Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 533 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
533
Dung lượng
8,51 MB
Nội dung
1/533 Table of Contents Cover Title page Copyright About the Authors Acknowledgments Chapter 1: Introduction How to Prepare for the Exam How to Take the Exam Good Luck! Chapter 2: Domain 1: Security and Risk Management (e.g., Security, Risk, Compliance, Law, Regulations, Business Continuity) Abstract Unique Terms and Definitions Introduction Cornerstone Information Security Concepts Legal and Regulatory Issues Security and 3rd Parties Ethics Information Security Governance Access Control Defensive Categories and Types Risk Analysis Types of Attackers Summary of Exam Objectives Self Test Self Test Quick Answer Key Chapter 3: Domain 2: Asset Security (Protecting Security of Assets) Abstract Unique Terms and Definitions Introduction Classifying Data Ownership Memory and Remanence Data Destruction Determining Data Security Controls Summary of Exam Objectives Self Test Self Test Quick Answer Key Chapter 4: Domain 3: Security Engineering (Engineering and Management of Security) Abstract Unique Terms and Definitions Introduction Security Models / 533 Evaluation Methods, Certification and Accreditation Secure System Design Concepts Secure Hardware Architecture Secure Operating System and Software Architecture Virtualization and Distributed Computing System Vulnerabilities, Threats and Countermeasures Cornerstone Cryptographic Concepts History of Cryptography Types of Cryptography Cryptographic Attacks Implementing Cryptography Perimeter Defenses Site Selection, Design, and Configuration System Defenses Environmental Controls Summary of Exam Objectives Self Test Self Test Quick Answer Key Chapter 5: Domain 4: Communication and Network Security (Designing and Protecting Network Security) Abstract Unique Terms and Definitions Introduction Network Architecture and Design Secure Network Devices and Protocols Secure Communications Summary of Exam Objectives Self Test Self Test Quick Answer Key Chapter 6: Domain 5: Identity and Access Management (Controlling Access and Managing Identity) Abstract Unique Terms and Definitions Introduction Authentication Methods Access Control Technologies Access Control Models Summary of Exam Objectives Self Test Self Test Quick Answer Key Chapter 7: Domain 6: Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing) Abstract Unique Terms and Definitions Introduction / 533 Assessing Access Control Software Testing Methods Summary of Exam Objectives Self Test Self Test Quick Answer Key Chapter 8: Domain 7: Security Operations (e.g., Foundational Concepts, Investigations, Incident Management, Disaster Recovery) Abstract Unique Terms and Definitions Introduction Administrative Security Forensics Incident Response Management Operational Preventive and Detective Controls Asset Management Continuity of Operations BCP and DRP Overview and Process Developing a BCP/DRP Backups and Availability DRP Testing, Training and Awareness Continued BCP/DRP Maintenance Specific BCP/DRP Frameworks Summary of Exam Objectives Self Test Self Test Quick Answer Key Chapter 9: Domain 8: Software Development Security (Understanding, Applying, and Enforcing Software Security) Abstract Unique Terms and Definitions Introduction Programming Concepts Application Development Methods Databases Object-Oriented Design and Programming Assessing the Effectiveness of Software Security Artificial Intelligence Summary of Exam Objectives Self Test Self Test Quick Answer Key Appendix: Self Test Glossary Index / 533 CHAPTER Introduction EXAM OBJECTIVES IN THIS CHAPTER • How to Prepare for the Exam • How to Take the Exam • Good Luck! This book is born out of real-world information security industry experience The authors of this book have held the titles of systems administrator, systems programmer, network engineer/security engineer, security director, HIPAA security officer, ISSO, security consultant, instructor, and others This book is also born out of real-world instruction We have logged countless road miles teaching information security classes to professionals around the world We have taught thousands of students in hundreds of classes: both physically on most of the continents, as well as online Classes include CISSP®, of course, but also continuous monitoring, hunt teaming, penetration testing, security essentials, hacker techniques, information assurance boot camps, and others Good instructors know that students have spent time and money to be with them, and time can be the most precious We respect our students and their time: we not waste it We teach our students what they need to know, and we so as efficiently as possible This book is also a reaction to other books on the same subject As the years have passed, other books’ page counts have grown, often past 1000 pages As Larry Wall once said, “There is more than one way to it.” [1] Our experience tells us that there is another way If we can teach someone with the proper experience how to pass the CISSP® exam in a 6-day boot camp, is a 1000+ page CISSP® book really necessary? We asked ourselves: what can we that has not been done before? What can we better or differently? Can we write a shorter book that gets to the point, respects our student’s time, and allows them to pass the exam? We believe the answer is yes; you are reading the result We know what is important, and we will not waste your time We have taken Strunk and White’s advice to “omit needless words” [2] to heart: it is our mantra This book will teach you what you need to know, and so as concisely as possible / 533 How to Prepare for the Exam Read this book, and understand it: all of it If we cover a subject in this book, we are doing so because it is testable (unless noted otherwise) The exam is designed to test your understanding of the Common Body of Knowledge, which may be thought of as the universal language of information security professionals It is said to be “a mile wide and two inches deep.” Formal terminology is critical: pay attention to it The Common Body of Knowledge is updated occasionally, most recently in April 2015 This book has been updated to fully reflect the 2015 CBK The (ISC) Candidate Information Bulletin (CIB) describes the current version of the exam; downloading and reading the CIB is a great exam preparation step You may download it here:https://www.isc2.org/uploadedfiles/(isc)2_public_content/exam_outlines/cisspexam-outline-april-2015.pdf Learn the acronyms in this book and the words they represent, backwards and forwards Both the glossary and index of this book are highly detailed, and map from acronym to name We did this because it is logical for a technical book, and also to get you into the habit of understanding acronyms forwards and backwards Much of the exam question language can appear unclear at times: formal terms from the Common Body of Knowledge can act as a beacon to lead you through the more difficult questions, highlighting the words in the question that really matter 2® THE CISSP® EXAM IS A MANAGEMENT EXAM Never forget that the CISSP® exam is a management exam: answer all questions as an information security manager would Many questions are fuzzy and provide limited background: when asked for the best answer, you may think: “it depends.” Think and answer like a manager For example: the exam states you are concerned with network exploitation If you are a professional penetration tester you may wonder: am I trying to launch an exploit, or mitigate one? What does “concerned” mean? Your CSO is probably trying to mitigate network exploitation, and that is how you should answer on the exam THE 2015 UPDATE The 2015 exam moved to domains of knowledge (down from 10) Lots of content was moved The domain content can seem jumbled at times: the concepts not always flow logically from one to the next Some domains are quite large, while others are small In the end this is a non-issue: you will be faced with 250 questions from the domains, and the questions will not overtly state the domain they are based on The 2015 update focused on adding more up-to-date technical content, including an emphasis on cloud computing, the Internet of Things (IoT) and Content Distribution Networks (CDN), as well as other modern technical topics Even DevOps was added, / 533 which is quite a spin on the pre-2015 “exam way” concerning best practices for development THE NOTES CARD APPROACH As you are studying, keep a “notes card” file for highly specific information that does not lend itself to immediate retention A notes card is simply a text file (you can create it with a simple editor like WordPad) that contains a condensed list of detailed information Populate your notes card with any detailed information (which you not already know from previous experience) which is important for the exam, like the five levels of the Software Capability Maturity Level (CMM; covered in Chapter 9, Domain 8: Software Development Security), or the ITSEC and Common Criteria Levels (covered in Chapter 4, Domain 3: Security Engineering), for example The goal of the notes card is to avoid getting lost in the “weeds”: drowning in specific information that is difficult to retain on first sight Keep your studies focused on core concepts, and copy specific details to the notes card When you are done, print the file As your exam date nears, study your notes card more closely In the days before your exam, really focus on those details PRACTICE TESTS Quizzing can be the best way to gauge your understanding of this material, and of your readiness to take the exam A wrong answer on a test question acts as a laser beam: showing you what you know, and more importantly, what you not know Each chapter in this book has 15 practice test questions at the end, ranging from easy to medium to hard The Self Test Appendix includes explanations for all correct and incorrect answers; these explanations are designed to help you understand why the answers you chose were marked correct or incorrect This book’s companion Web site is located athttp://booksite.elsevier.com/companion/conrad/index.php It contains 500 questions: two full practice exams Use them You should aim for 80% or greater correct answers on any practice test The real exam requires 700 out of 1000 points, but achieving 80% or more on practice tests will give you some margin for error Takethese quizzes closed book, just as you will take the real exam Pay careful attention to any wrong answers, and be sure to reread the relevant section of this book Identify any weaker domains (we all have them): domains where you consistently get more wrong answers than others Then focus your studies on those weak areas Time yourself while taking any practice exam Aim to answer at a rate of at least one question per minute You need to move faster than true exam pace because the actual exam questions may be more difficult and therefore take more time If you are taking / 533 longer than that, practice more to improve your speed Time management is critical on the exam, and running out of time usually equals failure READ THE GLOSSARY As you wrap up your studies, quickly read through the glossary towards the back of this book It has over 1000 entries, and is highly detailed by design The glossary definitions should all be familiar concepts to you at this point If you see a glossary definition that is not clear or obvious to you, go back to the chapter it is based on, and reread that material Ask yourself: I understand this concept enough to answer a question about it? READINESS CHECKLIST These steps will serve as a “readiness checklist” as you near the exam day If you remember to think like a manager, are consistently scoring over 80% on practice tests, are answering practice questions quickly, understand all glossary terms, and perform a final thorough read through of your notes card, you are ready to go How to Take the Exam The CISSP® exam was traditionally taken via paper-based testing: old-school paperand-pencil This has now changed to computer-based testing (CBT), which we will discuss shortly The exam has 250 questions, with a 6-hour time limit Six hours sounds like a long time, until you the math: 250 questions in 360 minutes leaves less than a minute and a half to answer each question The exam is long and can be grueling; it is also a race against time Preparation is the key to success STEPS TO BECOMING A CISSPđ Becoming a CISSPđ requires four steps: ã Proper professional information security experience • Agreeing to the (ISC) code of ethics ã Passing the CISSPđ exam ã Endorsement by another CISSP® Additional details are available on the examination registration form available at https://www.isc2.org The exam currently requires years of professional experience in or more of the domains of knowledge Those domains are covered in chapters 2–9 of this book You may waive year with a college degree or approved certification; see the examination registration form for more information 2® / 533 You may pass the exam before you have enough professional experience and become an “Associate of (ISC) ” Once you meet the experience requirement, you can then complete the process and become a CISSP® The (ISC) code of ethics is discussed in Chapter 2, Domain 1: Security and Risk Management Passing the exam is discussed in section “How to Take the Exam,” and we discuss endorsement in section “After the Exam” below 2® 2® COMPUTER BASED TESTING (CBT) (ISC) has partnered with Pearson VUE (http://www.pearsonvue.com/) to provide computer-based testing (CBT) Pearson VUE has testing centers located in over 160 countries around the world; go to their website to schedule your exam Note that the information regarding CBT is subject to change: please check the (ISC) CBT site (https://www.isc2.org/cbt/default.aspx) for any updates to the CBT process According to (ISC) , “Candidates will receive their unofficial test result at the test center The results will be handed out by the Test Administrator during the checkout process (ISC) will then follow up with an official result via email In some instances, real time results may not be available A comprehensive statistical and psychometric analysis of the score data is conducted during every testing cycle before scores are released.” [3] This normally occurs when the exam changes: students who took the updated exam in April and May of 2015 reported a 6-week wait before they received their results Immediate results followed shortly after that time Pearson VUE’s (ISC) site is: http://www.pearsonvue.com/isc2/ It includes useful resources, including the “Pearson VUE Testing Tutorial and Practice Exam,” a Microsoft Windows application that allows candidates to try out a demo exam, explore functionality, test the “Flag for Review” function, etc This can help reduce exam-day jitters, and familiarity with the software can also increase your test taking speed 2® 2® 2® 2® HOW TO TAKE THE EXAM The exam has 250 questions comprised of four types: • Multiple choice • Scenario • Drag/drop • Hotspot Multiple-choice questions have four possible answers, lettered A, B, C, or D Each multiple-choice question has exactly one correct answer A blank answer is a wrong answer: guessing does not hurt you Scenario questions contain a long paragraph of information, followed by a number of multiple choice questions based on the scenario The questions themselves are multiple choice, with one correct answer only, as with other multiple choice questions The / 533 scenario is often quite long, and contains unnecessary information It is often helpful to read the scenario questions first: this method will provide guidance on keywords to look for in the scenario Drag & drop questions are visual multiple choice questions that may have multiple correct answers.Figure 1.1 is an example from Chapter 2, Domain 1: Security and Risk Management FIGURE 1.1 Sample Drag & Drop Question Drag and drop: Identify all objects listed below Drag and drop all objects from left to right As we will learn in Chapter 2, Domain 1: Security and Risk Management, passive data such as physical files, electronic files and database tables are objects Subjects are active, such as users and running processes Therefore you would drag the objects to the right, and submit the answers, as shown inFigure 1.2 / 533 ... CISSP? ? Becoming a CISSP? ? requires four steps: ã Proper professional information security experience • Agreeing to the (ISC) code of ethics ã Passing the CISSP? ? exam ã Endorsement by another CISSP? ?... calendar year.” [4] Once you pass the exam, you will need to be endorsed by another CISSP? ? before earning the title ? ?CISSP? ?”; (ISC) will explain this process to you in the email they send with... there is a patient being treated by Sebastian’s practice, but not by Sebastian himself, least privilege could allow access, but need to know would not Learn By Example Real-World Least Privilege