CISSP Study Guide
CISSP Study Guide
CISSP Study Guide
Controls
2.
Security Definitions
1.
2. 3. 4. 5.
Security Model
Categories of Risk
*CISSP looks at in this order because you have a threat but unless you are exposed to it, it is not really a vulnerability. If you have a vulnerability then you apply the right countermeasure to reduce the risk Top Down Approach - Security program should use a top down approach, meaning that the initiation, support, and direction come from top mgmt and work their way through middle mgmt and then to staff members. Top down approach makes sure that the people responsible for protecting the companies assets are driving the program. Steps 1. Process should start with very broad terms and ideas that work its way down to detailed configuration settings (Security Policy) 2. Develop and implement procedures, standards, and guidelines that support the security policy 3. Increase granularity by developing standards and configurations for the chosen security controls and methods. Bottom-up Approach If the IT dept tried to develop a security program without getting proper mgmt support and approval. Usually less effective, not broad enough, and doomed to fail. - A framework made up of many entities, protection mechanisms, logical and physical components, procedures, and configurations that all work together in synergistic way to provide a security level for an environment. - Each model is different, but all models work in layers: one layer providing support the layer above it and protection for the layer below it. - Goal of a security model is assurance, which is the sum total of all security components within an environment that provide a level of confidence. - Security model a company chooses depends on the type of business, its critical missions, and objectives. Goals: 1. Operational Goals Are daily goals, which focus on productivity and task orient activities. 2. Tactical Goals Mid term goals take more time and effort to complete. 3. Strategic Goals Long term goals. This approach to planning is called the Planning Horizon Assurance degree of confidence that a certain security level is being provided. - Security model an org chooses depends on its critical missions and business requirements. Private Industry Out of the AIC triad data integrity and availability usually rank higher. Military Org. Confidentiality ranks the highest. Def. the process of identifying, assessing, and reducing this risk to an acceptable level and implementing the right mechanisms to maintain that level of risk. Goal is to assess risks and threats occurring and then reducing the overall level of risk to what the org identifies as acceptable and maintaining that level. 1. Physical damage fire, water, vandalism, power loss, and natural disasters. 2. Human error accidental or intentional action or inaction that can disrupt productivity. 3. Equipment malfunction failure of systems and peripheral devices 4. Inside and outside attacks Hacking, cracking, and attacking
Risk Analysis
Identifying threats
Quantitative Approach
Countermeasure Selection
Security Policy
Types of Policies: 1. Regulatory ensure that the org is following standards set by a specific industry and is regulated by law. 2. Advisory Written to strongly suggest certain types of behaviors and activities that should take place within the org and consequences. 3. Informative Written to inform employees of certain topics. Not enforceable. *Policies are broad overview terms to cover many subjects in a general fashion. PROVIDES THE FOUNDATION, procedures, standards, and guidelines provide the security framework. Def. Specify how HW and SW products are to be used, expected user behavior. Also ensure specific technologies, applications, parameters, and procedures are carried out in a uniformed way across the org. Standards, guidelines, and procedures are the tactical goals. Policies are the strategic goals. Def provides the minimum level of security necessary throughout the Org. Most of the time, baselines are platform unique security implementations. Def Recommended actions and operational guides to users, IT staff, operations staff, and others when a specific standard does not apply. Standards are mandatory rules, Guidelines are general approaches (cover gray areas) that provide the necessary flexibility for unforeseen circumstances. Def detailed step-by-step tasks that should be performed to achieve a certain security goal. Lowest level in policy chain b/c they are closest to the computers and users and provide detailed steps for config and installation issues. Spell out how policy, standards, and guidelines will be implemented. Should be detailed enough to be able to be understood and used by a diverse group of individuals. Due Diligence act of investigating and understanding the risks the company faces. Understanding the current threats and risks. Due Care Shows a company has taken responsibility for the activities that take place within the Corp. A company shows by developing security policies, procedures, and standards and implementing countermeasures. Purpose to indicate the level of confidentiality, integrity, and availability that is required for each type of info. Also helps to ensure that data is protected in the most cost effective manner. Each sensitivity classification should have separate handling requirements and procedures pertaining to how that data is accessed, used, and destroyed. Private Business Classifications: 1. Confidential 2. Private 3. Sensitive 4. Public Military Classifications: 1. Top Secret 2. Secret 3. Confidential 4. Sensitive but unclassified 5. Unclassified 1. Identify data custodian who will be responsible for maintaining data and its security level. 2. Specify the criteria that will determine how data is classified 3. The data owner must indicate the classification of the data they are responsible for. 4. Indicate the security controls that are required for each classification level. 5. Document any exceptions to the previous classification issues. 6. Indicate the methods that can be used to transfer custody of the info to a different data owner. 7. Indicate termination procedures for declassifying the data. 8. Integrate these issues into the security awareness program so that all employees understand
Standards
Baselines Guidelines
Procedures
Information Classification
Data Custodian
Security Awareness
2. Access Control
Topic Access Controls Description Def Security features that control how users and systems communicate and interact with other systems and resources. Protect the systems and resources from unauthorized access. Extremely Imortant b/c it is one of first lines of defense used to fight against unauthorized access to systems and network resources.
3 Security Principals
Biometrics
Password Mgmt
One-time Passwords
Passphrase
Access Criteria
Need-to-Know Principle
Single Sign-on
SESAME
DAC
MAC
RBAC
Administrative
Physical Controls
Technical Controls
Keystroke Monitoring
Object Reuse
Tempest
White Noise
IDS
Honeypot
Network Sniffer
Dictionary Attack
Spoofing at Logon
Penetration Testing
Memory Mapping
Protection Rings
Process Activity
System Architecture
TCB
Security Perimeter
Domains
Resource Isolation
Multilevel Security Policies Least Privilege Layering, Data Hiding, and Abstraction
Relationship b/t a Security policy and Security Model State Machine Models
Bell-Lapadula Model
Biba Model
Clark-Wilson Model
Brewer and Nash model Graham-Denning model Harrison-Ruzzo-Ullman model 4 Security Modes of Operation
Orange Book
D1 C1 & C2
B1, B2, B3
A1
ITSEC
Common Criteria
7799 Standards
Cover Channels
Backdoors
Asynchronous Attack
Buffer Overflows
4. Physical Security
Topic Physical Security Description The first line of defense against environmental risks and unpredictable human behavior. Implemented in a layered defense model with controls working together in a tiered architecture.
Construction
Electronic Access Control tokens used in physical security to authenticate subjects. Can be proximity readers, programmable locks, or biometric systems. First the value of property w/in the facility and the value of the facility itself need to be ascertained to determine the proper budget for physical security so that controls can be cost effective. Value can be determined by doing a critical path analysis. Critical path analysis lists all pieces of an environment and how they interact and are interdependent. The pat for critical business functionality. Redundant paths should be in use for every critical path. Consider crime, natural disaster possibilities, and distance to hospitals, police/fire stations, airports, and railroads. Behind hills limits electrical transmissions No or very little signage. Physical construction material and structure composition need to be evaluated for their protective characteristics (fire protection which is fire rating), utility, and costs/benefits. Load of a buildings walls, floors, and ceilings need to be estimated and projected to ensure that the building will not collapse. Major Items that need to be addressed: 1. Walls Combustibility of material Fire rating Reinforcements for secured areas 2. Doors Combustibility of material Fire rating Resistance to forcible entry Emergency marking Placement Alarms Type of glass shatterproof or bulletproof Electronic door locks that revert to a disable state for safe Evac in power outages.
Facility Components
Power protection
Environmental Issues
When clean power is being used it means that the power supply contains no interferences or voltage fluctuations. Types of Interference or line noise 1. EMI Electromagnetic interface Created by the difference b/t 3 wires: Hot, neutral, and ground. Lightning and electrical motors can induce EMI. 2. RFI Radio Frequency Interface Created by the components of an electrical system such as electrical cables and fluorescent lighting. 1. Power Excess Spike Momentary high voltage Surge Prolonged high voltage protected by surge protectors 2. Power loss Fault Momentary power out Blackout Prolonged loss of power voltage drops to zero 3. Power degradation Sag/Dip Momentary low voltage Brownout Prolonged power supply that is below normal voltage On a power line takes place when electrical interference is superimposed onto the power line. Voltage regulators and line conditioners used to ensure a clean and smooth distribution of power Shut down devices in an orderly fashion Do not have devices or media around powerful magnetic lines, energized conductors, or circuits that could create magnetic fields Use shielded lines to protect form magnetic induction Shield long cable runs Use 3 prong connection and adapters if using 2 prong cables 1. Pre-employment Screening Check references employment/education Character eval Background/drug check 2. Employee Maintenance Periodic reviews Reeval security clearances Supervisor updates and recommendations Job rotation Separation of duties 3. Post-employment Friendly termination Exit interview Escorting from facility Locking and removing computer accounts Recover company property Maintain appropriate temperature/humidity High humidity can cause corrosions and low humidity can cause excessive static electricity Humidity of 45 60 percent is acceptable for areas processing data Low temps can cause mechanisms to slow down/stop and high temps cause devices to use too much fan power and eventually shut down
Ventilation
Flame Activated
Fire suppression
Water Sprinklers
Perimeter security
Locks
Fencing
Lighting
Doorways
Presentation Layer
Session layer
Transport layer
Network Layer
Datalink Layer
Physical layer
TCP/IP
Ports
Asynchronous and
Network Topologies
Ethernet
Token Ring
FDDI
Cabling
3 Cabling Problems
Polling
ARP/RARP
Firewalls
Packet Filter
Stateful Inspection
Proxy FW
Kernel Proxy
Shoulds of FWs
NOS
DNS
Directory Service
Extranet MANs
WAN Technolgies
Mulitservice Access H.323 Gateways ISDN (Integrated Services Digital Network) Implementation DSL
PPP
RAID
FHSS
DSSS
Wireless Standards
WAP
WLAN Components
Terminology
Goals of Cryptosystems
Types of Ciphers
Steganography
Symmetric Algorithms
Asymmetric Algorithms
Block Cipher
Stream Cipher
DES
3DES
IDEA
Blowfish
RC5
RSA
One-Way Function
El Gamal ECC
Session Key
PKI
Certificates
Message Integrity
Digital Signatures
DSS
One-time Pad
HTTP
S-HTTP
HTTPS SSL
SET
Cookies
SSH
IPSec
Attacks
Ciphertext-Only Attack
Chosen-Ciphertext Attack
Adaptive Attacks
Man-in-the-Middle Attack
Dictionary Attacks
Replay attack
Remote Journaling
Points
Salami Attack
Excessive Privileges
Denial of Service
Dumpster Diving
Due Care
Due Diligence
3 Types of Laws
Civil Law
Administrative/Regulatory Law
Criminal Law
Trade Secret
Copyright
Trademark Patent
Chain of Custody
Incident Handling
Hearsay
Lifecycle of evidence
Best Evidence
Secondary Evidence
Opinion Evidence
Surveillance
Exigent Circumstances Enticement and Entrapment Import and Export Laws Privacy
HIPAA GLBA
Environment vs. Application Controls Complexity of functionality Data types, format and length
Failure States
DB Mgmt
DB Jargon
Hierarchical DB model
Distributed DB model
DB Interface Languages
Core Functionalities of DB
Data Dictionary
Integrity
DB views
Polyinstantiation
OLTP
Mgmt of Development
Project Initiation
Risk mgmt
Risk Analysis
Software Development
Installation/Implementation
SW development Methods
Change Control
Polymorphism
SW Architecture
Data Structure
CASE
Prototyping
ODBC OLE
DDE DCE
Java
Java Security
ActiveX
Malicious SW or Malware
Pseudo-flaw Virus
Worms
DoS
Smurf
Fraggle
SYN Flood
Teardrop
Secure DNS
Timing Attacks
Other
Clipping Levels
Transparency
Media Controls
System controls
Trusted Recovery
POP
IMAP
Supperzapping
Browsing
Session Hijacking
Operations Security