CISSP Prepare Guide Notes.docx

上传人:b****5 文档编号:6874006 上传时间:2023-01-11 格式:DOCX 页数:143 大小:167.40KB
下载 相关 举报
CISSP Prepare Guide Notes.docx_第1页
第1页 / 共143页
CISSP Prepare Guide Notes.docx_第2页
第2页 / 共143页
CISSP Prepare Guide Notes.docx_第3页
第3页 / 共143页
CISSP Prepare Guide Notes.docx_第4页
第4页 / 共143页
CISSP Prepare Guide Notes.docx_第5页
第5页 / 共143页
点击查看更多>>
下载资源
资源描述

CISSP Prepare Guide Notes.docx

《CISSP Prepare Guide Notes.docx》由会员分享,可在线阅读,更多相关《CISSP Prepare Guide Notes.docx(143页珍藏版)》请在冰豆网上搜索。

CISSP Prepare Guide Notes.docx

CISSPPrepareGuideNotes

CISSPStudyNotesfromCISSPPrepGuide

ThesenoteswerepreparedfromtheTheCISSPPrepGuide:

MasteringtheTenDomainsofComputerSecuritybyRonaldL.Krutz,RussellDeanVines,EdwardM.Strozandarenotintendedtobeareplacementtothebook.

InadditiontotheCISSPPrepGuideIusedthefollowingresourcestopreparefortheexam:

nTheInformationSecurityManagementHandbook,FourthEditionbyMickiKrauseandHaroldF.Tipton

nTherevisedMichaelOverlynotes

nTheBosonQuestions#2and#3

nLotsofmisc.websites

nAndofcoursewww.cccure.org

GoodLuck!

JWG,CISSP

CISSPStudyNotesfromCISSPPrepGuide1

Domain1–SecurityManagementPractices2

Domain2–AccessControlSystems7

Domain3–TelecomandNetworkSecurity13

Domain4–Cryptography34

Domain5–SecurityArchitectureandModels46

Domain6–OperationsSecurity56

Domain7–ApplicationsandSystemDevelopment63

Domain8–BusinessContinuityandDisasterRecoveryPlanning70

Domain9–Law,InvestigationandEthics78

Domain10–PhysicalSecurity87

Domain1–SecurityManagementPractices

TheBigThree-C.I.A.

nConfidentiality–Preventdisclosureofdata

nIntegrity–Preventmodificationofdata

nAvailability–Ensurereliabletimelyaccesstodata

OtherImportantConcepts

nIdentification–MeansinwhichuserclaimsIdentity

nAuthentication–EstablishestheusersIdentity

nAccountability–Systemsabilitytodetermineactionsofusers

nAuthorization–rightsandpermissionsgrantedtoanindividual

nPrivacy–Levelofconfidentialitythatauserisgiven

ObjectiveofSecurityistoreduceeffectsofthreatsandvulnerabilitiestoatolerablelevel.

RiskAnalysis

Assessthefollowing:

nImpactofthethreat

nRiskofthethreatoccurring(likelihood)

Controlsreduceboththeimpactofthethreatandthelikelihoodofthethreat,importantincostbenefitofcontrols.

DataClassification

nDataclassificationhashighlevelenterprisewidebenefit

nDemonstratesorganizationscommitmenttosecurity

nHelpsidentifysensitiveandvitalinformation

nSupportsC.I.A.

nMayberequiredforlegalregulatoryreasons

Dataownersareresponsiblefordefiningthesensitivitylevelofthedata.

GovernmentClassificationTerms:

nUnclassified–Neithersensitivenorclassified,publicreleaseisacceptable

nSensitiveButUnclassified(SBU)–Minorsecret,noseriousdamageifdisclosed

nConfidential–disclosurecouldcausedamagetoNationalSecurity

nSecret-disclosurecouldcauseseriousdamagetoNationalSecurity

nTopSecret–HighestLevel-disclosurecouldcauseexponentiallygravedamagetoNationalSecurity

InadditionmusthaveaNeedtoKnow–justbecauseyouhave“secret”clearancedoesnotmeanall“secret”datajustdatawithaneedtoknow.

AdditionalPublicClassificationTerms

nPublic–similartounclassified,shouldnotbedisclosedbutisnotaproblemifitis

nSensitive–dataprotectedfromlossofConfidentialityandintegrity

nPrivate–datathatispersonalinnatureandforcompanyuseonly

nConfidential–verysensitiveforinternaluseonly-couldseriouslynegativelyimpactthecompany

ClassificationCriteria

nValue-numberonecriteria,ifitisvaluableitshouldbeprotected

nAge–valueofdatalowersovertime,automaticde-classification

nUsefulLife–Iftheinformationismadeobsoleteitcanoftenbede-classified

nPersonalAssociation–Ifthedatacontainspersonalinformationitshouldremainclassified

Distributionmayberequiredintheeventofthefollowing:

nCourtOrder–mayberequiredbycourtorder

nGovernmentContracts–governmentcontractorsmayneedtodiscloseclassifiedinformation

nSeniorLevelApproval–seniorexecutivesmayapproverelease

InformationClassificationRoles

Owner

nMaybeexecutiveormanager

nOwnerhasfinalcorporateresponsibilityofthedataprotection

nMakesdeterminationofclassificationlevel

nReviewsclassificationlevelregularlyforappropriateness

nDelegatesresponsibilityofdataprotectiontotheCustodian

Custodian

nGenerallyITsystemspersonnel

nRunningregularbackupsandtestingrecovery

nPerformsrestorationwhenrequired

nMaintainsrecordsinaccordancewiththeclassificationpolicy

User

nAnyonetheroutinelyusesthedata

nMustfollowoperatingprocedures

nMusttakeduecaretoprotect

nMustusecomputingresourcesofthecompanyforcompanypurposesonly

PoliciesStandards,GuidelinesandProcedures

nPoliciesarethehighestlevelofdocumentation

nStandards,GuidelinesandProceduresderivedfrompolicies

nShouldbecreatedfirst,butarenomoreimportantthantherest

SeniorManagementStatement–generalhigh-levelstatement

nAcknowledgmentofimportanceofcomputingresources

nStatementofSupportforinformationsecurity

nCommitmenttoauthorizelowerlevelStandards,GuidelinesandProcedures

RegulatoryPolicies–companyisrequiredtoimplementduetolegalorregulatoryrequirements

nUsuallyverydetailedandspecifictotheindustryoftheorganization

nTwomainpurposes

nToensurethecompanyisfollowingindustrystandardprocedures

nTogivethecompanyconfidencetheyarefollowingindustrystandardprocedures

AdvisoryPolices–notmandatedbutstronglysuggested.

nCompanywantsemployeestoconsiderthesemandatory.

nAdvisoryPoliciescanhaveexclusionsforcertainemployeesorjobfunctions

InformativePolicies

nExistsimplytoinformthereader

nNoimpliedorspecifiedrequirements

Standards,GuidelinesandProcedures

nContainactualdetailofthepolicy

nHowthepoliciesshouldbeimplemented

nShouldbekeptseparatefromoneanother

nDifferentAudiences

nSecurityControlsaredifferentforeachpolicytype

nUpdatingthepolicyismoremanageable

Standards-Specifyuseoftechnologyinauniformway,compulsory

Guidelines–similartostandardsbutnotcompulsory,moreflexible

Procedures–Detailedsteps,required,sometimescalled“practices”,lowestlevel

Baselines–baselinesaresimilartostandards,standardscanbedevelopedafterthebaselineisestablished

RolesandResponsibilities

nSeniorManagement–Hasultimateresponsibilityforsecurity

nInfosecOfficer–Hasthefunctionalresponsibilityforsecurity

nOwner–Determinesthedataclassification

nCustodian-PreservesC.I.A.

nUser–Performsinaccordancewithstatedpolicy

nAuditor–ExaminesSecurity

RiskManagement

Mitigate(reduce)risktoalevelacceptabletotheorganization.

IdentificationofRisk

nActualthreat

nPossibleconsequences

nProbablefrequency

nLikelyhoodofevent

RiskAnalysis

nIdentificationofrisks

nBenefit-costjustificationofcountermeasures

RiskAnalysisTerms

nAsset–Resource,product,data

nThreat–Actionwithanegativeimpact

nVulnerability–Absenceofcontrol

nSafeguard–Controlorcountermeasure

ExposureFactor

%ofassetlosscausedbythreat

nSingleLossExpectancy(SLE)–Expectedfinanciallossforsingleevent

SLE=AssetValuexExposureFactor

nAnnualizedRateofOccurrence(ARO)–representsestimatedfrequencyinwhichthreatwilloccurwithinoneyear

nAnnualizedLossExpectancy(ALE)–Annuallyexpectedfinancialloss

ALE=SLExARO

RiskAnalysis

nRiskanalysisismorecomprehensivethanaBusinessImpactAnalysis

nQuantitative–assignsobjectivenumericalvalues(dollars)

nQualitative–moreintangiblevalues(data)

nQuantitativeisamajorprojectthatrequiresadetailedprocessplan

PreliminarySecurityExamination(PSE)

nOftenconductedpriortothequantitativeanalysis.

nPSEhelpsgatherelementsthatwillbeneededforactualRA

RiskAnalysisSteps

1)Estimateofpotentialloss

2)Analyzepotentialthreats

3)DefinetheAnnualizedLossExpectancy(ALE)

CategoriesofThreats

nDataClassification–maliciouscodeorlogic

nInformationWarfare–technicallyorientedterrorism

nPersonnel–Unauthorizedsystemaccess

nApplication/Operational–ineffectivesecurityresultsindataentryerrors

nCriminal–Physicaldestruction,orvandalism

nEnvironmental–utilityoutage,naturaldisaster

nComputerInfrastructure–Hardwarefailure,programerrors

nDelayedProcessing–reducedproductivity,delayedcollectionsprocessing

AnnualizedLossExpectancy(ALE)

nRiskanalysisshouldcontainthefollowing:

nValuationofCriticalAssets

nDetailedlistingofsignificantthreats

nEachthreatslikelihood

nLosspotentialbythreat

nRecommendedremedialsafeguards

Remedies

nRiskReduction-implementationofcontrolstoalterriskposition

nRiskTransference–getinsurance,transfercostofalosstoinsurance

nRiskAcceptance–Accepttherisk,absorbloss

QualitativeScenarioProcedure

nScenarioOriented

nListthethreatandthefrequency

nCreateexposureratingscaleforeachscenario

nScenariowrittenthataddresseachmajorthreat

nScenarioreviewedbybusinessusersforrealitycheck

nRiskAnalysisteamevaluatesandrecommendssafeguards

nWorkthrougheachfinalizedscenario

nSubmitfindingstomanagement

ValueAssessment

nAssetvaluationnecessarytoperformcost/benefitanalysis

nNecessaryforinsurance

nSupportssafeguardchoices

SafeguardSelection

nPerformcost/benefitanalysis

nCostsofsafeguardsneedtobeconsideredincluding

nPurchase,developmentandlicensingcosts

nInstallationcosts

nDisruptiontoproduction

nNormaloperatingcosts

CostBenefitAnalysis

ALE(PreControl)–ALE(PostControl)=Annualizedvalueofthecontrol

Levelofmanualoperations

nTheamountofmanualinterventionrequiredtooperatethesafeguard

nShouldnotbetoodifficulttooperate

AuditabilityandAccountability

Safeguardmustallowforauditabilityand

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 人文社科

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1