Cisspcertified Information Systemssecurity Professionalcopyright 2 ✓ Solved

CISSP Certified Information Systems Security Professional Used with permission. 1 CISSP Focus CISSP focuses on security: Design Architecture Theory Concept Planning Managing 2 Topical Domains Security and Risk Management Asset Security Security Architecture and Engineering Communication and Network Security Identity and Access Management (IAM) Security Assessment and Testing Security Operations Software Development Security 3 Exam Topic Outline Download the CISSP Exam Outline Previously known as the Candidate Information Bulletin 4 Prequalifications For taking the CISSP exam: 5 years full-time paid work experience Or, 4 years experience with a recent college degree Or, 4 years experience with an approved security certification, such as CAP, CISM, CISA, Security+, CCNA Security, MCSA, MCSE, and GIAC Or, Associate of (ISC)2 if you don’t yet have experience Agree to (ISC)2 Code of Ethics 5 CISSP Exam Overview CISSP-CAT (Computerized Adaptive Testing) Minimum 100 questions Maximum 150 questions 25 unscored items mixed in 3 hours to take the exam No score issues, just pass or fail Must achieve “passing standard†for each domain within the last 75 questions seen 6 Exam Retakes Take the exam a maximum of 3 times per 12-month period Wait 30 days after your first attempt Wait an additional 90 days after your second attempt Wait an additional 180 days after your third attempt You will need to pay full price for each additional exam attempt.

7 Question Types Most questions are standard multiple choice with four answer options with a single correct answer Some questions require to select two, select three, or select all that apply Some questions may be based on a provided scenario or situation Advanced innovative questions may require drag-and-drop, hot-spot, or re-order tasks 8 Exam Advice Work promptly, don’t waste time, keep an eye on your remaining time It is not possible to return to a question. Try to reduce/eliminate answer options before guessing Pay attention to question format and how many answers are needed Use the provided dry-erase board for notes 9 Updates and Changes As updates, changes, and errata are need for the book, they are posted online at: Visit and write in the corrections to your book!

10 Exam Prep Recommendations Read each chapter thoroughly Research each practice question you get wrong Complete the written labs View the online flashcards Use the 6 online bonus exams to test your knowledge across all of the domains Consider using: (ISC)² CISSP Official Practice Tests, 2nd Edition (ISBN: Completing Certification Endorsement A CISSP certified individual in good standing Within 90 days of passing the exam After CISSP, consider the post-CISSP Concentrations: Information Systems Security Architecture Professional (ISSAP) Information Systems Security Management Professional (ISSMP) Information Systems Security Engineering Professional (ISSEP) 12 Book Organization 1/2 Security and Risk Management Chapters 1-4 Asset Security Chapter 5 Security Architecture and Engineering Chapters 6-10 Communication and Network Security Chapters Book Organization 2/2 Identity and Access Management (IAM) Chapters 13-14 Security Assessment and Testing Chapter 15 Security Operations Chapters 16-19 Software Development Security Chapters Study Guide Elements Exam Essentials Chapter Review Questions Written Labs Real-World Scenarios Summaries 15 Additional Study Tools Electronic flashcards Glossary in PDF Bonus Practice Exams: 6x 150 question practice exams covering the full range of domain topics 16 Chapter 1 Security Governance Through Principles and Policies Understand and Apply Concepts of Confidentiality, Integrity, and Availability CIA Triad AAA Services Protection Mechanisms overview CIA Triad Confidentiality Integrity Availability Confidentiality Sensitivity Discretion Criticality Concealment Secrecy Privacy Seclusion Isolation Integrity 1/3 Preventing unauthorized subjects from making modifications Preventing authorized subjects from making unauthorized modifications Maintaining the internal and external consistency of objects Integrity 2/3 Accuracy: Being correct and precise Truthfulness: Being a true reflection of reality Authenticity: Being authentic or genuine Validity: Being factually or logically sound Nonrepudiation: Not being able to deny having performed an action or activity or being able to verify the origin of a communication or event Integrity 3/3 Accountability: Being responsible or obligated for actions and results Responsibility: Being in charge or having control over something or someone Completeness: Having all needed and necessary components or parts Comprehensiveness: Being complete in scope; the full inclusion of all needed elements Availability Usability: The state of being easy to use or learn or being able to be understood and controlled by a subject Accessibility: The assurance that the widest range of subjects can interact with a resource regardless of their capabilities or limitations Timeliness: Being prompt, on time, within a reasonable time frame, or providing low latency response AAA Services Identification Authentication Authorization Auditing Accounting/ Accountability Protection Mechanisms Layering/Defense in Depth Abstraction Data Hiding Security through obscurity Encryption Evaluate and Apply Security Governance Principles Alignment of Security Function Security Management Plans Organizational Processes Change Control/Management Data Classification Organizational Roles and Responsibilities Security Control Frameworks Due Care and Due Diligence overview Alignment of Security Function Alignment to Strategy, Goals, Mission, and Objectives Security Policy Based on business case Top-Down Approach Senior Management Approval Security Management: InfoSec team, CISO, CSP, ISO Security Management Plans Strategic Tactical Operational Organizational Processes Security governance Acquisitions and divestitures risks: Inappropriate information disclosure Data loss Downtime Failure to achieve sufficient return on investment (ROI) Change Control/ Management 1/2 Implement changes in a monitored and orderly manner.

Changes are always controlled. A formalized testing process is included to verify that a change produces expected results. All changes can be reversed (also known as backout or rollback plans/procedures). Users are informed of changes before they occur to prevent loss of productivity. Change Control/ Management 2/2 The effects of changes are systematically analyzed to determine whether security or business processes are negatively affected.

The negative impact of changes on capabilities, functionality, and performance is minimized. Changes are reviewed and approved by a change approval board (CAB). Data Classification 1/2 Determines: effort, money, and resources Government/military vs. commercial/private sector Declassification Data Classification 2/2 1. Identify the custodian, define responsibilities. 2.

Specify the evaluation criteria. 3. Classify and label each resource. 4. Document any exceptions.

5. Select the security controls for each level. 6. Specify declassification and external transfer. 7.

Create an enterprise-wide awareness program. Organizational Roles and Responsibilities Senior Manager Security Professional Data Owner Data Custodian User Auditor Security Control Frameworks COBIT (see next slide) Used to plan the IT security of an organization and as a guideline for auditors Information Systems Audit and Control Association (ISACA) Open Source Security Testing Methodology Manual (OSSTMM) ISO/IEC 27001 and 27002 Information Technology Infrastructure Library (ITIL) Control Objectives for Information and Related Technologies (COBIT) Principle 1: Meeting Stakeholder Needs Principle 2: Covering the Enterprise End-to-End Principle 3: Applying a Single, Integrated Framework Principle 4: Enabling a Holistic Approach Principle 5: Separating Governance From Management Due Care and Due Diligence Due care is using reasonable care to protect the interests of an organization.

Due diligence is practicing the activities that maintain the due care effort. Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines Security Policies Security Standards, Baselines, and Guidelines Security Procedures overview Security Policies Defines the scope of security needed by the organization Organizational, issue-specific, system-specific Regulatory, advisory, informative Security Standards, Baselines, and Guidelines Standards define compulsory requirements Baselines define a minimum level of security Guidelines offer recommendations on how standards and baselines are implemented Security Procedures Standard operating procedure (SOP) A detailed, step-by-step how-to To ensure the integrity of business processes Understand and Apply Threat Modeling Concepts and Methodologies Threat Modeling Identifying Threats Threat Categorization Schemes Determining and Diagramming Potential Attacks Performing Reduction Analysis Prioritization and Response overview Threat Modeling Microsoft’s Security Development Lifecycle (SDL) “Secure by Design, Secure by Default, Secure in Deployment and Communication†(also known as SD3+C) Proactive vs. reactive approach Identifying Threats Focused on Assets Focused on Attackers Focused on Software Threat Categorization Schemes STRIDE Process for Attack Simulation and Threat Analysis (PASTA) Trike Visual, Agile, and Simple Threat (VAST) STRIDE Spoofing Tampering Repudiation Information disclosure Denial of service Elevation of privilege PASTA 1/2 Stage I: Definition of the Objectives (DO) for the Analysis of Risks Stage II: Definition of the Technical Scope (DTS) Stage III: Application Decomposition and Analysis (ADA) Stage IV: Threat Analysis (TA) Stage V: Weakness and Vulnerability Analysis (WVA) Stage VI: Attack Modeling and Simulation (AMS) Stage VII: Risk Analysis and Management (RAM) PASTA 2/2 Determining and Diagramming Potential Attacks Diagram the infrastructure Identify data flow Identify privilege boundaries Identify attacks for each diagrammed element Diagramming to Reveal Threat Concerns Performing Reduction Analysis Decomposing Trust boundaries Data flow paths Input points Privileged operations Details about security stance and approach Prioritization and Response Probability à— Damage Potential ranking High/medium/low rating DREAD system Damage potential Reproducibility Exploitability Affected users Discoverability Apply Risk-Based Management Concepts to the Supply Chain Resilient integrated security Cost of ownership Outsourcing Integrated security assessments Monitoring and management On-site assessment Document exchange and review Process/policy review Third-party audit (AICPA SOC1 and SOC2) Conclusion Read the Exam Essentials Review the Chapter Perform the Written Labs Answer the Review Questions

Paper for above instructions

Understanding the CISSP Framework: An Overview and Study Guide


The Certified Information Systems Security Professional (CISSP) certification is regarded as one of the most prestigious credentials in the field of information security. Offered by (ISC)², the CISSP certification signifies that an individual has a deep understanding of various security principles and practices. This essay delves into the key elements of the CISSP certification, including its relevant domains, requirements, and exam preparation strategies. By the end of this discussion, readers should have a comprehensive overview of the CISSP framework and how to succeed in obtaining this valuable certification.

CISSP Domains


The CISSP certification is structured around eight core domains of knowledge. These domains encompass all aspects of information security and provide a holistic view of security practices (Stallings & Brown, 2012). The domains include:
1. Security and Risk Management: This domain covers the principles of confidentiality, integrity, and availability (CIA triad), security governance, and regulatory compliance. It sets the foundation for understanding how security fits into the overall business strategy.
2. Asset Security: This involves classifying and managing information and assets based on their value to the organization. Organizations must determine the best practices for data classification and identify appropriate protections for data (Gollmann, 2011).
3. Security Architecture and Engineering: This domain focuses on designing robust security architectures using various frameworks and models. It includes considerations for both hardware and software security and emphasizes the application of best practices.
4. Communication and Network Security: This area entails securing networks and communication channels, employing various technologies like firewalls, VPNs, and intrusion detection systems (Farkas, 2016).
5. Identity and Access Management (IAM): This domain covers the principles of identity management, authentication, and access controls to ensure that only authorized individuals can access resources.
6. Security Assessment and Testing: It involves evaluating the security posture of an organization through various assessments and tests, such as penetration testing and vulnerability assessments (Oppenheimer, 2016).
7. Security Operations: This domain addresses the day-to-day activities required to maintain the security posture of an organization, including incident response and logging.
8. Software Development Security: This area focuses on securing software development practices and the security considerations that need to be applied throughout the software lifecycle (Schneier, 2015).

Prerequisites for CISSP


To qualify for the CISSP examination, candidates must demonstrate significant expertise in the field of information security. This includes at least five years of full-time paid work experience in at least two of the eight CISSP domains (Alexander & Tate, 2015). Alternatively, candidates can substitute one year of experience with a relevant degree or an accepted certification. Additionally, candidates must pledge to uphold the (ISC)² Code of Ethics, ensuring a commitment to professionalism in their work.

The CISSP Examination


The CISSP exam is adaptive, incorporating a unique format known as Computerized Adaptive Testing (CISSP-CAT) (Weber, 2018). Candidates answer a minimum of 100 questions and a maximum of 150 within a three-hour timeframe. The exam comprises multiple-choice questions, scenario-based questions, as well as innovative question formats. The overall scoring is pass/fail, and candidates must achieve a satisfactory standard across each domain evaluated in the last 75 questions.
Retesting protocols are stringent, allowing candidates to attempt the examination a maximum of three times in a rolling period of twelve months (Mason, 2019). Candidates must wait 30 days after their first attempt, an additional 90 days for the second, and 180 days for the third attempt.

Study Recommendations


Effective preparation is critical for success in the CISSP exam.
1. Comprehensive Reading: Candidates should thoroughly read materials covering each of the CISSP domains. Recommended resources include the "CISSP Official Study Guide" and "CISSP Official Practice Tests" provided by (ISC)².
2. Practice Questions: Engaging with practice questions helps foster a deeper understanding of the material. Analyzing incorrect answers is crucial for mastering the concepts (Kirkpatrick, 2019).
3. Online Flashcards: Utilizing electronic flashcards provides interactive reinforcement of key terms and definitions.
4. Written Labs: Participating in lab exercises can help reinforce theoretical knowledge through practical application.
5. Bonus Exams: Take advantage of any offered bonus exams to assess readiness and practice under exam conditions.
6. Time Management: Candidates must develop effective time management strategies while taking the exam to ensure they can navigate through all questions without panicking (Imran, 2020).

Conclusion


Achieving the CISSP certification is a significant milestone for professionals pursuing a career in cybersecurity. By understanding the certification's framework, domains, and preparation strategies, candidates can position themselves effectively for passing the exam. The CISSP not only validates an individual's expertise but also enhances their career opportunities in an increasingly demanding job market.
---

References


1. Alexander, C., & Tate, P. (2015). CISSP: Certified Information Systems Security Professional Study Guide. Wiley.
2. Farkas, Z. (2016). Communication and Network Security: CISSP and Security focus. Pearson.
3. Gollmann, D. (2011). Computer Security. Wiley.
4. Imran, A. (2020). Mastering the CISSP Study Guide. Packt Publishing.
5. Kirkpatrick, B. (2019). CISSP Practice Exams. McGraw-Hill Education.
6. Mason, K. (2019). Navigate the CISSP Exam: Strategies for Success. Academic Press.
7. Oppenheimer, P. (2016). Security Assessment and Testing for the CISSP. Syngress.
8. Schneier, B. (2015). Secrets and Lies: Digital Security in a Networked World. Wiley.
9. Stallings, W., & Brown, L. (2012). Computer Security: Principles and Practice. Pearson.
10. Weber, R. (2018). CISSP Study Guide: A Comprehensive Guide. Syngress Publications.