πŸ“˜Study Focus | Domain 7: Security Operations

πŸ“˜ Domain 7: Security Operations

πŸ”‘ Flashcard Topics (Sequence-Heavy, Forensics-Focused, Operational Traps)


🚨 Incident Response (IR)

πŸ” Incident Response Lifecycle (NIST 800-61)

  • Preparation → Detection → Analysis → Containment → Eradication → Recovery → Lessons Learned

🧬 Order of Volatility (OOV)

  • 1. CPU registers → 2. RAM → 3. Disk → 4. Remote logs/archives

πŸ“œ Chain of Custody

  • Formal documentation of who handled evidence and when


πŸ§ͺ Forensics Basics

  • Imaging = Bit-for-bit copy of a drive

  • Hashing (MD5/SHA) = Ensures forensic integrity

  • Write Blocker = Prevents data modification during acquisition

  • Time Offset = Accounts for time zone in log analysis


🧯 Disaster Recovery & Business Continuity

πŸ“† Key Recovery Metrics

  • RTO (Recovery Time Objective) = Max time to restore

  • RPO (Recovery Point Objective) = Max data loss tolerated

πŸ› ️ BCP vs DRP

  • BCP = Ensures business continues

  • DRP = IT system restoration after a disaster


πŸ’Ό Personnel Security

  • Separation of Duties = Prevents fraud; no one person controls all parts

  • Job Rotation = Reduces risk, detects fraud

  • Mandatory Vacations = Detects long-running schemes


πŸ“¦ Backup Types & Strategies

  • Full = All files

  • Incremental = Since last backup of any type

  • Differential = Since last full backup

  • Grandfather-Father-Son = 3-level rotation strategy


🧰 Monitoring and Detection

πŸ” SIEM (Security Info & Event Mgmt)

  • Correlates logs across systems for threat detection

🚧 Honeypot vs Honeynet

  • Honeypot = Decoy system

  • Honeynet = Group of honeypots

πŸ›‘ DLP (Data Loss Prevention)

  • Detects/prevents data exfiltration (email, USB, cloud)


🧨 Malware and Threat Types

  • Rootkit = Hides itself at OS level

  • Logic Bomb = Malicious code triggered by event/date

  • Trojan = Malware disguised as legit software

  • Polymorphic Malware = Changes its code to evade detection


🚫 Physical Security Controls

  • Mantrap = Two-door access control

  • Faraday Cage = Blocks electromagnetic signals

  • CCTV = Provides deterrence + evidence

  • Guards = Active deterrence; reactive capability


πŸ“‘ Media & E-Waste Handling

  • Degaussing = Demagnetize tape or disk

  • Shredding = Physical destruction of paper/data

  • Burning/Incineration = Final destruction

  • Pulverizing = Crush physical media (e.g., hard drives)


🧬 Configuration and Change Management

  • Configuration Management = Maintain consistent, secure system settings

  • Change Control = Approval, testing, rollback before deployment


Domain 7 can feel like common sense — but the test twists it with procedural nuance. Drill sequence-based concepts and forensic processes hard.


Comments

Popular posts from this blog

🧭 CISSP Study Note: Guidelines

πŸ’Έ CISSP Study Note: Risk Transference

πŸ“ CISSP Study Note: Standards