Cover image for The CISSP prep guide mastering CISSP and CAP
Title:
The CISSP prep guide mastering CISSP and CAP
Personal Author:
Edition:
3rd ed.
Publication Information:
Hoboken, NJ : Wiley, 2006
Physical Description:
1 CD-ROM ; 12 cm.
ISBN:
9780470007921
General Note:
Accompanies text of the same title : QA76.3 K78 2006

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010123211 CP 4729 Computer File Accompanies Open Access Book Compact Disc Accompanies Open Access Book
Searching...
Searching...
30000010123212 CP 4729 Computer File Accompanies Open Access Book Compact Disc Accompanies Open Access Book
Searching...

On Order

Summary

Summary

This follow-on edition to The CISSP Prep Guide: Mastering CISSP and ISSEP offers value-add coverage not featured anywhere else! You'll prepare for passing CISSP with a revised review of each of the ten CISSP domains, updated to reflect current thinking/technology, especially in the areas of cyber-terrorism prevention and disaster recovery. You'll also cover CAP, a major section of the ISSEP that has been elevated from its status as part of an advanced concentration to its own certification. The accompanying CD-ROM contains revised test questions to make your preparation complete. Order your copy today and make your exam preparation complete!


Author Notes

Ronald L. Krutz , PhD, PE, CISSP, ISSEP, is Chief Knowledge Officer for Cybrinth, LLC. He was a faculty member in the Carnegie Mellon ECE Department and Associate Director of the Carnegie Mellon Research Institute. He was a former lead instructor for the ISC2 CISSP review seminars. Dr. Krutz is also a Distinguished Special Lecturer in the Center for Forensic Computer Investigation at the University of New Haven and consulting editor for the Wiley Infosec series.

Russell Dean Vines , CISSP, CISM, Security +, CCNA, MCSE, MCNE, is President and Founder of The RDV Group Inc., a New York-based security consulting services firm. He has been active in the prevention, detection, and remediation of security vulnerabilities for international corporations, including government, finance, and new media organizations, for many years. He is the author of several bestselling information system security texts, a consulting editor for the Wiley Infosec series, and a professional musician and composer in the NY area.


Table of Contents

About the Authorsp. vii
Forewordp. xxiii
Acknowledgmentsp. xxv
Introductionp. xxvii
Part 1 Focused Review of the CISSP Ten Domainsp. 1
Chapter 1 Information Security and Risk Managementp. 3
Our Approachp. 4
Security Management Conceptsp. 5
System Security Life Cyclep. 5
The Three Fundamentalsp. 6
Other Important Conceptsp. 7
Objectives of Security Controlsp. 10
Information Classification Processp. 12
Information Classification Objectivesp. 12
Information Classification Benefitsp. 13
Information Classification Conceptsp. 13
Information Classification Rolesp. 16
Security Policy Implementationp. 20
Policies, Standards, Guidelines, and Proceduresp. 20
Roles and Responsibilitiesp. 25
Risk Management and Assessmentp. 27
Principles of Risk Managementp. 27
RM Rolesp. 30
Overview of Risk Analysisp. 30
Security Posture Assessment Methodologiesp. 39
Security Awarenessp. 42
Awarenessp. 44
Training and Educationp. 45
Assessment Questionsp. 46
Chapter 2 Access Controlp. 55
Rationalep. 55
Controlsp. 56
Models for Controlling Accessp. 57
Control Combinationsp. 59
Access Control Attacksp. 61
Denial of Service/Distributed Denial of Service (DoS/DDoS)p. 61
Back Doorp. 62
Spoofingp. 62
Man-in-the-Middlep. 63
Replayp. 63
TCP Hijackingp. 63
Social Engineeringp. 64
Dumpster Divingp. 64
Password Guessingp. 65
Software Exploitationp. 65
Mobile Codep. 66
Trojan Horsesp. 66
Logic Bombp. 67
System Scanningp. 67
Penetration Testingp. 68
Identification and Authenticationp. 69
Passwordsp. 70
Biometricsp. 72
Single Sign-On (SSO)p. 74
Kerberosp. 75
Kerberos Operationp. 76
Sesamep. 79
KryptoKnightp. 79
Access Control Methodologiesp. 79
Centralized Access Controlp. 80
Decentralized/Distributed Access Controlp. 81
Intrusion Detectionp. 86
Some Access Control Issuesp. 88
Assessment Questionsp. 89
Chapter 3 Telecommunications and Network Securityp. 95
The C.I.A. Triadp. 96
Confidentialityp. 96
Integrityp. 96
Availabilityp. 97
Protocolsp. 98
The Layered Architecture Conceptp. 98
Open Systems Interconnect (OSI) Modelp. 99
Transmission Control Protocol/Internet Protocol (TCP/IP)p. 103
LAN Technologiesp. 110
Ethernetp. 110
ARCnetp. 112
Token Ringp. 112
Fiber Distributed Data Interface (FDDI)p. 113
Cabling Typesp. 113
Coaxial Cable (Coax)p. 113
Twisted Pairp. 114
Fiber-Optic Cablep. 116
Cabling Vulnerabilitiesp. 116
Transmission Typesp. 117
Network Topologiesp. 118
Busp. 118
Ringp. 118
Starp. 118
Treep. 120
Meshp. 120
LAN Transmission Protocolsp. 121
Carrier-Sense Multiple Access (CSMA)p. 121
Pollingp. 122
Token Passingp. 122
Unicast, Multicast, Broadcastp. 123
Networking Devicesp. 123
Hubs and Repeatersp. 123
Bridgesp. 124
Spanning Treep. 125
Switchesp. 125
Transparent Bridgingp. 125
Routersp. 126
VLANsp. 129
Gatewaysp. 130
LAN Extendersp. 130
Firewall Typesp. 130
Packet-Filtering Firewallsp. 131
Application-Level Firewallsp. 132
Circuit-Level Firewallsp. 133
Stateful Inspection Firewallsp. 133
Firewall Architecturesp. 133
Packet-Filtering Routersp. 134
Screened-Host Firewallsp. 134
Dual-Homed Host Firewallsp. 134
Screened-Subnet Firewallsp. 135
SOCKSp. 137
Common Data Network Servicesp. 137
File Transfer Servicesp. 138
SFTPp. 139
SSH/SSH-2p. 139
TFTPp. 140
Data Network Typesp. 140
Wide Area Networksp. 141
Internetp. 141
Intranetp. 142
Extranetp. 142
WAN Technologiesp. 142
Dedicated Linesp. 142
T-carriersp. 143
WAN Switchingp. 143
Circuit-Switched Networksp. 143
Packet-Switched Networksp. 144
Other WAN Protocolsp. 146
Common WAN Devicesp. 146
Network Address Translation (NAT)p. 147
Remote Access Technologiesp. 149
Remote Access Typesp. 149
Remote Access Security Methodsp. 151
Virtual Private Networking (VPN)p. 151
RADIUS and TACACSp. 160
Network Availabilityp. 162
High Availability and Fault Tolerancep. 162
Wireless Technologiesp. 164
IEEE Wireless Standardsp. 164
Bluetoothp. 170
Wireless Application Protocol (WAP)p. 171
Wireless Securityp. 174
Wireless Transport Layer Security Protocolp. 174
WEP Encryptionp. 175
Wireless Vulnerabilitiesp. 175
Intrusion Detection and Responsep. 183
Types of Intrusion Detection Systemsp. 183
IDS Approachesp. 184
Honey Potsp. 186
Computer Incident Response Teamp. 187
IDS and a Layered Security Approachp. 188
IDS and Switchesp. 188
IDS Performancep. 190
Network Attacks and Abusesp. 190
Logon Abusep. 190
Inappropriate System Usep. 190
Eavesdroppingp. 191
Network Intrusionp. 191
Denial of Service (DoS) Attacksp. 192
Session Hijacking Attacksp. 192
Fragmentation Attacksp. 193
Dial-Up Attacksp. 193
Probing and Scanningp. 194
Vulnerability Scanningp. 194
Port Scanningp. 195
Issues with Vulnerability Scanningp. 201
Malicious Codep. 202
Virusesp. 202
Spywarep. 204
Trojan Horsesp. 210
Remote Access Trojans (RATs)p. 211
Logic Bombsp. 212
Wormsp. 212
Malicious Code Preventionp. 212
Web Securityp. 214
Phishingp. 214
Browser Hijackingp. 214
SSL/TLSp. 215
S-HTTPp. 217
Instant Messaging Securityp. 217
8.3 Naming Conventionsp. 221
Assessment Questionsp. 222
Chapter 4 Cryptographyp. 233
Introductionp. 233
Definitionsp. 234
Backgroundp. 238
Cryptographic Technologiesp. 241
Classical Ciphersp. 241
Substitutionp. 241
Transposition (Permutation)p. 244
Vernam Cipher (One-Time Pad)p. 244
Book or Running-Key Cipherp. 245
Codesp. 245
Steganographyp. 245
Secret-Key Cryptography (Symmetric-Key)p. 246
Data Encryption Standard (DES)p. 247
Triple DESp. 251
The Advanced Encryption Standard (AES)p. 252
The Rijndael Block Cipherp. 253
The Twofish Algorithmp. 254
The IDEA Cipherp. 255
RC5/RC6p. 255
Public-Key (Asymmetric) Cryptosystemsp. 255
One-Way Functionsp. 256
Public-Key Algorithmsp. 256
Public-Key Cryptosystem Algorithm Categoriesp. 260
Asymmetric and Symmetric Key Length Strength Comparisonsp. 260
Digital Signaturesp. 260
Digital Signature Standard (DSS) and Secure Hash Standard (SHS)p. 261
MD5p. 262
Sending a Message with a Digital Signaturep. 263
Hashed Message Authentication Code (HMAC)p. 263
Hash Function Characteristicsp. 264
Cryptographic Attacksp. 264
Public-Key Certification Systemsp. 266
Digital Certificatesp. 266
Public-Key Infrastructure (PKI)p. 267
Approaches to Escrowed Encryptionp. 273
The Escrowed Encryption Standardp. 273
Key Escrow Approaches Using Public-Key Cryptographyp. 275
Identity-Based Encryptionp. 275
Cryptographic Export Issuesp. 277
Quantum Computingp. 278
E-mail Security Issues and Approachesp. 279
Secure Multi-Purpose Internet Mail Extensions (S/MIME)p. 279
MIME Object Security Services (MOSS)p. 279
Privacy Enhanced Mail (PEM)p. 279
Pretty Good Privacy (PGP)p. 280
Internet Security Applicationsp. 281
Message Authentication Code (MAC) or the Financial Institution Message Authentication Standard (FIMAS)p. 281
Secure Electronic Transaction (SET)p. 281
Secure Sockets Layer (SSL)/Transaction Layer Security (TLS)p. 281
Internet Open Trading Protocol (IOTP)p. 282
MONDEXp. 282
IPSecp. 282
Secure Hypertext Transfer Protocol (S-HTTP)p. 283
Secure Shell (SSH-2)p. 284
Wireless Securityp. 284
Wireless Application Protocol (WAP)p. 284
The IEEE 802.11 Wireless Standardp. 286
Assessment Questionsp. 289
Chapter 5 Security Architecture and Designp. 297
Computer Architecturep. 298
Memoryp. 299
Instruction Execution Cyclep. 302
Input/Output Structuresp. 304
Softwarep. 305
Open and Closed Systemsp. 307
Distributed Architecturep. 307
Protection Mechanismsp. 309
Ringsp. 310
Logical Security Guardp. 311
Enterprise Architecture Issuesp. 311
Security Labelsp. 312
Security Modesp. 312
Additional Security Considerationsp. 313
Recovery Proceduresp. 314
Assurancep. 314
Evaluation Criteriap. 315
Certification and Accreditationp. 317
DITSCAP and NIACAPp. 317
The Systems Security Engineering Capability Maturity Model (SSE-CMM)p. 319
Information Security Modelsp. 322
Access Control Modelsp. 322
Integrity Modelsp. 327
Information Flow Modelsp. 329
Assessment Questionsp. 332
Chapter 6 Operations Securityp. 339
Operations Security Conceptsp. 340
Triplesp. 340
C.I.A.p. 340
Controls and Protectionsp. 341
Categories of Controlsp. 341
Orange Book Controlsp. 342
Operations Controlsp. 358
Monitoring and Auditingp. 365
Monitoringp. 365
Auditingp. 369
Threats and Vulnerabilitiesp. 373
Threatsp. 373
Vulnerabilities and Attacksp. 375
Maintaining Resource Availabilityp. 376
RAIDp. 376
RAID Levelsp. 377
Backup Conceptsp. 378
Operational E-Mail Securityp. 382
E-Mail Phishingp. 383
Fax Securityp. 387
Assessment Questionsp. 388
Chapter 7 Application Securityp. 397
Systems Engineeringp. 398
The System Life Cycle or System Development Life Cycle (SDLC)p. 398
The Software Life Cycle Development Processp. 399
The Waterfall Modelp. 400
The Spiral Modelp. 403
Cost Estimation Modelsp. 406
Information Security and the Life Cycle Modelp. 407
Testing Issuesp. 408
The Software Maintenance Phase and the Change Control Processp. 408
Configuration Managementp. 409
The Software Capability Maturity Model (CMM)p. 410
Agile Methodologyp. 412
Object-Oriented Systemsp. 413
Artificial Intelligence Systemsp. 417
Expert Systemsp. 417
Neural Networksp. 419
Genetic Algorithmsp. 421
Knowledge Managementp. 421
Database Systemsp. 421
Database Security Issuesp. 422
Data Warehouse and Data Miningp. 422
Data Dictionariesp. 423
Application Controlsp. 423
Distributed Systemsp. 425
Centralized Architecturep. 426
Real-Time Systemsp. 426
Assessment Questionsp. 427
Chapter 8 Business Continuity Planning and Disaster Recovery Planningp. 433
Business Continuity Planningp. 435
Continuity Disruptive Eventsp. 436
The Four Prime Elements of BCPp. 437
Disaster Recovery Planning (DRP)p. 446
Goals and Objectives of DRPp. 446
The Disaster Recovery Planning Processp. 447
Testing the Disaster Recovery Planp. 455
Disaster Recovery Proceduresp. 459
Other Recovery Issuesp. 461
Assessment Questionsp. 464
Chapter 9 Legal, Regulations, Compliance, and Investigationsp. 473
Types of Computer Crimep. 473
Examples of Computer Crimep. 475
Lawp. 477
Example: The United Statesp. 477
Common Law System Categoriesp. 478
Computer Security, Privacy and Crime Lawsp. 489
Investigationp. 496
Computer Investigation Issuesp. 496
Export Issues and Technologyp. 502
Liabilityp. 502
Ethicsp. 504
(ISC)2 Code of Ethicsp. 506
The Computer Ethics Institute's Ten Commandments of Computer Ethicsp. 506
The Internet Architecture Board (IAB) Ethics and the Internet (RFC 1087)p. 507
The U.S. Department of Health and Human Services Code of Fair Information Practicesp. 507
The Organization for Economic Cooperation and Development (OECD)p. 508
Assessment Questionsp. 510
Chapter 10 Physical (Environmental) Securityp. 517
Threats to Physical Securityp. 518
Controls for Physical Securityp. 520
Administrative Controlsp. 520
Environmental and Life Safety Controlsp. 524
Physical and Technical Controlsp. 534
Assessment Questionsp. 550
Part 2 The Certification and Accreditation Professional (CAP) Credentialp. 557
Chapter 11 Understanding Certification and Accreditationp. 559
System Authorizationp. 559
A Select History of Systems Authorizationp. 560
More and More Standardsp. 572
What Is Certification and Accreditation?p. 572
NIST C&A Documentsp. 573
C&A Roles and Responsibilitiesp. 573
C&A Phasesp. 577
DIACAP Phasesp. 578
Assessment Questionsp. 580
Chapter 12 Initiation of the System Authorization Processp. 585
Security Categorizationp. 586
Identification of Information Typesp. 588
Potential Harmful Impact Levelsp. 589
Assignment of Impact Level Scoresp. 590
Assignment of System Impact Levelp. 592
Initial Risk Estimationp. 593
Threat-Source Identificationp. 594
Threat Likelihood of Occurrencep. 597
Analyzing for Vulnerabilitiesp. 597
System Accreditation Boundaryp. 601
Legal and Regulatory Requirementsp. 603
Selection of Security Controlsp. 603
The Control Sectionp. 606
The Supplemental Guidance Sectionp. 606
The Control Enhancements Sectionp. 606
Assurancep. 607
Common and System-Specific Security Controlsp. 608
Security Controls and the Management of Organizational Riskp. 608
Documenting Security Controls in the System Security Planp. 610
Assessment Questionsp. 613
Chapter 13 The Certification Phasep. 621
Security Control Assessmentp. 622
Prepare for the Assessmentp. 622
Conduct the Security Assessmentp. 624
Prepare the Security Assessment Reportp. 624
Security Certification Documentationp. 625
Provide the Findings and Recommendationsp. 625
Update the System Security Planp. 625
Prepare the Plan of Actionp. 626
Assemble the Accreditation Packagep. 626
DITSCAP Certification Phasesp. 627
Phase 1 Definitionp. 627
The System Security Authorization Agreement (SSAA)p. 630
SSAA Outlinep. 630
SSAA Additional Materialp. 632
The Requirements Traceability Matrix (RTM)p. 633
Phase 2 Verificationp. 635
Key DITSCAP Rolesp. 638
DIACAP Certification Phasesp. 639
End of the Certification Phasep. 640
Assessment Questionsp. 641
Chapter 14 The Accreditation Phasep. 645
Security Accreditation Decisionp. 646
Final Risk Assessmentp. 646
Accreditation Decisionp. 647
Security Accreditation Documentationp. 648
Accreditation Package Transmissionp. 648
System Security Plan Updatep. 649
DITSCAP Accreditation Phasesp. 649
Phase 3 Validationp. 649
Phase 4 Post Accreditationp. 653
DIACAP Accreditation Phasesp. 656
End of the Accreditation Phasep. 657
Assessment Questionsp. 658
Chapter 15 Continuous Monitoring Processp. 663
Continuous Monitoringp. 664
Monitoring Security Controlsp. 665
Configuration Management and Controlp. 669
Environment Monitoringp. 670
Documentation and Reportingp. 671
Assessment Questionsp. 673
Appendix A Answers to Assessment Questionsp. 681
Appendix B Glossary of Terms and Acronymsp. 881
Appendix C The Information System Security Architecture Professional (ISSAP) Certificationp. 945
Appendix D The Information System Security Engineering Professional (ISSEP) Certificationp. 951
Appendix E The Information System Security Management Professional (ISSMP) Certificationp. 1039
Appendix F Security Control Catalogp. 1075
Appendix G Control Baselinesp. 1185
Indexp. 1193