๐ Certified in Cybersecurity (CC) Exam Prep โ Domain 3: Cybersecurity Architecture and Engineering ๐
As I gear up for my ISC2 certification, I've been delving deep into Domain 3: Cybersecurity Architecture and Engineering. Here's a sneak peek into what I've been exploring:
๐ Unlocking Key Concepts:
- Access Control Models: From owner-controlled access to system-wide policies, I'm mastering the art of controlling who can access what.
- Defense in Depth: Layering up my security game with multiple control mechanisms.
- Principle of Least Privilege: Ensuring the right level of access to minimize risks.
- Logical & Physical Controls: Blending virtual and physical access controls for a rock-solid security setup.
๐ Goals of the Domain:
1. Choosing the perfect access control model for every situation.
2. Implementing concepts like segregation of duties and two-person integrity.
3. Keeping a tight grip on insider threats and maintaining the CIA Triad (Confidentiality, Integrity, Availability) through privileged access management (PAM).
This domain has opened my eyes to the importance of a holistic cybersecurity approach, where people and systems work in sync to safeguard valuable information.
#CyberSecurity #ISC2 #CertifiedInCybersecurity #NextLevelSecurity #PAMPower #UnleashTheCyberHero #InfoSecGuru
Subscribe to my newsletter
Read articles from alice eneyo directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
alice eneyo
alice eneyo
Iโm an experienced Governance, Risk, and Compliance (GRC) Analyst skilled in aligning regulatory requirements with Cybersecurity. My expertise includes Risk Management, IT Governance, Data Privacy, and Incident Management, with a focus on safeguarding companies and enhancing operational efficiency. Key skills: Effective communication and stakeholder engagement Strong time management and adaptability Detail-oriented with excellent analytical abilities Experience highlights: Risk Assessment, Business Continuity, Disaster Recovery, Incident Response Planning Policy and procedure creation for regulatory compliance Training on Security Best Practices Familiar with frameworks like PCI DSS, NIST CSF, GDPR, and NDPR. Iโm passionate about staying current with industry trends and eager to contribute to dynamic organizations. For collaboration opportunities, contact me at aliceeneyo@gmail.com.