SlideShare a Scribd company logo
1 of 76
CISSP CERTIFIED - THE EASY
WAY
LESSONS FROM A NEWLY MINTED CISSP
CLASS OVERVIEW
• 8 domains used to be 10
• This makes the test more streamlined and I say easier
• Less questions per domain
• More “real-world” questions- because the domains overlap, the
questions tend to be more real-world
• ALL the questions, except the Crypto questions, are non-technical –
Always remember “how would your CIO answer”
LESSON 1
SECURITY AND RISK MANAGEMENT
•Confidentiality, integrity, and availability concepts - Know CIA by Heart
•Security governance principles – Oversight and ITIL will help you out here
•Compliance, Legal and Regulatory Issues – SOX and Regulatory Guidelines – There will be
“memorization” questions on the test
•Professional ethics – Know the ISC2 code by heart
•Security policies, standards, procedures and guidelines – be sure and know how these differ in
an organization, what is “suggested” vs. “mandatory”
LESSON 2
ASSET SECURITY
• Information and asset classification – Know all the layers of public and
government data classification i.e. Confidential, private…etc
• Ownership (e.g. data owners, system owners) – Quite a few questions on the
test concerning “who can change data, who can class it”
• Protect privacy
• Appropriate retention – a few questions on data destruction
• Data security controls – You will see questions regarding shipping and Chain
of Custody
• Handling requirements (e.g. markings, labels, storage)
LESSON 3
SECURITY ENGINEERING
•Engineering processes using secure design principles
•Security models, evaluations and capabilities fundamental concepts
•Security architectures, designs, and solution elements vulnerabilities
•Web-based systems vulnerabilities – Know sql injection vs <script> vs Cross Site
•Mobile systems vulnerabilities – Know all the “blue” words. Jacking, smacking, snarfing
•Embedded devices and cyber-physical systems vulnerabilities
•Cryptography – The MOST Questions on the test. Public, Private, Nonrepudiation vs.
Plain Confidentiality
•Site and facility design secure principles – Know what hills, slopes and entrance design are
best
•Physical security – Fence, light height, man traps, desk check-in are likely to be on the test
LESSON 4
COMMUNICATION AND NETWORK
SECURITY
•Secure network architecture design (e.g. IP & non-IP protocols, segmentation) – Firewall and
DMZ questions appear on the test
•Secure network components
•Secure communication channels – Encryption like TLS vs SSL all the way to which way to point
Satellite Dishes
•Network attacks – Know ping of death, tear drop, and every other DOS attack
LESSON 5
IDENTITY AND ACCESS MANAGEMENT
•Physical and logical assets control – Bar coding and Inventory tagging
•Identification and authentication of people and devices
•Identity as a service (e.g. cloud identity) - – Know SAML definition
•Third-party identity services (e.g. on premise) – AD Questions and How passwords are stored
•Access control attacks – Know brute-force attacks and everyway to log on as someone else
•Identity and access provisioning lifecycle (e.g. provisioning review) – This is a memorization exercise
LESSON 6
SECURITY ASSESSMENT AND TESTING
• Assessment and test strategies – Know what kind of testing and
test cases help security
• Security process data (e.g. management and operational
controls)
• Security control testing
• Test outputs (e.g. automated, manual)
• Security architectures vulnerabilities
LESSON 7
SECURITY OPERATIONS
• Investigations support and requirements
• Foundational security operations concepts
• Resource protection techniques
• Incident management – Know the incident management life cycle
• Patch and vulnerability management – Know your Patch management life cycle.
• Change management processes
• Recovery strategies – Know DR sites, Hot, Cold..etc.
• Disaster recovery processes and plans
• Business continuity planning and exercises – Know the BCP lifecycle, know what steps are
not in it
• Personnel safety concerns
LESSON 8
SOFTWARE DEVELOPMENT SECURITY
• Security in the software development lifecycle – Know the rings
and how they work
• Development environment security controls
• Software security effectiveness – know what stops <Script> and
injection attacks
• Acquired software security impact – Know shrink-wrap vs.
malicious attacks vs. purposeful backdoors
THANK YOU
• On to Lesson 1…
LESSON 1
SECURITY AND RISK MANAGEMENT
•Confidentiality, integrity, and availability concepts - Know CIA by Heart
•Security governance principles – Oversight and ITIL will help you out here
•Compliance, Legal and Regulatory Issues – SOX and Regulatory Guidelines
– There will be “memorization” questions on the test
•Professional ethics – Know the ISC2 code by heart
•Security policies, standards, procedures and guidelines – be sure and know
how these differ in an organization, what is “suggested” vs. “mandatory”
CONFIDENTIALITY, INTEGRITY, AND
AVAILABILITY
• Often times called the Security Triad
• Confidentiality: Has everything to do with Encryption
• Integrity: Keeping the data from being altered
• Availability: Keeping the systems up and available
Real World Resource: https://www.cccure.org/
CONFIDENTIALITY
• Types
• Symmetric
• Asymmetric
• Strength
• Bits
• PKI – You will only need to know root CAs
Real World Resource: http://www.mindcert.com/category/mind-
maps/cissp/
INTEGRITY
• The data was not altered in any way
• Hashing
• MD5
• SHA-1
Real World Resource: http://www.mindcert.com/category/mind-
maps/cissp/
AVAILABILITY
• The Site and the Servers are always up
• Site Level Redundancy
• Hot
• Cold
• Warm
• Reciprocal
• Raid Level – Know all of these.
https://en.wikipedia.org/wiki/Standard_RAID_levels
http://www.corexchange.com/blog/disaster-recovery-hot-warm-cold-sites-
key-differences
GOVERANCE, LEGAL AND ETHICS
• Spend a weekend and get ITIL Certified
• Memorize the ISC2 code of ethics
• Protect society, the commonwealth, and the infrastructure
• Act honorably, honestly, justly, responsibly, and legally
• Provide diligent and competent service to principals
• Advance and protect the profession
Visit the following site for the complete mind map for law, ethics and
regulations:
http://www.mindcert.com/category/mind-maps/cissp/
POLICIES ETC.…
• Thank you…On to Lesson 2
LESSON 2
ASSET SECURITY
• Information and asset classification – Know all the layers of public and
government data classification i.e. Confidential, private…etc
• Ownership (e.g. data owners, system owners) – Quite a few questions on the
test concerning “who can change data, who can class it”
• Protect privacy
• Appropriate retention – a few questions on data destruction
• Data security controls – You will see questions regarding shipping and Chain
of Custody
• Handling requirements (e.g. markings, labels, storage)
INFORMATION CLASSIFICATION - PUBLIC
INFORMATION CLASSIFICATION -
GOVERNMENT
OWNERSHIP – ONLY HAVE TO KNOW TWO
•Data owner—Usually a member of senior management. After all, senior management is
responsible for the asset and, if it is compromised, can be held responsible. The data
owner can delegate some day-to-day duties but cannot delegate total responsibility;
senior management is ultimately responsible.
•Data custodian—This is usually someone in the IT department. The data custodian
does not decide what controls are needed, but he or she does implement controls on
behalf of the data owner. Other responsibilities include the day-to-day management of
the asset. Controlling access, adding and removing privileges for individual users, and
ensuring that the proper controls have been implemented are all part of the data
custodian’s daily tasks.
DATA SECURITY CONTROLS
• Marking, Labeling and Handling
• Data Security Controls – Shipping, Chain of Custody
• Don’t open boxes
• Data Destruction
• Tape Backup Security
• Thank you…on to Lesson 3
LESSON 3
SECURITY ENGINEERING
•Engineering processes using secure design principles
•Security models, evaluations and capabilities fundamental concepts
•Security architectures, designs, and solution elements vulnerabilities
•Web-based systems vulnerabilities – Know sql injection vs <script> vs Cross Site
•Mobile systems vulnerabilities – Know all the “blue” words. Jacking, smacking, snarfing
•Embedded devices and cyber-physical systems vulnerabilities
•Cryptography – The MOST Questions on the test. Public, Private, Nonrepudiation vs.
Plain Confidentiality
•Site and facility design secure principles – Know what hills, slopes and entrance design are
best
•Physical security – Fence, light height, man traps, desk check-in are likely to be on the test
SECURITY MODELS
SECURITY MODELS
• If the test ask about lattice – Clark Wilson
• Bell–LaPadula Model – “Rides Ugly White Donkeys”
• Everything else is opposite
WEB BASED VULNERABILITIES
• "CSRF is an attack which forces an end user to execute unwanted
actions on a web application in which he/she is currently
authenticated." – OWASP
• Remember when you don’t see <script>, its probably this attack, especially
when 2 sites are involved
• "Cross-Site Scripting (XSS) attacks are a type of injection, in which
malicious scripts are injected into otherwise benign and trusted web
sites." - OWASP
• Remember when you see <script>
• Remember that checking your inputs is the best defense to this or a SQL
injection
• XSS: http://example.com?variable=a'<script>alert(1)</script>
• CSRF:
http://example.com/changePassword?userID=1&newPassword=foob
MOBILE SYSTEM VULNERABILITIES
• BLUEJACKING
Think of it as a high-tech version of ding-dong-ditch, where savvy
pranksters push unsolicited messages to engage or annoy other
nearby Bluetooth users by taking advantage of a loophole in the
technology’s messaging options.
• BLUESNARFING
More damaging than bluejacking is bluesnarfing. With bluesnarfing,
thieves wirelessly connect to some early Bluetooth-enabled mobile
devices without the owner’s knowledge to download and/or alter
phonebooks, calendars or worse.
CRYPTOGRAPHY
• Non-Repudiation – Can’t deny it came from you. When you
digitally sign a message.
• Private key encryption, symmetric, uses the same key for both
encryption and decryption (Faster)(DES) – think winzip file with
a password
• Public key encryption (Slower)(RSA), asymmetric, uses the two
keys, private to encrypt, and public to decrypt.
CRYPTOGRAPHY
FACILITY DESIGN SPECIFICATIONS
• Remember what locks can be picked and what ones need to be
bumped
• Remember how high lights need to be
• Carefully review the following site for physical security review:
http://www.mindcert.com/category/mind-maps/cissp/
• Thank you…On to Lesson 4
LESSON 4
COMMUNICATION AND NETWORK
SECURITY
•Secure network architecture design (e.g. IP & non-IP protocols, segmentation) – Firewall and
DMZ questions appear on the test
•Secure network components
•Secure communication channels – Encryption like TLS vs SSL all the way to which way to point
Satellite Dishes
•Network attacks – Know ping of death, tear drop, and every other DOS attack
SECURE NETWORK DESIGN AND
COMPONENTS
• Bastion Host
• Exposed to the Internet
• Hardened – You expect and attack, its your front line
• Screened Subnet
• A Bastion Host between an internal and an external firewall
• MOST SECURE – Any questions asking that
• Proxy Server
• Can be used outbound or inbound to mask a client’s identity
SECURE NETWORK DESIGN AND
COMPONENTS
• Honeypots
• Lure bad people into doing bad things.
• Lets you watch them
• ONLY ENTICE, not ENTRAP. The difference is that you are not allowed to
let them download items with “Enticement”. If you stick a fake payroll file
out there, let them download it, then bust them, you have “Entrapped”
them. - Remember this
FIREWALLS
• STATELESS
• Stateless firewalls watch network traffic, and restrict or block packets based on source and destination
addresses or other static values. They are not 'aware' of traffic patterns or data flows. A stateless firewall
uses simple rule-sets that do not account for the possibility that a packet might be received by the
firewall 'pretending' to be something you asked for.
• STATEFUL
• Stateful firewalls can watch traffic streams from end to end. They are are aware of communication paths
and can implement various IP Security (IPsec) functions such as tunnels and encryption. In technical
terms, this means that stateful firewalls can tell what stage a TCP connection is in (open, open sent,
synchronized, synchronization acknowledge or established), it can tell if the MTU has changed, whether
packets have fragmented etc.
• Neither is really superior and there are good arguments for both types of firewalls.
Stateless firewalls are typically faster and perform better under heavier traffic loads.
Stateful firewalls are better at identifying unauthorized and forged communications.
IDS/IPS
•Intrusion Detection System
• A device or application that analyzes whole packets, both header and payload, looking for known events. When a known
event is detected a log message is generated detailing the event.
•Intrusion Prevention System
• A device or application that analyzes whole packets, both header and payload, looking for known events. When a known
event is detected the packet is rejected.
Secure Communication Channels
• There are going to be a few questions on communication
channels security.
• For Satellite Dish technology , I recommend watching:
http://resources.infosecinstitute.com/hacking-satellite-look-up-to-
the-sky/
• For TLS/SSL, you simply have to remember that TLS is newer than SSL
NETWORK ATTACKS (DDOS MOSTLY)
• SYN Flood
• A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN
requests to a target's system in an attempt to consume enough server resources to make the
system unresponsive to legitimate traffic.
• Fraggle Attack
• A Fraggle Attack is a denial-of-service (DoS) attack that involves sending a large amount of
spoofed UDP traffic to a router's broadcast address within a network. It is very similar to a Smurf
Attack, which uses spoofed ICMP traffic rather than UDP traffic to achieve the same goal.
• Land Attack
• A LAND Attack is a Layer 4 Denial of Service (DoS) attack in which, the attacker sets the source and
destination information of a TCP segment to be the same. A vulnerable machine will crash or
freeze due to the packet being repeatedly processed by the TCP stack.
• Teardrop Attack
• A teardrop attack is a denial-of-service (DoS) attack that involves sending fragmented packets to a
target machine. Since the machine receiving such packets cannot reassemble them due to a bug in
TCP/IP fragmentation reassembly, the packets overlap one another, crashing the target network
device.
• Thank you…On to Lesson 5
LESSON 5
IDENTITY AND ACCESS MANAGEMENT
•Physical and logical assets control – Bar coding and Inventory tagging
•Identification and authentication of people and devices
•Identity as a service (e.g. cloud identity) - – Know SAML definition
•Third-party identity services (e.g. on premise) – AD Questions and How passwords are stored
•Access control attacks – Know brute-force attacks and everyway to log on as someone else
•Identity and access provisioning lifecycle (e.g. provisioning review) – This is a memorization exercise
Physical and logical assets control – Bar coding and
Inventory tagging
• RFID, Barcoding and Inventory – represent the ability to prevent
theft. This reduces risk. Any questions on this simply point this
out and are to be answered like a CTO/CIO would answer. Very
long and not technical.
Identification and authentication of people and
devices
• Know brute force attacks – Best on spreadsheets and their
passwords.
• Know your Biometrics
• https://www.cccure.org/Documents/HISM/039-041.html
• Object Reuse
• Space on a Disk, allocated and not given back to OS
• Tempest Attack and White Noise
• Few Questions on the Tempest attack, which is reading a screen at a
distance and White Noise, which you can pump down a wire to scramble or
mask an attack
SAML AND OAUTH
• Security Assertion Markup Language (SAML, pronounced sam-
el) is an XML-based, open-standard data format for
exchanging authentication and authorization data between
parties, in particular, between an identity provider and a service
provider.
• OAuth is an open standard for authorization, commonly used
as a way for Internet users to log into third party websites
using their Microsoft, Google, Facebook, Twitter, One Network
etc. accounts without exposing their password.
AD PASSWORDS
• Active Directory passwords are stored as a hash. For further
details, you can review the following link:
• http://www.passcape.com/windows_password_recovery_windo
ws_faq
• Kerberos
• Replay Attacks happen here
ACCESS CONTROLS
• Will have to remember all the types of access controls
• http://cisspstudy.blogspot.com/2007/05/types-of-access-control.html
Access Control Attacks
• Dictionary attacks
• These are programs with built in dictionaries. They would use all dictionary words to attempt and find the correct password, in the hope that a
user would have used a standard dictionary word.
• Brute force
• This type of attack is attempting to break the password by trying all possible words, in the alphabet. You can set the software to start from 2
combination letter and keep keep going to 3 combinations, and then 4 and so on. The program would attempt all possible combinations
including special keywords. However after 6 or 7 combinations it can take a long time to exhaust all keyword. In fact it is not worth attempting
beyond an 8 letter combination as most computers will take a very long time exhausting all possibilities, we are talking weeks, months and years
depending on the number of letters and the processing power of the computer.
• Spoofed logon screens
• The last access control attack is to implement a fake logon screen, and when a user attempts to login, the logon screen will send the username
and password to the hacker.
• Prevention against authentication and access control attacks
• To circumvent these type of attacks, passwords should be long, complex and changed every so often. If the password is used many times a day
and protects important information, then it should be changed more often. There should be a strong password policy in place to enforce this, as
well as enforcing other measures such as locking users out after so many logon attempts, etc. To circumvent against spoofed logon screens, this
can be almost unavoidable if the fake logon screen has already been installed on a computer. The prevention for this attack is to have secure
endpoints, where these fake logon screens can not be implemented.
Identity and Access Provisioning Lifecycle
• Thank you…On to Lesson 6
LESSON 6
SECURITY ASSESSMENT AND TESTING
• Assessment and test strategies – Know what kind of testing and
test cases help security
• Security process data (e.g. management and operational
controls)
• Security control testing
• Security architectures vulnerabilities
ASSESSMENT AND TEST STRATEGIES
• Pen Test
• War Dialing – Bank of Modems
• Sniffing – Monitor the Network
• Eavesdropping – Listening
• Dumpster Diving – Just like it sounds
• Social Engineering – Human Manipulation
SECURITY PROCESS DATA
• Employment Polices and Practices – Termination process and
Background Checks
• Roles and Responsibilities – Management sets the standard and
verbalizes the policy
• Security Awareness Training – Prevents Social Engineering
SECURITY CONTROL TESTING AND
VULNERABILITIES
• http://www.mindcert.com/category/mind-maps/cissp/
• Thank you…On to Lesson 7
LESSON 7
SECURITY OPERATIONS
• Investigations support and requirements
• Foundational security operations concepts
• Resource protection techniques
• Incident management – Know the incident management life cycle
• Patch and vulnerability management – Know your Patch management life cycle.
• Change management processes
• Recovery strategies – Know DR sites, Hot, Cold..etc.
• Disaster recovery processes and plans
• Business continuity planning and exercises – Know the BCP lifecycle, know what steps are
not in it
• Personnel safety concerns
FOUNDATIONAL SECURITY OPERATIONS
CONCEPTS
• Know your Law - http://www.mindcert.com/category/mind-
maps/cissp/
INCIDENT MANAGEMENT
• Incident management (IcM) is a term describing the activities of
an organization to identify, analyze, and correct hazards to
prevent a future re-occurrence. These incidents within a
structured organization are normally dealt with by either an
Incident Response Team (IRT), or an Incident Management
Team (IMT).
PATCH MANAGEMENT
• Patch management is an area of systems management that
involves acquiring, testing, and installing multiple patches
(code changes) to an administered computer system.
RECOVERY STRATEGIES
• Go over your BCP and DR Mind Map -
http://www.mindcert.com/category/mind-maps/cissp/
• Know Site Types
• Hot
• Cold
• Warm
RPO AND RTO
• RPO
• The recovery point objective (RPO) is the age of files that must be
recovered from backup storage for normal operations to resume if a
computer, system, or network goes down as a result of a hardware,
program, or communications failure.
• RTO
• The Recovery Time Objective (RTO) is the duration of time and a service
level within which a business process must be restored after a disaster in
order to avoid unacceptable consequences associated with a break in
continuity.
BCP AND BIA LIFECYCLE
ABOVE ALL…
• People are the most important thing in any system!
• Thank you…On to Lesson 8
LESSON 8
SOFTWARE DEVELOPMENT SECURITY
• Security in the software development lifecycle – Know the rings
and how they work
• Development environment security controls
• Acquired software security impact – Know shrink-wrap vs.
malicious attacks vs. purposeful backdoors
SECURITY AND THE SDLC
• Rings are easy to remember
• SDLC is a little harder
DEVELOPMENT ENVIRONMENT SECURITY
CONTROLS
• Know your Software Mind Map -
http://www.mindcert.com/category/mind-maps/cissp/
ACQUIRED SOFTWARE SECURITY IMPACT
• 1-Operating system Attacks: attackers always try to search for operating system vulnerabilities and
exploits to can attack against operating system some vulnerabilities of operating system are buffer
overflow vulnerabilities ,bugs in operating system, unpatched operating system
• 2-Application-Level Attacks: when a application release must be test it out from it is company in this
type of attack a hacker can use buffer overflow, active content, cross-site script, denial of service, SQL
injection, session hijacking , phishing
• 3-Shrink Wrap Code Attacks: in this type of attack a hacker can use the shrink wrap code method to
hack into a system you may confuse with this type of attack but when you buy and install an
operating system application it comes with tons of sample script so you use the script and can start
thinking of attack in a system
• 4-Misconfiguration Attacks: if your an not a smart administrator so you always make mistake like you
forgot to give permission to authorized persons in your organization and when you bring a new
device in your organization you just leave it as it’s default so a hacker can use default setting to
access the device or you may set the username and password same name of your organization
name so a hacker can easy attack to your system
• Thank you…On to Summary and Supplemental
IN SUMMARY…
• Relax – It’s not hard
• Take breaks – if you have to take the 6 hours they give you, you
are not ready
• Answer like a stuffed-shirt, not a super smart engineer
• Stay Positive
• Eat right, get a good night sleep and pass!
OLD VS NEW
SUPPLEMENTAL – CALCULATING EF, SLE,
ARO AND ALE
• Key Terms:
• EF – Exposure Factor – The % of value an asset lost due to an incident,
represented in a decimal
• SLE – Single Loss Expectancy – How much would it cost you if it
happened just ONE time?
• SLE = Asset Value x Exposure Factor (SLE=AV*EF)
• ARO – Annual Rate of Occurrence – How many times does it happen in a
year? The exam will try to trip you up and say it occurs every 5 years.
• ALE – Annual Loss Expectancy – SLE x ARO – How much you will lose per
year.
SUPPLEMENTAL – CALCULATING EF, SLE,
ARO AND ALE – CONT.
• For example, if forest fires occur about once every five years and
present a risk to a building, the ARO is .20 (1/5).
If a forest fire is expected to reduce the value of the building by 20%
(say from $1,000,000 to $800,000) the exposure factor is .20
(800,000 / 1,000,000)
• A lot of math can be involved in a quantitative assessment, but the
CISSP exam focuses on the SLE, ALE, and ARO formulas.
SUPPLEMENTAL – CALCULATING EF, SLE,
ARO AND ALE – CONT.
HELPFUL STUDY GUIDES
• Sunflower
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=
1&ved=0ahUKEwiZ_5rTmZfMAhWiuoMKHev0AIMQFggdMAA&url=http%3
A%2F%2Fwww.kilala.nl%2FSysadmin%2FImages%2FCISSP_Summary_V1.1.
pdf&usg=AFQjCNE6_ViFnOV8Ea6s9qcpaOcJvSndKQ
• Techexams.net
• Cccure.org

More Related Content

What's hot

Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020Jiunn-Jer Sun
 
Threat hunting for Beginners
Threat hunting for BeginnersThreat hunting for Beginners
Threat hunting for BeginnersSKMohamedKasim
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkTuan Phan
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSJohn Gilligan
 
Organigramme de la mise en œuvre du SMSI et processus de certification ISO 27...
Organigramme de la mise en œuvre du SMSI et processus de certification ISO 27...Organigramme de la mise en œuvre du SMSI et processus de certification ISO 27...
Organigramme de la mise en œuvre du SMSI et processus de certification ISO 27...Bachir Benyammi
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
NIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - MindmapNIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - MindmapWAJAHAT IQBAL
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Edureka!
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 

What's hot (20)

Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
NTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in DepthNTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in Depth
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Cissp Training PPT
Cissp Training PPTCissp Training PPT
Cissp Training PPT
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
 
Threat hunting for Beginners
Threat hunting for BeginnersThreat hunting for Beginners
Threat hunting for Beginners
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
Organigramme de la mise en œuvre du SMSI et processus de certification ISO 27...
Organigramme de la mise en œuvre du SMSI et processus de certification ISO 27...Organigramme de la mise en œuvre du SMSI et processus de certification ISO 27...
Organigramme de la mise en œuvre du SMSI et processus de certification ISO 27...
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
NIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - MindmapNIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - Mindmap
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
 
CISSP - Security Assessment
CISSP - Security AssessmentCISSP - Security Assessment
CISSP - Security Assessment
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 

Similar to CISSP-Certified.pptx

Career In Information security
Career In Information securityCareer In Information security
Career In Information securityAnant Shrivastava
 
SECURITY OPERATION CENTER CONTENT.pptx
SECURITY OPERATION CENTER CONTENT.pptxSECURITY OPERATION CENTER CONTENT.pptx
SECURITY OPERATION CENTER CONTENT.pptxFarzanMansoor1
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOAPeter Henley
 
Cissp chapter-05ppt178
Cissp chapter-05ppt178Cissp chapter-05ppt178
Cissp chapter-05ppt178wardell henley
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to ComplianceSecurity Innovation
 
Session4807.ppt
Session4807.pptSession4807.ppt
Session4807.ppttalkaton
 
1 Info Sec+Risk Mgmt
1 Info Sec+Risk Mgmt1 Info Sec+Risk Mgmt
1 Info Sec+Risk MgmtAlfred Ouyang
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are ComingErnest Staats
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
Segmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglySegmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglyAlgoSec
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdfNdheh
 
2016 TTL Security Gap Analysis with Kali Linux
2016 TTL Security Gap Analysis with Kali Linux2016 TTL Security Gap Analysis with Kali Linux
2016 TTL Security Gap Analysis with Kali LinuxJason Murray
 
Securing your esi_piedmont
Securing your esi_piedmontSecuring your esi_piedmont
Securing your esi_piedmontscm24
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im finalcavapyta
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im finalcavapyta
 

Similar to CISSP-Certified.pptx (20)

Career In Information security
Career In Information securityCareer In Information security
Career In Information security
 
SECURITY OPERATION CENTER CONTENT.pptx
SECURITY OPERATION CENTER CONTENT.pptxSECURITY OPERATION CENTER CONTENT.pptx
SECURITY OPERATION CENTER CONTENT.pptx
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
 
Cissp chapter-05ppt178
Cissp chapter-05ppt178Cissp chapter-05ppt178
Cissp chapter-05ppt178
 
Security.ppt
Security.pptSecurity.ppt
Security.ppt
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
Session4807.ppt
Session4807.pptSession4807.ppt
Session4807.ppt
 
(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn
 
1 Info Sec+Risk Mgmt
1 Info Sec+Risk Mgmt1 Info Sec+Risk Mgmt
1 Info Sec+Risk Mgmt
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
Cyber security
Cyber securityCyber security
Cyber security
 
Segmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglySegmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the Ugly
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdf
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
 
2016 TTL Security Gap Analysis with Kali Linux
2016 TTL Security Gap Analysis with Kali Linux2016 TTL Security Gap Analysis with Kali Linux
2016 TTL Security Gap Analysis with Kali Linux
 
Securing your esi_piedmont
Securing your esi_piedmontSecuring your esi_piedmont
Securing your esi_piedmont
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im final
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im final
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

CISSP-Certified.pptx

  • 1. CISSP CERTIFIED - THE EASY WAY LESSONS FROM A NEWLY MINTED CISSP
  • 2. CLASS OVERVIEW • 8 domains used to be 10 • This makes the test more streamlined and I say easier • Less questions per domain • More “real-world” questions- because the domains overlap, the questions tend to be more real-world • ALL the questions, except the Crypto questions, are non-technical – Always remember “how would your CIO answer”
  • 3. LESSON 1 SECURITY AND RISK MANAGEMENT •Confidentiality, integrity, and availability concepts - Know CIA by Heart •Security governance principles – Oversight and ITIL will help you out here •Compliance, Legal and Regulatory Issues – SOX and Regulatory Guidelines – There will be “memorization” questions on the test •Professional ethics – Know the ISC2 code by heart •Security policies, standards, procedures and guidelines – be sure and know how these differ in an organization, what is “suggested” vs. “mandatory”
  • 4. LESSON 2 ASSET SECURITY • Information and asset classification – Know all the layers of public and government data classification i.e. Confidential, private…etc • Ownership (e.g. data owners, system owners) – Quite a few questions on the test concerning “who can change data, who can class it” • Protect privacy • Appropriate retention – a few questions on data destruction • Data security controls – You will see questions regarding shipping and Chain of Custody • Handling requirements (e.g. markings, labels, storage)
  • 5. LESSON 3 SECURITY ENGINEERING •Engineering processes using secure design principles •Security models, evaluations and capabilities fundamental concepts •Security architectures, designs, and solution elements vulnerabilities •Web-based systems vulnerabilities – Know sql injection vs <script> vs Cross Site •Mobile systems vulnerabilities – Know all the “blue” words. Jacking, smacking, snarfing •Embedded devices and cyber-physical systems vulnerabilities •Cryptography – The MOST Questions on the test. Public, Private, Nonrepudiation vs. Plain Confidentiality •Site and facility design secure principles – Know what hills, slopes and entrance design are best •Physical security – Fence, light height, man traps, desk check-in are likely to be on the test
  • 6. LESSON 4 COMMUNICATION AND NETWORK SECURITY •Secure network architecture design (e.g. IP & non-IP protocols, segmentation) – Firewall and DMZ questions appear on the test •Secure network components •Secure communication channels – Encryption like TLS vs SSL all the way to which way to point Satellite Dishes •Network attacks – Know ping of death, tear drop, and every other DOS attack
  • 7. LESSON 5 IDENTITY AND ACCESS MANAGEMENT •Physical and logical assets control – Bar coding and Inventory tagging •Identification and authentication of people and devices •Identity as a service (e.g. cloud identity) - – Know SAML definition •Third-party identity services (e.g. on premise) – AD Questions and How passwords are stored •Access control attacks – Know brute-force attacks and everyway to log on as someone else •Identity and access provisioning lifecycle (e.g. provisioning review) – This is a memorization exercise
  • 8. LESSON 6 SECURITY ASSESSMENT AND TESTING • Assessment and test strategies – Know what kind of testing and test cases help security • Security process data (e.g. management and operational controls) • Security control testing • Test outputs (e.g. automated, manual) • Security architectures vulnerabilities
  • 9. LESSON 7 SECURITY OPERATIONS • Investigations support and requirements • Foundational security operations concepts • Resource protection techniques • Incident management – Know the incident management life cycle • Patch and vulnerability management – Know your Patch management life cycle. • Change management processes • Recovery strategies – Know DR sites, Hot, Cold..etc. • Disaster recovery processes and plans • Business continuity planning and exercises – Know the BCP lifecycle, know what steps are not in it • Personnel safety concerns
  • 10. LESSON 8 SOFTWARE DEVELOPMENT SECURITY • Security in the software development lifecycle – Know the rings and how they work • Development environment security controls • Software security effectiveness – know what stops <Script> and injection attacks • Acquired software security impact – Know shrink-wrap vs. malicious attacks vs. purposeful backdoors
  • 11. THANK YOU • On to Lesson 1…
  • 12. LESSON 1 SECURITY AND RISK MANAGEMENT •Confidentiality, integrity, and availability concepts - Know CIA by Heart •Security governance principles – Oversight and ITIL will help you out here •Compliance, Legal and Regulatory Issues – SOX and Regulatory Guidelines – There will be “memorization” questions on the test •Professional ethics – Know the ISC2 code by heart •Security policies, standards, procedures and guidelines – be sure and know how these differ in an organization, what is “suggested” vs. “mandatory”
  • 13. CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY • Often times called the Security Triad • Confidentiality: Has everything to do with Encryption • Integrity: Keeping the data from being altered • Availability: Keeping the systems up and available Real World Resource: https://www.cccure.org/
  • 14. CONFIDENTIALITY • Types • Symmetric • Asymmetric • Strength • Bits • PKI – You will only need to know root CAs Real World Resource: http://www.mindcert.com/category/mind- maps/cissp/
  • 15. INTEGRITY • The data was not altered in any way • Hashing • MD5 • SHA-1 Real World Resource: http://www.mindcert.com/category/mind- maps/cissp/
  • 16. AVAILABILITY • The Site and the Servers are always up • Site Level Redundancy • Hot • Cold • Warm • Reciprocal • Raid Level – Know all of these. https://en.wikipedia.org/wiki/Standard_RAID_levels http://www.corexchange.com/blog/disaster-recovery-hot-warm-cold-sites- key-differences
  • 17. GOVERANCE, LEGAL AND ETHICS • Spend a weekend and get ITIL Certified • Memorize the ISC2 code of ethics • Protect society, the commonwealth, and the infrastructure • Act honorably, honestly, justly, responsibly, and legally • Provide diligent and competent service to principals • Advance and protect the profession Visit the following site for the complete mind map for law, ethics and regulations: http://www.mindcert.com/category/mind-maps/cissp/
  • 19. • Thank you…On to Lesson 2
  • 20. LESSON 2 ASSET SECURITY • Information and asset classification – Know all the layers of public and government data classification i.e. Confidential, private…etc • Ownership (e.g. data owners, system owners) – Quite a few questions on the test concerning “who can change data, who can class it” • Protect privacy • Appropriate retention – a few questions on data destruction • Data security controls – You will see questions regarding shipping and Chain of Custody • Handling requirements (e.g. markings, labels, storage)
  • 23. OWNERSHIP – ONLY HAVE TO KNOW TWO •Data owner—Usually a member of senior management. After all, senior management is responsible for the asset and, if it is compromised, can be held responsible. The data owner can delegate some day-to-day duties but cannot delegate total responsibility; senior management is ultimately responsible. •Data custodian—This is usually someone in the IT department. The data custodian does not decide what controls are needed, but he or she does implement controls on behalf of the data owner. Other responsibilities include the day-to-day management of the asset. Controlling access, adding and removing privileges for individual users, and ensuring that the proper controls have been implemented are all part of the data custodian’s daily tasks.
  • 24. DATA SECURITY CONTROLS • Marking, Labeling and Handling • Data Security Controls – Shipping, Chain of Custody • Don’t open boxes • Data Destruction • Tape Backup Security
  • 25. • Thank you…on to Lesson 3
  • 26. LESSON 3 SECURITY ENGINEERING •Engineering processes using secure design principles •Security models, evaluations and capabilities fundamental concepts •Security architectures, designs, and solution elements vulnerabilities •Web-based systems vulnerabilities – Know sql injection vs <script> vs Cross Site •Mobile systems vulnerabilities – Know all the “blue” words. Jacking, smacking, snarfing •Embedded devices and cyber-physical systems vulnerabilities •Cryptography – The MOST Questions on the test. Public, Private, Nonrepudiation vs. Plain Confidentiality •Site and facility design secure principles – Know what hills, slopes and entrance design are best •Physical security – Fence, light height, man traps, desk check-in are likely to be on the test
  • 28. SECURITY MODELS • If the test ask about lattice – Clark Wilson • Bell–LaPadula Model – “Rides Ugly White Donkeys” • Everything else is opposite
  • 29. WEB BASED VULNERABILITIES • "CSRF is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated." – OWASP • Remember when you don’t see <script>, its probably this attack, especially when 2 sites are involved • "Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites." - OWASP • Remember when you see <script> • Remember that checking your inputs is the best defense to this or a SQL injection • XSS: http://example.com?variable=a'<script>alert(1)</script> • CSRF: http://example.com/changePassword?userID=1&newPassword=foob
  • 30. MOBILE SYSTEM VULNERABILITIES • BLUEJACKING Think of it as a high-tech version of ding-dong-ditch, where savvy pranksters push unsolicited messages to engage or annoy other nearby Bluetooth users by taking advantage of a loophole in the technology’s messaging options. • BLUESNARFING More damaging than bluejacking is bluesnarfing. With bluesnarfing, thieves wirelessly connect to some early Bluetooth-enabled mobile devices without the owner’s knowledge to download and/or alter phonebooks, calendars or worse.
  • 31. CRYPTOGRAPHY • Non-Repudiation – Can’t deny it came from you. When you digitally sign a message. • Private key encryption, symmetric, uses the same key for both encryption and decryption (Faster)(DES) – think winzip file with a password • Public key encryption (Slower)(RSA), asymmetric, uses the two keys, private to encrypt, and public to decrypt.
  • 33. FACILITY DESIGN SPECIFICATIONS • Remember what locks can be picked and what ones need to be bumped • Remember how high lights need to be • Carefully review the following site for physical security review: http://www.mindcert.com/category/mind-maps/cissp/
  • 34. • Thank you…On to Lesson 4
  • 35. LESSON 4 COMMUNICATION AND NETWORK SECURITY •Secure network architecture design (e.g. IP & non-IP protocols, segmentation) – Firewall and DMZ questions appear on the test •Secure network components •Secure communication channels – Encryption like TLS vs SSL all the way to which way to point Satellite Dishes •Network attacks – Know ping of death, tear drop, and every other DOS attack
  • 36. SECURE NETWORK DESIGN AND COMPONENTS • Bastion Host • Exposed to the Internet • Hardened – You expect and attack, its your front line • Screened Subnet • A Bastion Host between an internal and an external firewall • MOST SECURE – Any questions asking that • Proxy Server • Can be used outbound or inbound to mask a client’s identity
  • 37. SECURE NETWORK DESIGN AND COMPONENTS • Honeypots • Lure bad people into doing bad things. • Lets you watch them • ONLY ENTICE, not ENTRAP. The difference is that you are not allowed to let them download items with “Enticement”. If you stick a fake payroll file out there, let them download it, then bust them, you have “Entrapped” them. - Remember this
  • 38. FIREWALLS • STATELESS • Stateless firewalls watch network traffic, and restrict or block packets based on source and destination addresses or other static values. They are not 'aware' of traffic patterns or data flows. A stateless firewall uses simple rule-sets that do not account for the possibility that a packet might be received by the firewall 'pretending' to be something you asked for. • STATEFUL • Stateful firewalls can watch traffic streams from end to end. They are are aware of communication paths and can implement various IP Security (IPsec) functions such as tunnels and encryption. In technical terms, this means that stateful firewalls can tell what stage a TCP connection is in (open, open sent, synchronized, synchronization acknowledge or established), it can tell if the MTU has changed, whether packets have fragmented etc. • Neither is really superior and there are good arguments for both types of firewalls. Stateless firewalls are typically faster and perform better under heavier traffic loads. Stateful firewalls are better at identifying unauthorized and forged communications.
  • 39. IDS/IPS •Intrusion Detection System • A device or application that analyzes whole packets, both header and payload, looking for known events. When a known event is detected a log message is generated detailing the event. •Intrusion Prevention System • A device or application that analyzes whole packets, both header and payload, looking for known events. When a known event is detected the packet is rejected.
  • 40. Secure Communication Channels • There are going to be a few questions on communication channels security. • For Satellite Dish technology , I recommend watching: http://resources.infosecinstitute.com/hacking-satellite-look-up-to- the-sky/ • For TLS/SSL, you simply have to remember that TLS is newer than SSL
  • 41. NETWORK ATTACKS (DDOS MOSTLY) • SYN Flood • A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic. • Fraggle Attack • A Fraggle Attack is a denial-of-service (DoS) attack that involves sending a large amount of spoofed UDP traffic to a router's broadcast address within a network. It is very similar to a Smurf Attack, which uses spoofed ICMP traffic rather than UDP traffic to achieve the same goal. • Land Attack • A LAND Attack is a Layer 4 Denial of Service (DoS) attack in which, the attacker sets the source and destination information of a TCP segment to be the same. A vulnerable machine will crash or freeze due to the packet being repeatedly processed by the TCP stack. • Teardrop Attack • A teardrop attack is a denial-of-service (DoS) attack that involves sending fragmented packets to a target machine. Since the machine receiving such packets cannot reassemble them due to a bug in TCP/IP fragmentation reassembly, the packets overlap one another, crashing the target network device.
  • 42. • Thank you…On to Lesson 5
  • 43. LESSON 5 IDENTITY AND ACCESS MANAGEMENT •Physical and logical assets control – Bar coding and Inventory tagging •Identification and authentication of people and devices •Identity as a service (e.g. cloud identity) - – Know SAML definition •Third-party identity services (e.g. on premise) – AD Questions and How passwords are stored •Access control attacks – Know brute-force attacks and everyway to log on as someone else •Identity and access provisioning lifecycle (e.g. provisioning review) – This is a memorization exercise
  • 44. Physical and logical assets control – Bar coding and Inventory tagging • RFID, Barcoding and Inventory – represent the ability to prevent theft. This reduces risk. Any questions on this simply point this out and are to be answered like a CTO/CIO would answer. Very long and not technical.
  • 45. Identification and authentication of people and devices • Know brute force attacks – Best on spreadsheets and their passwords. • Know your Biometrics • https://www.cccure.org/Documents/HISM/039-041.html • Object Reuse • Space on a Disk, allocated and not given back to OS • Tempest Attack and White Noise • Few Questions on the Tempest attack, which is reading a screen at a distance and White Noise, which you can pump down a wire to scramble or mask an attack
  • 46. SAML AND OAUTH • Security Assertion Markup Language (SAML, pronounced sam- el) is an XML-based, open-standard data format for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider. • OAuth is an open standard for authorization, commonly used as a way for Internet users to log into third party websites using their Microsoft, Google, Facebook, Twitter, One Network etc. accounts without exposing their password.
  • 47. AD PASSWORDS • Active Directory passwords are stored as a hash. For further details, you can review the following link: • http://www.passcape.com/windows_password_recovery_windo ws_faq • Kerberos • Replay Attacks happen here
  • 48. ACCESS CONTROLS • Will have to remember all the types of access controls • http://cisspstudy.blogspot.com/2007/05/types-of-access-control.html
  • 49. Access Control Attacks • Dictionary attacks • These are programs with built in dictionaries. They would use all dictionary words to attempt and find the correct password, in the hope that a user would have used a standard dictionary word. • Brute force • This type of attack is attempting to break the password by trying all possible words, in the alphabet. You can set the software to start from 2 combination letter and keep keep going to 3 combinations, and then 4 and so on. The program would attempt all possible combinations including special keywords. However after 6 or 7 combinations it can take a long time to exhaust all keyword. In fact it is not worth attempting beyond an 8 letter combination as most computers will take a very long time exhausting all possibilities, we are talking weeks, months and years depending on the number of letters and the processing power of the computer. • Spoofed logon screens • The last access control attack is to implement a fake logon screen, and when a user attempts to login, the logon screen will send the username and password to the hacker. • Prevention against authentication and access control attacks • To circumvent these type of attacks, passwords should be long, complex and changed every so often. If the password is used many times a day and protects important information, then it should be changed more often. There should be a strong password policy in place to enforce this, as well as enforcing other measures such as locking users out after so many logon attempts, etc. To circumvent against spoofed logon screens, this can be almost unavoidable if the fake logon screen has already been installed on a computer. The prevention for this attack is to have secure endpoints, where these fake logon screens can not be implemented.
  • 50. Identity and Access Provisioning Lifecycle
  • 51. • Thank you…On to Lesson 6
  • 52. LESSON 6 SECURITY ASSESSMENT AND TESTING • Assessment and test strategies – Know what kind of testing and test cases help security • Security process data (e.g. management and operational controls) • Security control testing • Security architectures vulnerabilities
  • 53. ASSESSMENT AND TEST STRATEGIES • Pen Test • War Dialing – Bank of Modems • Sniffing – Monitor the Network • Eavesdropping – Listening • Dumpster Diving – Just like it sounds • Social Engineering – Human Manipulation
  • 54. SECURITY PROCESS DATA • Employment Polices and Practices – Termination process and Background Checks • Roles and Responsibilities – Management sets the standard and verbalizes the policy • Security Awareness Training – Prevents Social Engineering
  • 55. SECURITY CONTROL TESTING AND VULNERABILITIES • http://www.mindcert.com/category/mind-maps/cissp/
  • 56. • Thank you…On to Lesson 7
  • 57. LESSON 7 SECURITY OPERATIONS • Investigations support and requirements • Foundational security operations concepts • Resource protection techniques • Incident management – Know the incident management life cycle • Patch and vulnerability management – Know your Patch management life cycle. • Change management processes • Recovery strategies – Know DR sites, Hot, Cold..etc. • Disaster recovery processes and plans • Business continuity planning and exercises – Know the BCP lifecycle, know what steps are not in it • Personnel safety concerns
  • 58. FOUNDATIONAL SECURITY OPERATIONS CONCEPTS • Know your Law - http://www.mindcert.com/category/mind- maps/cissp/
  • 59. INCIDENT MANAGEMENT • Incident management (IcM) is a term describing the activities of an organization to identify, analyze, and correct hazards to prevent a future re-occurrence. These incidents within a structured organization are normally dealt with by either an Incident Response Team (IRT), or an Incident Management Team (IMT).
  • 60. PATCH MANAGEMENT • Patch management is an area of systems management that involves acquiring, testing, and installing multiple patches (code changes) to an administered computer system.
  • 61. RECOVERY STRATEGIES • Go over your BCP and DR Mind Map - http://www.mindcert.com/category/mind-maps/cissp/ • Know Site Types • Hot • Cold • Warm
  • 62. RPO AND RTO • RPO • The recovery point objective (RPO) is the age of files that must be recovered from backup storage for normal operations to resume if a computer, system, or network goes down as a result of a hardware, program, or communications failure. • RTO • The Recovery Time Objective (RTO) is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in continuity.
  • 63. BCP AND BIA LIFECYCLE
  • 64. ABOVE ALL… • People are the most important thing in any system!
  • 65. • Thank you…On to Lesson 8
  • 66. LESSON 8 SOFTWARE DEVELOPMENT SECURITY • Security in the software development lifecycle – Know the rings and how they work • Development environment security controls • Acquired software security impact – Know shrink-wrap vs. malicious attacks vs. purposeful backdoors
  • 67. SECURITY AND THE SDLC • Rings are easy to remember • SDLC is a little harder
  • 68. DEVELOPMENT ENVIRONMENT SECURITY CONTROLS • Know your Software Mind Map - http://www.mindcert.com/category/mind-maps/cissp/
  • 69. ACQUIRED SOFTWARE SECURITY IMPACT • 1-Operating system Attacks: attackers always try to search for operating system vulnerabilities and exploits to can attack against operating system some vulnerabilities of operating system are buffer overflow vulnerabilities ,bugs in operating system, unpatched operating system • 2-Application-Level Attacks: when a application release must be test it out from it is company in this type of attack a hacker can use buffer overflow, active content, cross-site script, denial of service, SQL injection, session hijacking , phishing • 3-Shrink Wrap Code Attacks: in this type of attack a hacker can use the shrink wrap code method to hack into a system you may confuse with this type of attack but when you buy and install an operating system application it comes with tons of sample script so you use the script and can start thinking of attack in a system • 4-Misconfiguration Attacks: if your an not a smart administrator so you always make mistake like you forgot to give permission to authorized persons in your organization and when you bring a new device in your organization you just leave it as it’s default so a hacker can use default setting to access the device or you may set the username and password same name of your organization name so a hacker can easy attack to your system
  • 70. • Thank you…On to Summary and Supplemental
  • 71. IN SUMMARY… • Relax – It’s not hard • Take breaks – if you have to take the 6 hours they give you, you are not ready • Answer like a stuffed-shirt, not a super smart engineer • Stay Positive • Eat right, get a good night sleep and pass!
  • 73. SUPPLEMENTAL – CALCULATING EF, SLE, ARO AND ALE • Key Terms: • EF – Exposure Factor – The % of value an asset lost due to an incident, represented in a decimal • SLE – Single Loss Expectancy – How much would it cost you if it happened just ONE time? • SLE = Asset Value x Exposure Factor (SLE=AV*EF) • ARO – Annual Rate of Occurrence – How many times does it happen in a year? The exam will try to trip you up and say it occurs every 5 years. • ALE – Annual Loss Expectancy – SLE x ARO – How much you will lose per year.
  • 74. SUPPLEMENTAL – CALCULATING EF, SLE, ARO AND ALE – CONT. • For example, if forest fires occur about once every five years and present a risk to a building, the ARO is .20 (1/5). If a forest fire is expected to reduce the value of the building by 20% (say from $1,000,000 to $800,000) the exposure factor is .20 (800,000 / 1,000,000) • A lot of math can be involved in a quantitative assessment, but the CISSP exam focuses on the SLE, ALE, and ARO formulas.
  • 75. SUPPLEMENTAL – CALCULATING EF, SLE, ARO AND ALE – CONT.
  • 76. HELPFUL STUDY GUIDES • Sunflower https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd= 1&ved=0ahUKEwiZ_5rTmZfMAhWiuoMKHev0AIMQFggdMAA&url=http%3 A%2F%2Fwww.kilala.nl%2FSysadmin%2FImages%2FCISSP_Summary_V1.1. pdf&usg=AFQjCNE6_ViFnOV8Ea6s9qcpaOcJvSndKQ • Techexams.net • Cccure.org