Availability controls ensure that information and systems are available for the use of authorized individuals when needed. They protect against denial of service attacks that hackers might use to prevent legitimate use of information systems. Availability controls include fault tolerance, redundant components, and clustered servers.
- [Instructor] As a security professional, you must also understand how to apply security controls that protect the availability of information in systems. As the third leg of the CIA tirade, availability controls ensure that information and systems remain available to authorized users when needed. Availability controls protect against disruptions to normal system operation, or data availability. Potential availability failures may result from a variety of causes, such as malicious attackers, like someone conducting a denial-of-service attack to bring down a website.
Or component failures, such as the failure of a hard drive or power supply. They can also come from application failures, such as errors in code that cause an application crash. Or utility failures, such as a power outage that disrupts systems, or a network disruption that prevents internet access. There are many controls in place that can protect the availability of systems and information. One example of an availability control is the use of redundant components such as including two power supplies in a system, or having extra hard drives that use RAID technology.
Another example is the use of high availability systems that have multiple servers dedicated to the same purpose, so that if one server fails, the others may continue carrying the operational load. And the more general category of fault tolerance, ensures that IT services remain functioning, even when small failures occur. There is one additional availability control that you should be familiar with for the CISSP exam. Keeping operating systems and applications patched to current levels, ensures that any flaws identified by the manufacturer are corrected promptly.
This not only protects your system from vulnerabilities that might allow an attacker to gain access, but also corrects issues that may cause the system to crash, disrupting availability.
Find the companion study books at the Sybex test prep site and review the complete CISSP Body of Knowledge at https://www.isc2.org/cissp-domains/default.aspx.
Note: This course is part of a series releasing throughout 2018. A completed Learning Path of the series will be available once all the courses are released.
- Aligning security with the business
- Using control frameworks
- Understanding compliance ethics
- Implementing effective security policies
- Planning for business continuity
- Ensuring the security of employees
- Managing risk
- Identifying threats
- Managing vendors
- Building security awareness
- Conducting security training
Skill Level Advanced
IT Security Careers and Certifications: First Stepswith Marc Menninger2h 6m Appropriate for all
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Appropriate for all
1. Security Governance
2. Compliance and Ethics
3. Security Policy
4. Business Continuity
5. Personnel Security
6. Risk Management
7. Threat Modeling
8. Vendor Management
Vendor agreements3m 34s
9. Awareness and Training
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.