A. Technical security controls include access controls, intrusion detection, alarms, CCTV, In what phase of the Capability Maturity Model for Software SW-CMM are quantitative mea-
Attacks Based on Design or Coding Flaws and Security Issues 435
Programming 439 Timing, State Changes, and Communication Disconnects
439 Electromagnetic Radiation
439 Summary 440
Exam Essentials 441
Review Questions 443
Answers to Review Questions 447
Chapter 13
Administrative Management 449
Operations Security Concepts 450
Antivirus Management 451
Operational Assurance and Life Cycle Assurance 452
Backup Maintenance 452
Changes in WorkstationLocation 453
Need-to-Know and the Principle of Least Privilege 453
Privileged Operations Functions 454
Trusted Recovery 455
Configuration and Change Management Control 455
Standards of Due Care and Due Diligence 456
Privacy and Protection 457
Legal Requirements 457
Illegal Activities 457
Record Retention 458
Sensitive Information and Media 458
Security Control Types 461
Operations Controls 462
Personnel Controls 464
Summary 466 Exam Essentials
467 Review Questions
470 Answers to Review Questions
474 Chapter
14 Auditing and Monitoring
477 Auditing 478
Auditing Basics 478
Audit Trails 480
Reporting Concepts 481
Sampling 482 Record Retention
483 External Auditors
484 Monitoring 484
Monitoring Tools and Techniques 485
Penetration Testing Techniques 486
Planning Penetration Testing 487
Penetration Testing Teams 488
Ethical Hacking 488
War Dialing 488
Sniffing and Eavesdropping 489
Radiation Monitoring 490
Dumpster Diving 490
Social Engineering 491
Problem Management 491
Inappropriate Activities 491
Indistinct Threats and Countermeasures 492
Errors and Omissions 492
Fraud and Theft 493
Collusion 493 Sabotage 493
Loss of Physical and Infrastructure Support 493
Malicious Hackers or Crackers 495
Espionage 495 Malicious Code
495 Traffic and Trend Analysis
495 Initial Program Load Vulnerabilities
496 Summary 497
Exam Essentials 498
Review Questions 502
Answers to Review Questions 506
Chapter 15
Business Continuity Planning 509
Business Continuity Planning 510
Project Scope and Planning 511
Business Organization Analysis 511
BCP Team Selection 512
Resource Requirements 513
Legal and Regulatory Requirements 514
Business Impact Assessment 515
Identify Priorities 516
Risk Identification 516
Likelihood Assessment 517
Impact Assessment 518
Resource Prioritization 519
Continuity Strategy 519
Strategy Development 519
Provisions and Processes 520
Plan Approval 522
Plan Implementation 522
Training and Education 522
BCP Documentation 523
Continuity Planning Goals 523
Statement of Importance 523
Statement of Priorities 524
Statement of Organizational Responsibility 524
Statement of Urgency and Timing 524
Risk Assessment 524
Risk AcceptanceMitigation 525
Vital Records Program 525
Emergency Response Guidelines 525
Maintenance 525 Testing 526
Summary 526 Exam Essentials
526 Review Questions
528 Answers to Review Questions
532 Chapter
16 Disaster Recovery Planning
535 Disaster Recovery Planning
536 Natural Disasters
537 Man-Made Disasters
541 Recovery Strategy
545 Business Unit Priorities
545 Crisis Management
546 Emergency Communications
546 Work Group Recovery
546 Alternate Processing Sites
547 Mutual Assistance Agreements
550 Database Recovery
551 Recovery Plan Development
552 Emergency Response
553 Personnel Notification
553 Backups and Offsite Storage
554 Software Escrow Arrangements
557 External Communications
558 Utilities 558
Logistics and Supplies 558
Recovery vs. Restoration 558
Training and Documentation 559
Testing and Maintenance 560
Checklist Test 560
Structured Walk-Through 560
Simulation Test 561
Parallel Test 561
Full-Interruption Test 561
Maintenance 561 Summary 561
Exam Essentials 562
Written Lab 563
Review Questions 564
Answers to Review Questions 568
Answers to Written Lab 570
Chapter 17
Law and Investigations 571
Categories of Laws 572
Criminal Law 572
Civil Law 573
Administrative Law 574
Laws 574 Computer Crime
575 Intellectual Property
578 Licensing 584
ImportExport 584 Privacy 585
Investigations 590 Evidence 591
Investigation Process 593
Summary 595 Exam Essentials
595 Written Lab
597 Review Questions
598 Answers to Review Questions
602 Answers to Written Lab
604 Chapter
18 Incidents and Ethics
605 Major Categories of Computer Crime
606 Military and Intelligence Attacks
607 Business Attacks
607 Financial Attacks
608 Terrorist Attacks
608 Grudge Attacks
609 “Fun” Attacks
609 Evidence 610
Incident Handling 610
Common Types of Incidents 611
Response Teams 612
Abnormal and Suspicious Activity 614
Confiscating Equipment, Software, and Data 614
Incident Data Integrity and Retention 615
Reporting Incidents 615
Ethics 616 ISC
2
Code of Ethics 616
Ethics and the Internet 617
Summary 618 Exam Essentials
619 Review Questions
621 Answers to Review Questions
625 Chapter
19 Physical Security Requirements
627 Facility Requirements
628 Secure Facility Plan
629 Physical Security Controls
629 Site Selection
629 Visibility 630
Accessibility 630 Natural Disasters
630 Facility Design
630 Work Areas
630 Server Rooms
631 Visitors 631
Forms of Physical Access Controls 631
Fences, Gates, Turnstiles, and Mantraps 632
Lighting 633 Security Guards and Dogs
634 Keys and Combination Locks
634 Badges 635
Motion Detectors 635
Intrusion Alarms 635
Secondary Verification Mechanisms 636
Technical Controls 636
Smart Cards 637
Proximity Readers 637
Access Abuses 638
Intrusion Detection Systems 638
Emanation Security 639
Environment and Life Safety 640
Personnel Safety 640
Power and Electricity 640
Noise 642
Temperature, Humidity, and Static 642
Water 643 Fire Detection and Suppression
643 Equipment Failure
647 Summary 648
Exam Essentials 649
Review Questions 652
Answers to Review Questions 656
Glossary 659
Index 725
Introduction
The CISSP: Certified Information Systems Security Professional Study Guide, 3rd Edition offers you a solid foundation for the Certified Information Systems Security Professional
CISSP exam. By purchasing this book, you’ve shown a willingness to learn and a desire to develop the skills you need to achieve this certification. This introduction provides you with a
basic overview of this book and the CISSP exam.
This book is designed for readers and students who want to study for the CISSP certification exam. If your goal is to become a certified security professional, then the CISSP certification and this study
guide are for you. The purpose of this book is to adequately prepare you to take the CISSP exam. Before you dive into this book, you need to have accomplished a few tasks on your own. You
need to have a general understanding of IT and of security. You should have the necessary 4 years of experience or 3 years if you have a college degree in one of the 10 domains covered
by the CISSP exam. If you are qualified to take the CISSP exam according to ISC
2
, then you are sufficiently prepared to use this book to study for the CISSP exam. For more information
on ISC
2
, see the next section.
ISC
2
The CISSP exam is governed by the International Information Systems Security Certification Consortium, Inc. ISC
2
organization. ISC
2
is a global not-for-profit organization. It has four primary mission goals:
Maintain the Common Body of Knowledge for the field of information systems security Provide certification for information systems security professionals and practitioners
Conduct certification training and administer the certification exams Oversee the ongoing accreditation of qualified certification candidates through continued
education The ISC
2
is operated by a board of directors elected from the ranks of its certified practi- tioners. More information about ISC
2
can be obtained from its website at www.isc2.org.
CISSP and SSCP
ISC
2
supports and provides two primary certifications: CISSP and SSCP. These certifications are designed to emphasize the knowledge and skills of an IT security professional across all industries.
CISSP is a certification for security professionals who have the task of designing a security infra- structure for an organization. System Security Certified Practitioner SSCP is a certification for
security professionals who have the responsibility of implementing a security infrastructure in an organization. The CISSP certification covers material from the 10 CBK domains:
1.
Access Control Systems and Methodology
2.
Telecommunications and Network Security
3.
Security Management Practices
4.
Applications and Systems Development Security
5.
Cryptography
6.
Security Architecture and Models
7.
Operations Security
8.
Business Continuity Planning and Disaster Recovery Planning
9.
Law, Investigations, and Ethics
10.
Physical Security The SSCP certification covers material from 7 CBK domains:
Access Controls Administration
Audit and Monitoring Cryptography
Data Communications Malicious CodeMalware
Risk, Response, and Recovery The content for the CISSP and SSCP domains overlap significantly, but the focus is different
for each set of domains. CISSP focuses on theory and design, whereas SSCP focuses more on implementation. This book focuses only on the domains for the CISSP exam.
Prequalifications
ISC
2
has defined several qualification requirements you must meet to become a CISSP. First, you must be a practicing security professional with at least 4 years’ experience or with 3 years’
experience and a recent IT or IS degree. Professional experience is defined as security work per- formed for salary or commission within one or more of the 10 CBK domains.
Second, you must agree to adhere to the code of ethics. The CISSP Code of Ethics is a set of guidelines the ISC
2
wants all CISSP candidates to follow in order to maintain professionalism in the field of information systems security. You can find it in the Information section on the
ISC
2
website at www.isc2.org. ISC
2
has created a new program known as an Associate of ISC
2
. This program allows someone without any or enough experience to take the CISSP exam and then obtain experience
afterward. They are given 5 years to obtain 4 years of security experience. Only after providing proof of experience, usually by means of endorsement and a resume, does ISC
2
award the indi- vidual the CISSP certification label.
To sign up for the exam, visit the ISC
2
website and follow the instructions listed there on reg- istering to take the CISSP exam. You’ll provide your contact information, payment details, and
security-related professional experience. You’ll also select one of the available time and location settings for the exam. Once ISC
2
approves your application to take the exam, you’ll receive a confirmation e-mail with all the details you’ll need to find the testing center and take the exam.
Overview of the CISSP Exam
The CISSP exam consists of 250 questions, and you are given 6 hours to complete it. The exam is still administered in a booklet and answer sheet format. This means you’ll be using a pencil
to fill in answer bubbles. The CISSP exam focuses on security from a 30,000-foot view; it deals more with theory and
concept than implementation and procedure. It is very broad but not very deep. To successfully complete the exam, you’ll need to be familiar with every domain but not necessarily be a master
of each domain. You’ll need to register for the exam through the ISC
2
website at www.isc2.org. ISC
2
administers the exam itself. In most cases, the exams are held in large conference rooms at hotels. Existing CISSP holders are recruited to serve as proctors or administrators over
the exams. Be sure to arrive at the testing center around 8:00 a.m., and keep in mind that abso- lutely no one will be admitted into the exam after 8:30 a.m.
CISSP Exam Question Types
Every single question on the CISSP exam is a four-option multiple choice question with a single correct answer. Some are straightforward, such as asking you to select a definition. Some are a
bit more involved, such as asking you to select the appropriate concept or best practice. And some questions present you with a scenario or situation and ask you to select the best response.
Here’s an example:
1.
What is the most important goal and top priority of a security solution? A. Prevention of disclosure
B. Maintaining integrity C. Human safety
D. Sustaining availability You must select the one correct or best answer and mark it on your answer sheet. In some
cases, the correct answer will be very obvious to you. In other cases, there will be several answers that seem correct. In these instances, you must choose the best answer for the question
asked. Watch for general, specific, universal, superset, and subset answer selections. In other cases, none of the answers will seem correct. In these instances, you’ll need to select the least
incorrect answer.
By the way, the correct answer for this question is C. Protecting human safety is always your first priority.
Advice on Taking the Exam
There are two key elements to the CISSP exam. First, you need to know the material from the 10 CBK domains. Second, you must have good test-taking skills. With 6 hours to complete a
250-question exam, you have just under 90 seconds for each question. Thus, it is important to work quickly, without rushing but without wasting time.
A key factor to keep in mind is that guessing is better than not answering a question. If you skip a question, you will not get credit. But if you guess, you have at least a 25-percent chance
of improving your score. Wrong answers are not counted against you. So, near the end of the sixth hour, be sure an answer is selected for every line on the answer sheet.
You can write on the test booklet, but nothing written on it will count for or against your score. Use the booklet to make notes and keep track of your progress. We recommend circling
each answer you select before you mark it on your answer sheet. To maximize your test-taking activities, here are some general guidelines:
1.
Answer easy questions first.
2.
Skip harder questions and return to them later. Consider creating a column on the front cover of your testing booklet to keep track of skipped questions.
3.
Eliminate wrong answers before selecting the correct one.
4.
Watch for double negatives.
5.
Be sure you understand what the question is asking. Manage your time. You should try to keep up with about 50 questions per hour. This will
leave you with about an hour to focus on skipped questions and double-check your work. Be very careful to mark your answers on the correct question number on the answer sheet.
The most common cause of failure is making a transference mistake from the test booklet to the answer sheet.
Study and Exam Preparation Tips
We recommend planning out a month or so for nightly intensive study for the CISSP exam. Here are some suggestions to maximize your learning time; you can modify them as necessary based
on your own learning habits: Take one or two evenings to read each chapter in this book and work through its review
material. Take all the practice exams provided in the book and on the CD.
Review the ISC
2
’s study guide from www.isc2.org. Use the flashcards found on the CD to reinforce your understanding of concepts.
I recommend spending about half of your study time reading and reviewing concepts and the other half taking practice exams. My students have found that
the more time they spend taking practice exams, the better the topics were retained in their memory.
You might also consider visiting resources such as www.cccure.org, www.cissp.com
, and other CISSP-focused websites.
Completing the Certification Process
Once you have been informed that you successfully passed the CISSP certification, there is one final step before you are actually awarded the CISSP certification label. That final step is known
as endorsement. Basically, this involves getting someone familiar with your work history to sign and submit an endorsement form on your behalf. The endorsement form is sent to you as an
attachment on the e-mail notifying you of your achievement in passing the exam. Simply send the form to a manager, supervisor, or even another CISSP along with your resume. The endorser
must review your resume, ensure that you have sufficient experience in the 10 CISSP domains, and then submit the signed form to ISC
2
via fax or snail mail. You must have completed endorsement files with ISC
2
within 90 days after receiving the confirmation of passing e-mail. Once ISC
2
receives your endorsement form, the certification process will be completed and you will be sent a welcome packet via snail mail.
Post CISSP Concentrations
ISC
2
has added three concentrations to its certification lineup. These concentrations are offered only to CISSP certificate holders. The ISC
2
has taken the concepts introduced on the CISSP exam and focused on specific areas; namely, architecture, management, and engineering.
The three concentrations are as follows: ISSAP Information Systems Security Architecture Professional
ISSMP Information Systems Security Management Professional ISSEP Information Systems Security Engineering Professional
For more details about these concentration exams and certifications, please see the ISC
2
website at www.isc2.org.
Notes on This Book’s Organization
This book is designed to cover each of the 10 CISSP Common Body of Knowledge CBK domains in sufficient depth to provide you with a clear understanding of the material. The main
body of this book comprises 19 chapters. The first 9 domains are each covered by 2 chapters, and the final domain Physical Security is covered in Chapter 19. The domainchapter break-
down is as follows:
Chapters 1 and 2 Access Control Systems and Methodology
Chapters 3 and 4 Telecommunications and Network Security
Chapters 5 and 6 Security Management Practices
Chapters 7 and 8 Applications and Systems Development Security
Chapters 9 and 10 Cryptography Chapters 11 and 12 Security Architecture and Models
Chapters 13 and 14 Operations Security
Chapters 15 and 16 Business Continuity Planning BCP and Disaster Recovery Planning DRP Chapters 17 and 18 Law, Investigation, and Ethics