Copyright Goodheart-Willcox Co., Inc. 38 Principles of Cybersecurity security domain include ensuring fi rewalls are correctly confi gured and routers are properly secured, patched, and updated. Threats to Supervisory Control and Data Acquisition (SCADA) can threaten critical systems. Remote Access More and more, businesses are allowing employees or other users to remotely connect to the computer network. The remote access domain addresses challenges presented by remote access. These challenges include securing data in transit over the Internet, verifi cation of the authorized users and locations, and the security of the remote system. System System domain is a generic term. The system domain includes the services and software used to provide access to data and other resources. This domain covers web servers, database servers, and any server operating system or feature used to support data access. Quick Look 2.1.1 Frameworks Frameworks are guides that can be used to help plan security defenses. These frameworks can be detailed and can be used in many digital formats. Frameworks have often been collaboratively developed by many orga- nizations and individuals and are available at no charge for security professionals to use and adapt to their own security decisions. In this exercise, you will take a brief look at an example of some frameworks. 1. Launch a web browser, and navigate to the Center for Internet Security website (www.cisecurity.org). 2. Locate the About us link, which is likely at the bottom of the page, and click it. Review the information about this group, including its goals and mission. What do you think the benefi ts of using a volunteer method to create these controls offers over a for-profi t organization? 3. Click on the CIS Controls link at the top of the page, as shown. List of controls CIS Controls link