Fundamental Concepts of Information Security
Building a common language and conceptual framework
1.1 What information security is today
- Information security as a service rather than a product
- Security as a multilayered and multidimensional system
- A matrix-based approach to security: assets, threats, vulnerabilities, risks
- The role of a risk-based approach in building protection
1.2 SOC as a key element of the security system
- What a Security Operations Center is
- SOC as a centre for monitoring the protection of assets, information, and the company’s digital processes
- The role of SOC in the overall information security architecture
1.3 SOC responsibilities and areas of accountability
- SOC engineering: monitoring, event correlation, incident detection
- Incident Management: detection, analysis, containment, eradication, recovery
- SOC management: compliance and regulatory requirements, legal and forensics, incident response teams (IRT), security awareness, and interaction with the business
- Which threats SOC actually protects against, and which it does not
1.4 People, process, technology
- The three key components of security
- People: human factor, social engineering, user errors
- Process: logical errors, lack of procedures, incorrect configuration and control
- Technology: software and infrastructure vulnerabilities, technical debt
A brief overview of attack entry points
- Native statistics: the dominance of social engineering, the role of configuration errors, exploitation of vulnerabilities, supply chain attacks