CISSP Study Notes from CISSP Prep GuideSecond Edition.docx

上传人:b****3 文档编号:11168256 上传时间:2023-05-29 格式:DOCX 页数:176 大小:167.67KB
下载 相关 举报
CISSP Study Notes from CISSP Prep GuideSecond Edition.docx_第1页
第1页 / 共176页
CISSP Study Notes from CISSP Prep GuideSecond Edition.docx_第2页
第2页 / 共176页
CISSP Study Notes from CISSP Prep GuideSecond Edition.docx_第3页
第3页 / 共176页
CISSP Study Notes from CISSP Prep GuideSecond Edition.docx_第4页
第4页 / 共176页
CISSP Study Notes from CISSP Prep GuideSecond Edition.docx_第5页
第5页 / 共176页
CISSP Study Notes from CISSP Prep GuideSecond Edition.docx_第6页
第6页 / 共176页
CISSP Study Notes from CISSP Prep GuideSecond Edition.docx_第7页
第7页 / 共176页
CISSP Study Notes from CISSP Prep GuideSecond Edition.docx_第8页
第8页 / 共176页
CISSP Study Notes from CISSP Prep GuideSecond Edition.docx_第9页
第9页 / 共176页
CISSP Study Notes from CISSP Prep GuideSecond Edition.docx_第10页
第10页 / 共176页
CISSP Study Notes from CISSP Prep GuideSecond Edition.docx_第11页
第11页 / 共176页
CISSP Study Notes from CISSP Prep GuideSecond Edition.docx_第12页
第12页 / 共176页
CISSP Study Notes from CISSP Prep GuideSecond Edition.docx_第13页
第13页 / 共176页
CISSP Study Notes from CISSP Prep GuideSecond Edition.docx_第14页
第14页 / 共176页
CISSP Study Notes from CISSP Prep GuideSecond Edition.docx_第15页
第15页 / 共176页
CISSP Study Notes from CISSP Prep GuideSecond Edition.docx_第16页
第16页 / 共176页
CISSP Study Notes from CISSP Prep GuideSecond Edition.docx_第17页
第17页 / 共176页
CISSP Study Notes from CISSP Prep GuideSecond Edition.docx_第18页
第18页 / 共176页
CISSP Study Notes from CISSP Prep GuideSecond Edition.docx_第19页
第19页 / 共176页
CISSP Study Notes from CISSP Prep GuideSecond Edition.docx_第20页
第20页 / 共176页
亲,该文档总共176页,到这儿已超出免费预览范围,如果喜欢就下载吧!
下载资源
资源描述

CISSP Study Notes from CISSP Prep GuideSecond Edition.docx

《CISSP Study Notes from CISSP Prep GuideSecond Edition.docx》由会员分享,可在线阅读,更多相关《CISSP Study Notes from CISSP Prep GuideSecond Edition.docx(176页珍藏版)》请在冰点文库上搜索。

CISSP Study Notes from CISSP Prep GuideSecond Edition.docx

CISSPStudyNotesfromCISSPPrepGuideSecondEdition

CISSPStudyNotesfromCISSPPrepGuide(SecondEdition)

ThesenoteswerepreparedfromtheTheCISSPPrepGuide2010(SecondEdition):

MasteringtheTenDomainsofComputerSecuritybyRonaldL.Krutz,RussellDeanVines,EdwardM.Strozandarenotintendedtobeareplacementtothebook.

InadditiontotheCISSPPrepGuideIusedthefollowingresourcestopreparefortheexam:

nTheInformationSecurityManagementHandbook,FourthEditionbyMickiKrauseandHaroldF.Tipton

nTherevisedMichaelOverlynotes

nTheBosonQuestions#2and#3

nLotsofmisc.websites

nAndofcoursewww.cccure.org

GoodLuck!

JWG,CISSP

CISSPStudyNotesfromCISSPPrepGuide1

Domain1–SecurityManagementPractices2

Domain2–AccessControlSystems7

Domain3–TelecomandNetworkSecurity13

Domain4–Cryptography34

Domain5–SecurityArchitectureandModels46

Domain6–OperationsSecurity56

Domain7–ApplicationsandSystemDevelopment63

Domain8–BusinessContinuityandDisasterRecoveryPlanning70

Domain9–Law,InvestigationandEthics78

Domain10–PhysicalSecurity87

Domain1–SecurityManagementPractices

TheBigThree-C.I.A.

nConfidentiality–Preventdisclosureofdata

nIntegrity–Preventmodificationofdata

nAvailability–Ensurereliabletimelyaccesstodata

OtherImportantConcepts

nIdentification–MeansinwhichuserclaimsIdentity

nAuthentication–EstablishestheusersIdentity

nAccountability–Systemsabilitytodetermineactionsofusers

nAuthorization–rightsandpermissionsgrantedtoanindividual

nPrivacy–Levelofconfidentialitythatauserisgiven

ObjectiveofSecurityistoreduceeffectsofthreatsandvulnerabilitiestoatolerablelevel.

RiskAnalysis

Assessthefollowing:

nImpactofthethreat

nRiskofthethreatoccurring(likelihood)

Controlsreduceboththeimpactofthethreatandthelikelihoodofthethreat,importantincostbenefitofcontrols.

DataClassification

nDataclassificationhashighlevelenterprisewidebenefit

nDemonstratesorganizationscommitmenttosecurity

nHelpsidentifysensitiveandvitalinformation

nSupportsC.I.A.

nMayberequiredforlegalregulatoryreasons

Dataownersareresponsiblefordefiningthesensitivitylevelofthedata.

GovernmentClassificationTerms:

nUnclassified–Neithersensitivenorclassified,publicreleaseisacceptable

nSensitiveButUnclassified(SBU)–Minorsecret,noseriousdamageifdisclosed

nConfidential–disclosurecouldcausedamagetoNationalSecurity

nSecret-disclosurecouldcauseseriousdamagetoNationalSecurity

nTopSecret–HighestLevel-disclosurecouldcauseexponentiallygravedamagetoNationalSecurity

InadditionmusthaveaNeedtoKnow–justbecauseyouhave“secret”clearancedoesnotmeanall“secret”datajustdatawithaneedtoknow.

AdditionalPublicClassificationTerms

nPublic–similartounclassified,shouldnotbedisclosedbutisnotaproblemifitis

nSensitive–dataprotectedfromlossofConfidentialityandintegrity

nPrivate–datathatispersonalinnatureandforcompanyuseonly

nConfidential–verysensitiveforinternaluseonly-couldseriouslynegativelyimpactthecompany

ClassificationCriteria

nValue-numberonecriteria,ifitisvaluableitshouldbeprotected

nAge–valueofdatalowersovertime,automaticde-classification

nUsefulLife–Iftheinformationismadeobsoleteitcanoftenbede-classified

nPersonalAssociation–Ifthedatacontainspersonalinformationitshouldremainclassified

Distributionmayberequiredintheeventofthefollowing:

nCourtOrder–mayberequiredbycourtorder

nGovernmentContracts–governmentcontractorsmayneedtodiscloseclassifiedinformation

nSeniorLevelApproval–seniorexecutivesmayapproverelease

InformationClassificationRoles

Owner

nMaybeexecutiveormanager

nOwnerhasfinalcorporateresponsibilityofthedataprotection

nMakesdeterminationofclassificationlevel

nReviewsclassificationlevelregularlyforappropriateness

nDelegatesresponsibilityofdataprotectiontotheCustodian

Custodian

nGenerallyITsystemspersonnel

nRunningregularbackupsandtestingrecovery

nPerformsrestorationwhenrequired

nMaintainsrecordsinaccordancewiththeclassificationpolicy

User

nAnyonetheroutinelyusesthedata

nMustfollowoperatingprocedures

nMusttakeduecaretoprotect

nMustusecomputingresourcesofthecompanyforcompanypurposesonly

PoliciesStandards,GuidelinesandProcedures

nPoliciesarethehighestlevelofdocumentation

nStandards,GuidelinesandProceduresderivedfrompolicies

nShouldbecreatedfirst,butarenomoreimportantthantherest

SeniorManagementStatement–generalhigh-levelstatement

nAcknowledgmentofimportanceofcomputingresources

nStatementofSupportforinformationsecurity

nCommitmenttoauthorizelowerlevelStandards,GuidelinesandProcedures

RegulatoryPolicies–companyisrequiredtoimplementduetolegalorregulatoryrequirements

nUsuallyverydetailedandspecifictotheindustryoftheorganization

nTwomainpurposes

nToensurethecompanyisfollowingindustrystandardprocedures

nTogivethecompanyconfidencetheyarefollowingindustrystandardprocedures

AdvisoryPolices–notmandatedbutstronglysuggested.

nCompanywantsemployeestoconsiderthesemandatory.

nAdvisoryPoliciescanhaveexclusionsforcertainemployeesorjobfunctions

InformativePolicies

nExistsimplytoinformthereader

nNoimpliedorspecifiedrequirements

Standards,GuidelinesandProcedures

nContainactualdetailofthepolicy

nHowthepoliciesshouldbeimplemented

nShouldbekeptseparatefromoneanother

nDifferentAudiences

nSecurityControlsaredifferentforeachpolicytype

nUpdatingthepolicyismoremanageable

Standards-Specifyuseoftechnologyinauniformway,compulsory

Guidelines–similartostandardsbutnotcompulsory,moreflexible

Procedures–Detailedsteps,required,sometimescalled“practices”,lowestlevel

Baselines–baselinesaresimilartostandards,standardscanbedevelopedafterthebaselineisestablished

RolesandResponsibilities

nSeniorManagement–Hasultimateresponsibilityforsecurity

nInfosecOfficer–Hasthefunctionalresponsibilityforsecurity

nOwner–Determinesthedataclassification

nCustodian-PreservesC.I.A.

nUser–Performsinaccordancewithstatedpolicy

nAuditor–ExaminesSecurity

RiskManagement

Mitigate(reduce)risktoalevelacceptabletotheorganization.

IdentificationofRisk

nActualthreat

nPossibleconsequences

nProbablefrequency

nLikelyhoodofevent

RiskAnalysis

nIdentificationofrisks

nBenefit-costjustificationofcountermeasures

RiskAnalysisTerms

nAsset–Resource,product,data

nThreat–Actionwithanegativeimpact

nVulnerability–Absenceofcontrol

nSafeguard–Controlorcountermeasure

nExposureFactor

%ofassetlosscausedbythreat

nSingleLossExpectancy(SLE)–Expectedfinanciallossforsingleevent

SLE=AssetValuexExposureFactor

nAnnualizedRateofOccurrence(ARO)–representsestimatedfrequencyinwhichthreatwilloccurwithinoneyear

nAnnualizedLossExpectancy(ALE)–Annuallyexpectedfinancialloss

ALE=SLExARO

RiskAnalysis

nRiskanalysisismorecomprehensivethanaBusinessImpactAnalysis

nQuantitative–assignsobjectivenumericalvalues(dollars)

nQualitative–moreintangiblevalues(data)

nQuantitativeisamajorprojectthatrequiresadetailedprocessplan

PreliminarySecurityExamination(PSE)

nOftenconductedpriortothequantitativeanalysis.

nPSEhelpsgatherelementsthatwillbeneededforactualRA

RiskAnalysisSteps

1)Estimateofpotentialloss

2)Analyzepotentialthreats

3)DefinetheAnnualizedLossExpectancy(ALE)

CategoriesofThreats

nDataClassification–maliciouscodeorlogic

nInformationWarfare–technicallyorientedterrorism

nPersonnel–Unauthorizedsystemaccess

nApplication/Operational–ineffectivesecurityresultsindataentryerrors

nCriminal–Physicaldestruction,orvandalism

nEnvironmental–utilityoutage,naturaldisaster

nComputerInfrastructure–Hardwarefailure,programerrors

nDelayedProcessing–reducedproductivity,delayedcollectionsprocessing

AnnualizedLossExpectancy(ALE)

nRiskanalysisshouldcontainthefollowing:

nValuationofCriticalAssets

nDetailedlistingofsignificantthreats

nEachthreatslikelihood

nLosspotentialbythreat

nRecommendedremedialsafeguards

Remedies

nRiskReduction-implementationofcontrolstoalterriskposition

nRiskTransference–getinsurance,transfercostofalosstoinsurance

nRiskAcceptance–Accepttherisk,absorbloss

QualitativeScenarioProcedure

nScenarioOriented

nListthethreatandthefrequency

nCreateexposureratingscaleforeachscenario

nScenariowrittenthataddresseachmajorthreat

nScenarioreviewedbybusinessusersforrealitycheck

nRiskAnalysisteamevaluatesandrecommendssafeguards

nWorkthrougheachfinalizedscenario

nSubmitfindingstomanagement

ValueAssessment

nAssetvaluationnecessarytoperformcost/benefitanalysis

nNecessaryforinsurance

nSupportssafeguardchoices

SafeguardSelection

nPerformcost/benefitanalysis

nCostsofsafeguardsneedtobeconsideredincluding

nPurchase,developmentandlicensingcosts

nInstallationcosts

nDisruptiontoproduction

nNormaloperatingcosts

CostBenefitAnalysis

ALE(PreControl)–ALE(PostControl)=Annualizedvalueofthecontrol

Levelofmanualoperations

nTheamountofmanualinterventionrequiredtooperatethesafeguard

nShouldnotbetoodifficulttooperate

Auditabili

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > PPT模板 > 自然景观

copyright@ 2008-2023 冰点文库 网站版权所有

经营许可证编号:鄂ICP备19020893号-2