๐ Day 3: Exploring Common Tactics in Cybersecurity Threats
Today, I continued my journey by delving into the tactics used by threat actors to manipulate individuals and exploit vulnerabilities. Understanding these strategies is essential for enhancing our defenses and safeguarding both digital and physical assets.
๐ Key Tactics Used by Threat Actors:
Intimidation & Threats
Consensus/Social Proof
Scarcity
Familiarity
Trust
Urgency
๐ Exploring the CISSP Security Domains:
Asset Security: Protecting digital and physical assets from threats.
Security Architecture and Engineering: Implementing tools and processes to optimize data security.
Communication and Network Security: Safeguarding physical and wireless communication networks.
Identity and Access Management: Ensuring only authorized users have access to data, preventing breaches.
Security and Risk Management: Setting security goals, ensuring compliance, and maintaining business continuity.
Security Assessment and Testing: Regularly testing and assessing security measures to validate their effectiveness.
Security Operations: Actively maintaining and monitoring security measures to counter ongoing threats.
Software Development Security: Integrating security into the software development lifecycle to prevent vulnerabilities.
๐ Enhancing Cybersecurity Through Structured Policies and Security Testing:
Security Control and Management: Establishing policies for controlling and managing physical and logical assets.
Security Assessment and Testing: Conducting thorough security control testing, collecting and analyzing data, and performing audits.
Security Operations: Proactively investigating incidents and implementing preventive measures.
Software Development Security: Secure coding practices are crucial in creating secure applications and services.
๐ผ Why Cybersecurity Matters:
Protecting sensitive information and ensuring privacy.
Preventing financial loss and guarding against identity theft.
Maintaining business continuity, protecting organizational reputation, and enhancing customer trust.
Understanding these tactics and critical CISSP security domains is key to building a resilient defense against cyber threats. The journey continues, and Iโm excited to keep learning and growing in this ever-evolving field. Remember: You canโt retire from being great!
#Cybersecurity #LearningJourney #CISSP #ThreatAwareness #InformationSecurity #TechSkills #Coursera
Subscribe to my newsletter
Read articles from alice eneyo directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
alice eneyo
alice eneyo
Iโm an experienced Governance, Risk, and Compliance (GRC) Analyst skilled in aligning regulatory requirements with Cybersecurity. My expertise includes Risk Management, IT Governance, Data Privacy, and Incident Management, with a focus on safeguarding companies and enhancing operational efficiency. Key skills: Effective communication and stakeholder engagement Strong time management and adaptability Detail-oriented with excellent analytical abilities Experience highlights: Risk Assessment, Business Continuity, Disaster Recovery, Incident Response Planning Policy and procedure creation for regulatory compliance Training on Security Best Practices Familiar with frameworks like PCI DSS, NIST CSF, GDPR, and NDPR. Iโm passionate about staying current with industry trends and eager to contribute to dynamic organizations. For collaboration opportunities, contact me at aliceeneyo@gmail.com.