Book description
Your 2-in-1 Self-Paced Training Kit
EXAM PREP GUIDE
Ace your preparation for Certified Information Systems Security
Professional (CISSP) Exam. Work at your own pace through a series
of lessons and reviews that fully cover each exam objective. Then,
reinforce what you’ve learned by applying your knowledge to
real-world case scenarios and practice exercises. This guide is
designed to help make the most of your study time.
Maximize your performance on the exam in these 10 domains:
Information Security Governance and Risk Management
Access Control
Cryptography
Physical (Environmental) Security
Security Architecture and Design
Legal, Regulations, Investigations and Compliance
Telecommunications and Network Security
Business Continuity and Disaster Recovery Planning
Software Development Security
Operations Security
PRACTICE TESTS
Assess your skills with practice tests on CD. You can work through
hundreds of questions using multiple testing modes to meet your
specific learning needs. You get detailed explanations for right
and wrong answers—including a customized learning path that
describes how and where to focus your studies.
For customers who purchase an ebook version of this title,
instructions for downloading the CD files can be found in the
ebook.
Table of contents
- CISSP Training Kit
- Dedication
- Introduction
-
1. Information security governance and risk management
- Where do information security and risk management begin?
- Security objectives and controls
- Policies and frameworks
- Risk assessment and management
-
Implementing the security program
- Understanding the new organization chart
- Understanding the information life cycle
-
Classifying data
- Assign roles and responsibilities
- Define classification categories
- Define category criteria
- Define required protective controls for each category
- Inventory the information assets (data elements)
- Assign a value to each asset
- Reappraise and adjust the classification of information assets
- Provide security awareness training for all employees and applicable third parties
- Assign enforcement responsibilities
- Implementing hiring practices
- Implementing termination practices
- Providing security awareness training
- Managing third-party service providers
- Monitoring and auditing
- Exercises
- Chapter summary
- Chapter review
- Answers
-
2. Access control
- Trusted path
- Choices, choices, choices
-
Authentication, authorization, and auditing
- Identity management
-
Authentication
- Something you know
- Resetting passwords
- Attacks on passwords
- Something you have
- Drawbacks of authentication devices (something you have)
- Something you are
- Multi-factor authentication
- Mutual authentication
- Single sign on
- Kerberos
- Directory services
- Secure European System for Applications in a Multivendor Environment (SESAME)
- Web-based authentication
- Authorization
- Auditing
- Exercises
- Chapter summary
- Chapter review
- Answers
-
3. Cryptography
- What is cryptography?
- The basics of cryptography
-
Historical review of cryptography
- Hieroglyphics: 3000 BC
- The Atbash cipher: 500 BC
- The Scytale cipher: 400 BC
- The Caesar or Shift cipher: 100 BC
- Cryptanalysis: AD 800
- The Vigenere cipher: AD 1586
- The Jefferson disk: AD 1795
- The Vernam cipher/the one-time pad: AD 1917
- The Enigma machine: AD 1942
- Hashing algorithms: AD 1953
- The Data Encryption Algorithm (DEA) and the Data Encryption Standard (DES): AD 1976
- Diffie-Hellman (or Diffie-Hellman-Merkle): AD 1976
- RC4: AD 1987
- Triple DES (3DES): AD 1999
- The Rijndael algorithm and the Advanced Encryption Standard (AES): AD 2002
- Other points of interest
- Cryptographic keys
- Hashing algorithm/message digest
- Strong cryptography
- Symmetric key algorithms and cryptosystems
- Asymmetric key algorithms and cryptosystems
-
Cryptography in use
- Link encryption
- End-to-end encryption
- Public key infrastructure
- Pretty Good Privacy (PGP)
- Secure channels for LAN-based applications
-
Secure channels for web-based applications
- Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
- Hypertext Transfer Protocol over SSL/TLS (HTTPS)
- Secure Hypertext Transfer Protocol (S-HTTP)
- Secure File Transfer Protocol (SFTP) and FTP over SSL (FTPS)
- Secure Electronic Transaction (SET)
- Secure Multipurpose Internet Message Extensions (S/MIME)
- Steganography
- Attacks on cryptography
- Exercises
- Chapter summary
- Chapter review
- Answers
-
4. Physical (environmental) security
- Physical security in a layered defense model
- Planning the design of a secure facility
-
Designing a physical security program
- Crime prevention through environmental design
- Target hardening
- Securing portable devices
- Intrusion detection
- Heating, ventilation, and air conditioning systems
- Failure recovery
- Periodic walkthroughs and inspections
- Auditing and logging
- Fire prevention, detection, and suppression
- Exercises
- Chapter summary
- Chapter review
- Answers
-
5. Security architecture and design
- Identifying architectural boundaries
- Computer hardware and operating systems
- Application architecture
-
Frameworks for security
- International Organization for Standardization (ISO) 27000 series
- The Zachman Framework for enterprise architecture
- The Committee of Sponsoring Organizations of the Treadway Commission (COSO)
- Control Objectives for Information and Related Technology (COBIT)
- Information Technology Infrastructure Library (ITIL)
- Generally Accepted Information Security Principles (GAISP)
- National Institute of Standards and Technology (NIST) Special Publication 800 (SP 800) series
- Security models
- Certification and accreditation (C&A)
- Legal and regulatory compliance
- Exercises
- Chapter summary
- Chapter review
- Answers
-
6. Legal, regulations, investigations, and compliance
- Computer crimes
-
A global perspective of laws regarding computer crime
- The codified law system
- The common law system
- The customary law system
- The difference between laws and regulations
- Protecting intellectual property
- Protecting privacy
- Auditing for compliance
- Litigation
- Governance of third parties
- Software licensing
- Investigating computer crime
- When to notify law enforcement
- Incident response
- Evidence
- Forensic investigations
- Exercises
- Chapter summary
- Chapter review
- Answers
-
7. Telecommunications and network security
- The Open Systems Interconnection (OSI) Model
- Transmission media and technologies
- Network devices
- Protocols, protocols, and more protocols
- PAN, LAN, MAN, WAN, and more
- Wireless networking
- Attacking the network
- Exercises
- Chapter summary
- Chapter review
- Answers
-
8. Business continuity and disaster recovery planning
-
Disaster recovery plan and the business continuity plan
- The disaster recovery plan
- The business continuity plan
- Stages of the planning process
-
Develop the plans: Proposals
- Identify preventive controls
-
Develop disaster recovery plans and strategy
- Alternative procedures
- Compliance
- Increased operating costs
- Recovery of the workspace
- Get it settled now
- Location of secondary facilities
- Parallel processing facilities
- Collocation of processes
- Alternate (owned) sites
- Subscription services: Leased sites, hot, warm, and cold
- Tertiary sites
- Rolling hot sites
- Reciprocal agreements
- Recovery of supply systems
- Recovery of technologies
- Security standards
- Recovery of data
- Backup strategies and storage
- Recovery of people and critical personnel
- Developing the BCP (reconstitution guidelines)
- Presentation to senior management
- Implementing the approved plans
- Exercises
- Chapter summary
- Chapter review
- Answers
-
Disaster recovery plan and the business continuity plan
-
9. Software development security
- The need for improved security in software
-
Maturity models
- The software development life cycle
- Project initiation
- Functional design
- System design
- Software development
- Installation and testing
- Operation and maintenance
- Disposal and end of life
- Separation of duties
- Software Capability Maturity Model Integration
- The IDEAL model
- Software development models
- Computer-aided software engineering tools
- Software testing
- Software updating
- Logging requirements
- The software escrow
- Programming concepts
- Database systems
-
Attacks on applications
- Lack of validating and filtering data input
- Failure to release memory securely
- Residual maintenance hooks
- Unintended (covert) communications channels
- Race conditions
- Malware
- Attacking web-based applications
- Web cache poisoning
- Hijacking webpages
- Directory transversal attacks
- Sensitive data retrieval
- Malware detection mechanisms
- Exercises
- Chapter summary
- Chapter review
- Answers
-
10. Operations security
- The activities of operations
-
Data management
- Data classification
- Media management
- The media library
-
Maintaining the systems that support the data
- Mean time between failures (MTBF)
- Single points of failure
- Redundant Array of Independent Disks (RAID)
- Parity
- Redundant Array of Independent Tapes (RAIT)
- Storage area networks (SAN)
- Massive array of inactive disks (MAID)
- Hierarchical storage management
- Server redundancy
- Collocation
- Service-level agreements (SLAs)
- Data backups
- Data retention
- Secure deletion
- Object reuse
- Secure destruction
- Fax security
- Attacks on operations
- Exercises
- Chapter summary
- Chapter review
- Answers
-
A. Additional resources
- Additional resources available from (ISC)2
- Miscellaneous additional resources
- Chapter 1: Information security governance and risk management
- Chapter 2: Access control
- Chapter 3: Cryptography
- Chapter 4: Physical (environmental) security
- Chapter 5: Security architecture and design
- Chapter 6: Legal, regulations, investigations and compliance
- Chapter 7: Telecommunications and network security
- Chapter 8: Business continuity and disaster recovery planning
- Chapter 9: Software development security
- Chapter 10: Operations security
- B. About the author
- Index
- About the Author
- Copyright
Product information
- Title: CISSP Training Kit
- Author(s):
- Release date: December 2013
- Publisher(s): Microsoft Press
- ISBN: 9780735685130
You might also like
book
CISSP Training Guide
The CISSP (Certified Information Systems Security Professionals) exam is a six-hour, monitored paper-based exam covering 10 …
book
CompTIA PenTest+ PT0-001 Cert Guide
Learn, prepare, and practice for CompTIA Pentest+ PT0-001 exam success with this CompTIA Cert Guide from …
book
CISSP Cert Guide
This is the eBook version of the print title. Note that the eBook does not provide …
book
CISSP Cert Guide
Learn, prepare, and practice for CISSP exam success with this Cert Guide from Pearson IT Certification, …