CISSP For Dummies

CISSP For Dummies
Автор книги: id книги: 2264099     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 3774,04 руб.     (41,12$) Читать книгу Купить и скачать книгу Электронная книга Жанр: Зарубежная компьютерная литература Правообладатель и/или издательство: John Wiley & Sons Limited Дата добавления в каталог КнигаЛит: ISBN: 9781119806905 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

Get CISSP certified, with this comprehensive study plan!  Revised for the updated 2021 exam,  CISSP For Dummies  is packed with everything you need to succeed on test day. With deep content review on every domain, plenty of practice questions, and online study tools, this book helps aspiring security professionals unlock the door to success on this high-stakes exam. This book, written by CISSP experts, goes beyond the exam material and includes tips on setting up a 60-day study plan, exam-day advice, and access to an online test bank of questions.  Make your test day stress-free with  CISSP For Dummies !  Review every last detail you need to pass the CISSP certification exam Master all 8 test domains, from Security and Risk Management through Software Development Security Get familiar with the 2021 test outline Boost your performance with an online test bank, digital flash cards, and test-day tips If you’re a security professional seeking your CISSP certification, this book is your secret weapon as you prepare for the exam.

Оглавление

Peter H. Gregory. CISSP For Dummies

CISSP® For Dummies® To view this book's Cheat Sheet, simply go to www.dummies.com and search for “CISSP For Dummies Cheat Sheet” in the Search box. Table of Contents

List of Tables

List of Illustrations

Guide

Pages

Introduction

About This Book

Foolish Assumptions

Icons Used in This Book

Beyond the Book

Where to Go from Here

Getting Started with CISSP Certification

(ISC)2 and the CISSP Certification

About (ISC)2 and the CISSP Certification

You Must Be This Tall to Ride This Ride (And Other Requirements)

Preparing for the Exam

Studying on your own

Getting hands-on experience

Getting official (ISC)2 CISSP training

Attending other training courses or study groups

Taking practice exams

Are you ready for the exam?

Registering for the Exam

About the CISSP Examination

After the Examination

Putting Your Certification to Good Use

Networking with Other Security Professionals

THE POWER OF ONLINE BUSINESS NETWORKING

Being an Active (ISC)2 Member

Considering (ISC)2 Volunteer Opportunities

Writing certification exam questions

Speaking at events

Helping at (ISC)2 conferences

Reading and contributing to (ISC)2 publications

Supporting the (ISC)2 Center for Cyber Safety and Education

Participating in bug-bounty programs

Participating in (ISC)2 focus groups

Joining the (ISC)2 community

Getting involved with a CISSP study group

Helping others learn more about data security

Becoming an Active Member of Your Local Security Chapter

Spreading the Good Word about CISSP Certification

Leading by example

Using Your CISSP Certification to Be an Agent of Change

Earning Other Certifications

Other (ISC)2 certifications

CISSP concentrations

Non-(ISC)2 certifications

Nontechnical/nonvendor certifications

Technical/vendor certifications

Choosing the right certifications

Finding a mentor, being a mentor

Building your professional brand

Pursuing Security Excellence

Certification Domains

Security and Risk Management

Understand, Adhere to, and Promote Professional Ethics

(ISC)2 Code of Professional Ethics

Organizational code of ethics

Internet Architecture Board: Ethics and the Internet (RFC 1087)

Ten Commandments of Computer Ethics

Understand and Apply Security Concepts

Confidentiality

Integrity

Availability

Authenticity

Nonrepudiation

Evaluate and Apply Security Governance Principles

Alignment of security function to business strategy, goals, mission, and objectives

Mission (not-so-impossible) and strategy

Goals and objectives

Organizational processes

Acquisitions and divestitures

Governance committees and executive oversight

Organizational roles and responsibilities

Management

Users

Security control frameworks

Due care and due diligence

Determine Compliance and Other Requirements

Contractual, legal, industry standards, and regulatory requirements

Contractual

Common law

Criminal law

CRIMINAL PENALTIES

BURDEN OF PROOF UNDER CRIMINAL LAW

CLASSIFICATIONS OF CRIMINAL LAW

Civil law

CIVIL PENALTIES

BURDEN OF PROOF UNDER CIVIL LAW

LIABILITY AND DUE CARE

LAWYERSPEAK

International law

Administrative law

Industry standards

Privacy requirements

Understand Legal and Regulatory Issues That Pertain to Information Security

Cybercrimes and data breaches

U.S. Computer Fraud and Abuse Act of 1986, 18 U.S.C. § 1030 (as amended)

U.S. Electronic Communications Privacy Act (ECPA) of 1986

U.S. Computer Security Act of 1987

U.S. Communications Assistance for Law Enforcement Act of 1994

U.S. Federal Sentencing Guidelines of 1991

U.S. Economic Espionage Act of 1996

U.S. Child Pornography Prevention Act of 1996

USA PATRIOT Act of 2001

U.S. Sarbanes-Oxley Act of 2002 (SOX)

U.S. Homeland Security Act of 2002

U.S. Federal Information Systems Modernization Act (FISMA) of 2014

U.S. Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act of 2003

U.S. Identity Theft and Assumption Deterrence Act of 2003

Safe Harbor (1998)

U.S. Intelligence Reform and Terrorism Prevention Act of 2004

California Security Breach Information Act

The Council of Europe’s Convention on Cybercrime (2001)

The Computer Misuse Act of 1990 (UK)

Privacy and Electronic Communications Regulations of 2003 (UK)

Information Technology Act 2000 (India)

Cybercrime Act of 2001 (Australia)

General Data Protection Regulation (GDPR)

Payment Card Industry Data Security Standard (PCI DSS)

Licensing and intellectual property requirements

Patents

Trademarks

Copyrights

Trade secrets

Import/export controls

Transborder data flow

Privacy

U.S. Federal Privacy Act of 1974, 5 U.S.C. § 552A

U.S. Health Insurance Portability and Accountability Act (HIPAA) of 1996, PL 104–191

U.S. Children’s Online Privacy Protection Act (COPPA) of 1998

U.S. Gramm-Leach-Bliley Financial Services Modernization Act (GLBA) of 1999, PL 106-102

U.S. Health Information Technology for Economic and Clinical Health Act (HITECH) of 2009

California Consumer Privacy Act of 2018 (CCPA)

California Privacy Rights Act of 2020 (CPRA)

UK Data Protection Act of 1998

European Union General Data Protection Regulation (GDPR)

Understand Requirements for Investigation Types

Develop, Document, and Implement Security Policies, Standards, Procedures, and Guidelines

Policies

Standards (and baselines)

Procedures

Guidelines

Identify, Analyze, and Prioritize Business Continuity (BC) Requirements

BUSINESS CONTINUITY AND DISASTER RECOVERY: A SIMPLE ILLUSTRATION

COOPERATION IS THE KEY

Business impact analysis

Assessing vulnerability

Assessing criticality

Identifying key players

REMEMBERING PAYROLL

Establishing maximum tolerable downtime

Determining maximum tolerable outage

Establishing recovery targets

HOW BAD DOES IT HAVE TO BE?

RECOVERY TIME OBJECTIVE

RECOVERY POINT OBJECTIVE

HOW RTO AND RPO WORK TOGETHER

Defining resource requirements

Develop and document the scope and the plan

Emergency response

Damage assessment

Salvage

Personnel safety

Personnel notification

Backups and media storage

THE END OF MAGNETIC TAPE?

Software escrow agreements

External communications

WHO SAYS EXTERNAL AFFAIRS IS NONESSENTIAL?

Utilities

Logistics and supplies

Fire and water protection

Documentation

Data processing continuity planning

Making your business continuity planning project a success

Simplifying large or complex critical functions

GETTING AMAZING THINGS DONE

Documenting the strategy

Implementing the plan

WHY HIRE AN EXPERT?

SECURING SENIOR MANAGEMENT APPROVAL

PROMOTING ORGANIZATIONAL AWARENESS

TESTING THE PLAN

MAINTAINING THE PLAN

Contribute to and Enforce Personnel Security Policies and Procedures

Candidate screening and hiring

Employment agreements and policies

Onboarding, transfers, and termination processes

Vendor, consultant, and contractor agreements and controls

Compliance policy requirements

Privacy policy requirements

Understand and Apply Risk Management Concepts

Identify threats and vulnerabilities

Risk assessment/analysis

Risk assessment

ASSET VALUATION

THREAT ANALYSIS

VULNERABILITY ASSESSMENT

Risk analysis

QUALITATIVE RISK ANALYSIS

QUANTITATIVE RISK ANALYSIS

HYBRID RISK ANALYSIS

Risk appetite and risk tolerance

Risk treatment

Countermeasure selection and implementation

Cost-effectiveness

Legal liability

Operational impact

Technical factors

Applicable types of controls

Control assessments (security and privacy)

Control assessment approach

Control assessment methodology

CONTROL ASSESSMENT TECHNIQUES

SAMPLING TECHNIQUES

REPORTING

Monitoring and measurement

Reporting

Continuous improvement

Risk frameworks

Risk assessment frameworks

Risk management frameworks

Understand and Apply Threat Modeling Concepts and Methodologies

Identifying threats

Determining and diagramming potential attacks

Performing reduction analysis

Remediating threats

IT HAS TO BE PASTA

Apply Supply Chain Risk Management (SCRM) Concepts

Risks associated with hardware, software, and services

Third-party assessment and monitoring

Fourth-party risk

Minimum security requirements

Service-level agreement requirements

Establish and Maintain a Security Awareness, Education, and Training Program

Methods and techniques to present awareness and training

Awareness

Training

Education

Periodic content reviews

Program effectiveness evaluation

Asset Security

Identify and Classify Information and Assets

Data classification

Commercial data classification

Government data classification

Data handling

Asset classification

Establish Information and Asset Handling Requirements

DETERMINING APPROPRIATE HANDLING REQUIREMENTS

Provision Resources Securely

Information and asset ownership

Asset inventory

Asset management

Manage Data Life Cycle

Data roles

Data collection

Data location

Data maintenance

Data retention

Data remanence

Data destruction

Ensure Appropriate Asset Retention

End of life

End of support

Determine Data Security Controls and Compliance Requirements

Data states

Scoping and tailoring

Standards selection

Data protection methods

Digital rights management (DRM)

Data loss prevention (DLP)

Cloud access security broker (CASB)

Cryptography

Access controls

Privacy controls

Security Architecture and Engineering

Research, Implement, and Manage Engineering Processes Using Secure Design Principles

Threat modeling

Identifying threats

Determining and diagramming potential attacks

Performing reduction analysis

Remediating threats

IT HAS TO BE PASTA

Least privilege (and need to know)

Defense in depth

Secure defaults

Fail securely

Separation of duties

Keep it simple

Zero trust

SIMPLICITY IS IN THE EYE OF THE BEHOLDER

Privacy by design

Trust but verify

SYSTEM HARDENING

Shared responsibility

Understand the Fundamental Concepts of Security Models

Biba

Bell-LaPadula

Access Matrix

Discretionary Access Control

Mandatory Access Control

Take-Grant

Clark-Wilson

Information Flow

Noninterference

Select Controls Based Upon Systems Security Requirements

Evaluation criteria

Trusted Computer System Evaluation Criteria

Trusted Network Interpretation

European Information Technology Security Evaluation Criteria

Common Criteria

System certification and accreditation

DITSCAP

NIACAP

FedRAMP

CMMC

DCID 6/3

Understand Security Capabilities of Information Systems

Trusted Computing Base

Trusted Platform Module

Secure modes of operation

Open and closed systems

Memory protection

Encryption and decryption

Protection rings

Security modes

Recovery procedures

Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements

Client-based systems

Server-based systems

Database systems

Cryptographic systems

Industrial control systems

Cloud-based systems

Distributed systems

Internet of Things

Microservices

Containerization

Serverless

Embedded systems

High-performance computing systems

Edge computing systems

Virtualized systems

Web-based systems

Mobile systems

Select and Determine Cryptographic Solutions

THE SCIENCE OF CRYPTO

Plaintext and ciphertext

Encryption and decryption

End-to-end encryption

Link encryption

Putting it all together: The cryptosystem

Classes of ciphers

Block ciphers

A DISPOSABLE CIPHER: THE ONE-TIME PAD

Stream ciphers

Types of ciphers

Substitution ciphers

Transposition

CRYPTOGRAPHY ALTERNATIVES

Cryptographic life cycle

Cryptographic methods

Symmetric

DATA ENCRYPTION STANDARD

TRIPLE DES

ADVANCED ENCRYPTION STANDARD

BLOWFISH AND TWOFISH

RIVEST CIPHERS

IDEA CIPHER

Asymmetric

RSA

DIFFIE-HELLMAN KEY EXCHANGE

EL GAMAL

MERKLE-HELLMAN (TRAPDOOR) KNAPSACK

ELLIPTIC CURVE

QUANTUM COMPUTING

Public key infrastructure

Key management practices

KEY ESCROW AND KEY RECOVERY

Digital signatures and digital certificates

Nonrepudiation

Integrity (hashing)

MD

SHA

HMAC

Understand Methods of Cryptanalytic Attacks

WORK FACTOR: FORCE × EFFORT = WORK

Brute force

Ciphertext only

Known plaintext

Frequency analysis

Chosen ciphertext

Implementation attacks

Side channel

Fault injection

Timing

Man in the middle

Pass the hash

Kerberos exploitation

Ransomware

Apply Security Principles to Site and Facility Design

Design Site and Facility Security Controls

Wiring closets, server rooms, and more

Restricted and work area security

Utilities and heating, ventilation, and air conditioning

Environmental issues

Fire prevention, detection, and suppression

Power

Communication and Network Security

Assess and Implement Secure Design Principles in Network Architectures

OSI and TCP/IP models

The OSI Reference Model

Application Layer (Layer 7)

CONTENT DISTRIBUTION NETWORKS

Presentation Layer (Layer 6)

Session Layer (Layer 5)

Transport Layer (Layer 4)

Network Layer (Layer 3)

ROUTING PROTOCOLS

ROUTED PROTOCOLS

IMPLICATIONS OF MULTILAYER PROTOCOLS

CONVERGED PROTOCOLS

SOFTWARE-DEFINED NETWORKS

IPSEC

OTHER NETWORK LAYER PROTOCOLS

NETWORKING EQUIPMENT AT THE NETWORK LAYER

Data Link Layer (Layer 2)

LAN PROTOCOLS AND TRANSMISSION METHODS

WIRELESS NETWORKS

SATELLITE NETWORKS

CELLULAR NETWORKS

WAN TECHNOLOGIES AND PROTOCOLS

ASYNCHRONOUS AND SYNCHRONOUS COMMUNICATIONS

NETWORKING EQUIPMENT AT THE DATA LINK LAYER

Physical Layer (Layer 1)

NETWORK TOPOLOGIES

CABLE AND CONNECTOR TYPES

ANALOG AND DIGITAL SIGNALING

INTERFACE TYPES

NETWORKING EQUIPMENT

The TCP/IP Model

Secure Network Components

Operation of hardware

Transmission media

Protecting wired networks

Protecting Wi-Fi networks

Network access control devices

Firewalls and firewall types

PACKET-FILTERING

CIRCUIT-LEVEL GATEWAY

APPLICATION-LEVEL GATEWAY

WEB APPLICATION FIREWALL

NEXT-GENERATION FIREWALLS AND UNIFIED THREAT MANAGEMENT DEVICES

Firewall architectures

SCREENING ROUTER

DUAL-HOMED GATEWAYS

SCREENED-HOST GATEWAYS

SCREENED SUBNET

MICROSEGMENTATION

Intrusion detection and prevention systems

ACTIVE AND PASSIVE IDS

NETWORK-BASED AND HOST-BASED IDs

KNOWLEDGE-BASED AND BEHAVIOR-BASED IDS

Web content filters

Data loss prevention

Cloud access security brokers

Endpoint security

Implement Secure Communication Channels According to Design

Voice

Multimedia collaboration

Remote access

Remote access security methods

Remote access security

POINT-TO-POINT TUNNELING PROTOCOL

LAYER 2 FORWARDING PROTOCOL

LAYER 2 TUNNELING PROTOCOL

SECURE SOCKETS LAYER/TRANSPORT LAYER SECURITY

Data communications

Virtualized networks

Third-party connectivity

Identity and Access Management

Control Physical and Logical Access to Assets

Information

Systems and devices

DEVICE SECURITY AND LIFE SAFETY

Facilities

Applications

Manage Identification and Authentication of People, Devices, and Services

Identity management implementation

Single-/multifactor authentication

Single-factor authentication

PASSWORDS AND PASSPHRASES

ONE-TIME PASSWORDS

PERSONAL IDENTIFICATION NUMBERS

Multifactor authentication

TOKENS

SMARTPHONE / SMS PASSWORDS

DIGITAL CERTIFICATES

BIOMETRICS

Accountability

Session management

Registration, proofing, and establishment of identity

Federated identity management

Credential management systems

Single sign-on

Just-in-Time

Federated Identity with a Third-Party Service

On-premises

Cloud

Hybrid

Implement and Manage Authorization Mechanisms

Role-based access control

Rule-based access control

Mandatory access control

Discretionary access control

Attribute-based access control

Risk-based access control

Manage the Identity and Access Provisioning Life Cycle

Implement Authentication Systems

OpenID Connect/Open Authorization

Security Assertion Markup Language

Kerberos

RADIUS and TACACS+

Security Assessment and Testing

Design and Validate Assessment, Test, and Audit Strategies

Conduct Security Control Testing

Vulnerability assessment

Port scanning

Vulnerability scans

Unauthenticated and authenticated scans

Vulnerability scan reports

Penetration testing

Network penetration testing

THE COMMON VULNERABILITY SCORING SYSTEM

PACKET SNIFFING ISN’T ALL BAD

Application penetration testing

Physical penetration testing

GET OUT OF JAIL FREE

Social engineering

PHISHING AND ITS VARIANTS

Log reviews

Synthetic transactions

NOBODY REVIEWS LOGS ANYMORE

Code review and testing

Misuse case testing

WHY WOULD SOMEONE TYPE THAT?

Test coverage analysis

Interface testing

Breach attack simulations

Compliance checks

Collect Security Process Data

Account management

Management review and approval

Key performance and risk indicators

Backup verification data

Training and awareness

Disaster recovery and business continuity

Analyze Test Output and Generate Reports

Remediation

Exception handling

Ethical disclosure

Conduct or Facilitate Security Audits

Security Operations

Understand and Comply with Investigations

Evidence collection and handling

Types of evidence

Rules of evidence

BEST EVIDENCE RULE

HEARSAY RULE

Admissibility of evidence

Chain of custody and the evidence life cycle

COLLECTION AND IDENTIFICATION

ANALYSIS

STORAGE, PRESERVATION, AND TRANSPORTATION

PRESENTATION IN COURT

FINAL DISPOSITION

Reporting and documentation

Investigative techniques

Digital forensics tools, tactics, and procedures

Artifacts

Conduct Logging and Monitoring Activities

Intrusion detection and prevention

Security information and event management

Security orchestration, automation, and response

Continuous monitoring

Egress monitoring

Log management

Threat intelligence

User and entity behavior analysis

Perform Configuration Management

Apply Foundational Security Operations Concepts

Need-to-know and least privilege

Separation of duties and responsibilities

Privileged account management

MONITORING (EVERYBODY'S SPECIAL!)

Job rotation

MANDATORY AND PERMANENT VACATIONS: JOB ROTATIONS OF A DIFFERENT SORT

Service-level agreements

HOW MANY NINES?

Apply Resource Protection

Media management

Media protection techniques

Conduct Incident Management

Operate and Maintain Detective and Preventative Measures

Implement and Support Patch and Vulnerability Management

Understand and Participate in Change Management Processes

Implement Recovery Strategies

Backup storage strategies

Recovery site strategies

Multiple processing sites

System resilience, high availability, quality of service, and fault tolerance

HOW VIRTUALIZATION MAKES HIGH AVAILABILITY A REALITY

Implement Disaster Recovery Processes

DISASTER RECOVERY PLANNING AND TERRORIST ATTACKS

PLANNING FOR PANDEMICS

Response

Salvage

Recovery

Financial readiness

Personnel

Communications

Assessment

Restoration

Training and awareness

Lessons learned

Test Disaster Recovery Plans

Read-through or tabletop

Walkthrough

Simulation

Parallel

Full interruption (or cutover)

Participate in Business Continuity Planning and Exercises

Implement and Manage Physical Security

Address Personnel Safety and Security Concerns

Software Development Security

Understand and Integrate Security in the Software Development Life Cycle

Development methodologies

Agile

Waterfall

DevOps

CIS SYSTEM AND DEVICE HARDENING STANDARDS

DevSecOps

Maturity models

Operation and maintenance

Change management

CSSLP CERTIFICATION

Integrated product team

Identify and Apply Security Controls in Software Development Ecosystems

KEEP DEVELOPERS OUT OF PRODUCTION ENVIRONMENTS

Programming languages

Libraries

Tool sets

Integrated development environment

Runtime

Continuous integration/continuous delivery

Security orchestration, automation, and response

Software configuration management

Code repositories

Application security testing

Code reviews

Static application security testing

Dynamic application security testing

CODING STANDARDS

Assess the Effectiveness of Software Security

Auditing and logging of changes

Risk analysis and mitigation

Assess Security Impact of Acquired Software

Define and Apply Secure Coding Guidelines and Standards

Security weaknesses and vulnerabilities at the source-code level

Security of application programming interfaces

Secure coding practices

OPEN WEB APPLICATION SECURITY PROJECT

Software-defined security

The Part of Tens

Ten Ways to Prepare for the Exam

Know Your Learning Style

Get a Networking Certification First

Register Now

Make a 60-Day Study Plan

Get Organized and Read

Join a Study Group

Take Practice Exams

Take a CISSP Training Seminar

Adopt an Exam-Taking Strategy

Take a Breather

Ten Test-Day Tips

Get a Good Night’s Rest

Dress Comfortably

Eat a Good Meal

Arrive Early

Bring Approved Identification

Bring Snacks and Drinks

Bring Prescription and Over-the-Counter Medications

Leave Your Mobile Devices Behind

Take Frequent Breaks

Guess — As a Last Resort

Glossary

Index. A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

About the Authors

Dedication

Authors' Acknowledgments

WILEY END USER LICENSE AGREEMENT

Отрывок из книги

Since 1994, security practitioners around the world have been pursuing a well-known and highly regarded professional credential: the Certified Information Systems Security Professional (CISSP) certification. And since 2001, CISSP For Dummies has been helping security practitioners enhance their security knowledge and earn the coveted CISSP certification.

Today, there are approximately 140,000 CISSPs worldwide. Ironically, some skeptics might argue that the CISSP certification is becoming less relevant because so many people have earned it. But the CISSP certification isn’t less relevant because more people are attaining it; more people are attaining it because it’s more relevant now than ever. Information security is far more important than at any time in the past, with extremely large-scale data security breaches and highly sophisticated cyberattacks becoming all too frequent occurrences in our modern era.

.....

Taking practice exams is a great way to get familiar with the types of questions and topics you’ll need to be familiar with for the CISSP exam. Be sure to take advantage of the online practice exam questions that are included with this book. (See the introduction for more information.) Although the practice exams don’t simulate the adaptive testing experience, you can simulate a worst-case scenario by configuring the test engine to administer 150 questions (the maximum number you might see on the CISSP exam) with a time limit of 3 hours (the maximum amount of time you’ll have to complete the CISSP exam). Learn more about computer-adaptive testing for the CISSP exam in the “About the CISSP Examination” section later in this chapter and on the (ISC)2 website at https://isc2.org/Certifications/CISSP/CISSP-CAT.

To study for the CISSP exam successfully, you need to know your most effective learning styles. Boot camps are best for some people, for example, whereas others learn better over longer periods. Furthermore, some people get more value from group discussions, whereas reading alone works better for others. Know thyself, and use what works best for you.

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу CISSP For Dummies
Подняться наверх