AZ-304.pptx
Infosectrain3
 
IBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptxIBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptx
Infosectrain3
 
How to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptxHow to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptx
Infosectrain3
 
How to Analyze Data (1).pptx
How to Analyze Data (1).pptxHow to Analyze Data (1).pptx
How to Analyze Data (1).pptx
Infosectrain3
 
How DNS Works.pptx
How DNS Works.pptxHow DNS Works.pptx
How DNS Works.pptx
Infosectrain3
 
Frequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptxFrequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptx
Infosectrain3
 

More from Infosectrain3 (20)

Turning off Autofill.pdf
Turning off Autofill.pdfTurning off Autofill.pdf
Turning off Autofill.pdf
 
Targeted Ransomware.pdf
Targeted Ransomware.pdfTargeted Ransomware.pdf
Targeted Ransomware.pdf
 
Exploring-Biometrics-Security-&-Privacy-Concerns (1).pdf
Exploring-Biometrics-Security-&-Privacy-Concerns (1).pdfExploring-Biometrics-Security-&-Privacy-Concerns (1).pdf
Exploring-Biometrics-Security-&-Privacy-Concerns (1).pdf
 
LoT & 5G Threats Unveiled1.pdf
LoT & 5G Threats Unveiled1.pdfLoT & 5G Threats Unveiled1.pdf
LoT & 5G Threats Unveiled1.pdf
 
Security tips for Travelers.pdf
Security tips for Travelers.pdfSecurity tips for Travelers.pdf
Security tips for Travelers.pdf
 
Threat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdf
Threat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdfThreat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdf
Threat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdf
 
SOC 2 Type 2 Checklist - Part 1 - V2.pdf
SOC 2 Type 2 Checklist - Part 1 - V2.pdfSOC 2 Type 2 Checklist - Part 1 - V2.pdf
SOC 2 Type 2 Checklist - Part 1 - V2.pdf
 
The Cyber Villains.pdf
The Cyber Villains.pdfThe Cyber Villains.pdf
The Cyber Villains.pdf
 
Types of Servers in Computing.pdf
Types of Servers in Computing.pdfTypes of Servers in Computing.pdf
Types of Servers in Computing.pdf
 
Types of Web Application Firewalls (1).pdf
Types of Web Application Firewalls (1).pdfTypes of Web Application Firewalls (1).pdf
Types of Web Application Firewalls (1).pdf
 
Google's AI Red Team.pdf
Google's AI Red Team.pdfGoogle's AI Red Team.pdf
Google's AI Red Team.pdf
 
A to Z Guide Data Privacy in Operational Technology.pdf
A to Z Guide Data Privacy in Operational Technology.pdfA to Z Guide Data Privacy in Operational Technology.pdf
A to Z Guide Data Privacy in Operational Technology.pdf
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptx
 
Interview Questions for Microsoft Azure Architect Technologies AZ-303.pptx
Interview Questions for Microsoft Azure Architect Technologies AZ-303.pptxInterview Questions for Microsoft Azure Architect Technologies AZ-303.pptx
Interview Questions for Microsoft Azure Architect Technologies AZ-303.pptx
 
Interview Questions for Microsoft Azure Architect Design AZ-304.pptx
Interview Questions for Microsoft Azure Architect Design AZ-304.pptxInterview Questions for Microsoft Azure Architect Design AZ-304.pptx
Interview Questions for Microsoft Azure Architect Design AZ-304.pptx
 
IBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptxIBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptx
 
How to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptxHow to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptx
 
How to Analyze Data (1).pptx
How to Analyze Data (1).pptxHow to Analyze Data (1).pptx
How to Analyze Data (1).pptx
 
How DNS Works.pptx
How DNS Works.pptxHow DNS Works.pptx
How DNS Works.pptx
 
Frequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptxFrequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptx
 

Recently uploaded

Is Email Marketing Really Effective In 2024?
Is Email Marketing Really Effective In 2024?Is Email Marketing Really Effective In 2024?
Is Email Marketing Really Effective In 2024?
Rakesh Jalan
 
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
marianell3076
 
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptxChapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Brajeswar Paul
 
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptx
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptxUnlocking Educational Synergy-DIKSHA & Google Classroom.pptx
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptx
bipin95
 
NLC English 7 Consolidation Lesson plan for teacher
NLC English 7 Consolidation Lesson plan for teacherNLC English 7 Consolidation Lesson plan for teacher
NLC English 7 Consolidation Lesson plan for teacher
AngelicaLubrica
 
No, it's not a robot: prompt writing for investigative journalism
No, it's not a robot: prompt writing for investigative journalismNo, it's not a robot: prompt writing for investigative journalism
No, it's not a robot: prompt writing for investigative journalism
Paul Bradshaw
 
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptxFinal_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
shimeathdelrosario1
 
SYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISING
SYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISINGSYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISING
SYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISING
Dr Vijay Vishwakarma
 
How to Configure Time Off Types in Odoo 17
How to Configure Time Off Types in Odoo 17How to Configure Time Off Types in Odoo 17
How to Configure Time Off Types in Odoo 17
Celine George
 
Delegation Inheritance in Odoo 17 and Its Use Cases
Delegation Inheritance in Odoo 17 and Its Use CasesDelegation Inheritance in Odoo 17 and Its Use Cases
Delegation Inheritance in Odoo 17 and Its Use Cases
Celine George
 
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdfThe Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
JackieSparrow3
 
2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference
KlettWorldLanguages
 
Credit limit improvement system in odoo 17
Credit limit improvement system in odoo 17Credit limit improvement system in odoo 17
Credit limit improvement system in odoo 17
Celine George
 
The basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptxThe basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptx
heathfieldcps1
 
Split Shifts From Gantt View in the Odoo 17
Split Shifts From Gantt View in the  Odoo 17Split Shifts From Gantt View in the  Odoo 17
Split Shifts From Gantt View in the Odoo 17
Celine George
 
matatag curriculum education for Kindergarten
matatag curriculum education for Kindergartenmatatag curriculum education for Kindergarten
matatag curriculum education for Kindergarten
SarahAlie1
 
NLC Grade 3.................................... ppt.pptx
NLC Grade 3.................................... ppt.pptxNLC Grade 3.................................... ppt.pptx
NLC Grade 3.................................... ppt.pptx
MichelleDeLaCruz93
 
How to Create Sequence Numbers in Odoo 17
How to Create Sequence Numbers in Odoo 17How to Create Sequence Numbers in Odoo 17
How to Create Sequence Numbers in Odoo 17
Celine George
 
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
siemaillard
 
NAEYC Code of Ethical Conduct Resource Book
NAEYC Code of Ethical Conduct Resource BookNAEYC Code of Ethical Conduct Resource Book
NAEYC Code of Ethical Conduct Resource Book
lakitawilson
 

Recently uploaded (20)

Is Email Marketing Really Effective In 2024?
Is Email Marketing Really Effective In 2024?Is Email Marketing Really Effective In 2024?
Is Email Marketing Really Effective In 2024?
 
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptxChapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
 
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptx
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptxUnlocking Educational Synergy-DIKSHA & Google Classroom.pptx
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptx
 
NLC English 7 Consolidation Lesson plan for teacher
NLC English 7 Consolidation Lesson plan for teacherNLC English 7 Consolidation Lesson plan for teacher
NLC English 7 Consolidation Lesson plan for teacher
 
No, it's not a robot: prompt writing for investigative journalism
No, it's not a robot: prompt writing for investigative journalismNo, it's not a robot: prompt writing for investigative journalism
No, it's not a robot: prompt writing for investigative journalism
 
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptxFinal_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
Final_SD_Session3_Ferriols, Ador Dionisio, Fajardo.pptx
 
SYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISING
SYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISINGSYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISING
SYBCOM SEM III UNIT 1 INTRODUCTION TO ADVERTISING
 
How to Configure Time Off Types in Odoo 17
How to Configure Time Off Types in Odoo 17How to Configure Time Off Types in Odoo 17
How to Configure Time Off Types in Odoo 17
 
Delegation Inheritance in Odoo 17 and Its Use Cases
Delegation Inheritance in Odoo 17 and Its Use CasesDelegation Inheritance in Odoo 17 and Its Use Cases
Delegation Inheritance in Odoo 17 and Its Use Cases
 
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdfThe Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
 
2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference
 
Credit limit improvement system in odoo 17
Credit limit improvement system in odoo 17Credit limit improvement system in odoo 17
Credit limit improvement system in odoo 17
 
The basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptxThe basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptx
 
Split Shifts From Gantt View in the Odoo 17
Split Shifts From Gantt View in the  Odoo 17Split Shifts From Gantt View in the  Odoo 17
Split Shifts From Gantt View in the Odoo 17
 
matatag curriculum education for Kindergarten
matatag curriculum education for Kindergartenmatatag curriculum education for Kindergarten
matatag curriculum education for Kindergarten
 
NLC Grade 3.................................... ppt.pptx
NLC Grade 3.................................... ppt.pptxNLC Grade 3.................................... ppt.pptx
NLC Grade 3.................................... ppt.pptx
 
How to Create Sequence Numbers in Odoo 17
How to Create Sequence Numbers in Odoo 17How to Create Sequence Numbers in Odoo 17
How to Create Sequence Numbers in Odoo 17
 
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
 
NAEYC Code of Ethical Conduct Resource Book
NAEYC Code of Ethical Conduct Resource BookNAEYC Code of Ethical Conduct Resource Book
NAEYC Code of Ethical Conduct Resource Book
 

CompTIA CySA Domain 5 Compliance and Assessment.pptx

  • 1. CompTIA CySA+ Domain 5: Compliance and Assessment www.infosectrain.com | sales@infosectrain.com
  • 3. www.infosectrain.com | sales@infosectrain.com CYSA+ Domains: 1.Threat and Vulnerability Management 2.Software and Systems Security 3.Security Operations and Monitoring 4.Incident Response 5.Compliance & Assessment In this blog, we will discuss the fifth domain of CySA+: Compliance and Assessments. In this domain, you will understand three important concepts: 1.The importance of data privacy and protection 2.Security concepts in support of organizations’ risk mitigation 3.Policies, frameworks, procedures, and controls are critical
  • 4. www.infosectrain.com | sales@infosectrain.com 1. Importance of data privacy and protection In any organization, there are many key pieces of information like loyalty schemes, customer data, transactions, employee records, or data collection that need to be protected from unauthorized access. Protecting sensitive data is very important because it may contain information about your current staff, business partners, clients, and shareholders. Data privacy is important since individuals who engage online need to trust that their data will be handled carefully. Organizations use data protection practices in order to demonstrate to their customers and users that they can be trusted with their data. In this concept, you will learn:
  • 5. www.infosectrain.com | sales@infosectrain.com 1.Privacy vs. Security: Privacy and security are intertwined. Privacy refers to whatever control you have over your personal information and how it is utilized. Consider the privacy terms that you are required to read and agree to when you download new smartphone apps. In contrast, security relates to how your personal information is safeguarded, like your data and various facts about you. 2.Technical controls: Technical controls use a variety of technologies to minimize vulnerabilities. A few examples of technical controls are firewalls, encryption, IDSs, the principle of least privilege, and antivirus software. 3.Non-technical controls: Unlike technical controls, non-technical controls include such actions and things as procedures, administrative policies, and standards for the full range of information security, including privacy domains and assigned responsibilities.
  • 6. www.infosectrain.com | sales@infosectrain.com 2. Security concepts in support of organizations’ risk mitigation In this section, you will understand the below-mentioned concepts: 1. Risk identification process: Risk identification is the process of determining which risks may harm the project. The main advantage of this procedure is that it documents current risks and offers the project team information and the capacity to predict occurrences. 2. Risk prioritization: The process of deciding which risks to act on first is known as risk prioritizing. This should be based on the likelihood of a risk and its potential consequence. Risk prioritizing may be accomplished by assessing the risks to your company to decide which ones are more likely to occur and which ones will have a greater impact. For evaluation, a risk prioritization matrix might be employed. 3. Business impact analysis: A business impact analysis (BIA) is the process of identifying the criticality of company activities and the resources required to maintain operational resilience and continuity of operations during and after a business interruption. 4. Training and exercises: In this section, you will learn about:
  • 7. www.infosectrain.com | sales@infosectrain.com  Red team: A “red team” is a group that pretends to be an enemy or rival and gives security input from that vantage point. Red teams are utilized in a variety of sectors, including cybersecurity, airport security, the military, and intelligence organizations.  Blue team: A blue team is a group of people that analyze information systems to assure security, uncover security holes, test the efficacy of each security measure, and ensure that all security measures remain effective after installation.  The White team: The team oversees and evaluates the cyber defense competition. They are also in charge of documenting ratings for the Blue Teams on usability and security supplied by the Green and Red Teams, respectively. The White Team also examines security reports and grades them based on accuracy and countermeasures.
  • 8. www.infosectrain.com | sales@infosectrain.com 3. Policies, frameworks, procedures, and controls In this section, you will learn about: 1. Frameworks: A security framework is a collection of national and international cybersecurity regulations and practices designed to protect vital infrastructure. It contains detailed recommendations for businesses on how to handle personal information contained in systems in order to reduce their exposure to security- related threats. 2. Policies and procedures: This section reveals:  Password policy: A password policy is a collection of guidelines to improve computer security by helping users create and use strong passwords. A password policy is frequently included in an organization’s formal policies and may be taught as part of security awareness training.  Acceptable use policy: A company’s acceptable use policy should refer to the safe and ethical use of email and the internet as a whole. A code of conduct outlines the acceptable use policy, such as what websites users can access, how they can log on to the network, etc.  Data retention: Data retention rules govern the maintenance of persistent data and records to fulfill legal and corporate data archiving needs.
  • 9. www.infosectrain.com | sales@infosectrain.com 3.Control types: There are a few different control types; they are:  Managerial control: A person with managerial control has the power, directly or indirectly, to direct or cause the direction of the management or policies of the organization, whether by exercising voting rights, by contract, or in any other manner.  Operational Control: Operational control refers to the authority to handle subordinate forces, including organizing and operating them, assigning tasks, determining objectives, and giving authoritative directions required to complete the mission.  Preventive control: A preventative control prevents a loss or an error from occurring. Physical property protection and segregation of duties are examples of preventive controls. Generally, these controls are built into a process so that they are applied continuously.
  • 10. www.infosectrain.com | sales@infosectrain.com CySA+ with InfosecTrain: InfosecTrain is one of the leading training platforms that offers consultancy services, certifications, and training on cybersecurity and information security. Our accredited trainer will help you gain the analytic skills to detect and defend against cyberattacks in an organization. Our courses are available in live instructor-led and self-paced sessions, making it easy to complete your training journey. Join InfosecTrain’s CompTIA CySA+ training program to get cyber analytic skills that can enhance your career in the cyber world.
  • 11. About InfosecTrain • Established in 2016, we are one of the finest Security and Technology Training and Consulting company • Wide range of professional training programs, certifications & consulting services in the IT and Cyber Security domain • High-quality technical services, certifications or customized training programs curated with professionals of over 15 years of combined experience in the domain www.infosectrain.com | sales@infosectrain.com
  • 12. Our Endorsements www.infosectrain.com | sales@infosectrain.com
  • 13. Why InfosecTrain Global Learning Partners Flexible modes of Training Tailor Made Training Post training completion Certified and Experienced Instructors Access to the recorded sessions www.infosectrain.com | sales@infosectrain.com
  • 14. Our Trusted Clients www.infosectrain.com | sales@infosectrain.com
  • 16. Contact us Get your workforce reskilled by our certified and experienced instructors! IND: 1800-843-7890 (Toll Free) / US: +1 657-221-1127 / UK : +44 7451 208413 sales@infosectrain.com www.infosectrain.com