CISSP Session 01 PDF
CISSP Session 01 PDF
the CISSP
Bootcamp
Your instructor:
Michael J Shannon
CISSP #42221 / #524169,
CCNP-Security, PCNSE7,
AWS Certified Security – Specialty, Class will begin at 10:00
OpenFAIR, and A.M. Central Standard
ITIL 4 Managing Professional Time (CST)
Aligning Security to
appear here during live
session. Delete this
placeholder before
Business Strategy
presenting
• ISO/IEC 27000
• NIST Special Publication 800-53 Revision 4
• Control Objectives for Information and Related Technology
(COBIT) 5
• ETSI Cyber Security Technical Committee (TC CYBER)
• Center for Internet Security (CIS) Benchmarks
Security Control
Frameworks
• Atelier de Gestion de l'ArchiTEcture des systèmes
d'information et de communication (AGATE) is a framework
for modeling computer or communication systems
architecture
• Interoperable Delivery of European eGovernment Services to
public Administrations, Businesses and Citizens (IDABC) is an
EU program launched in 2004 that promoted the correct use
of Information and Communication Technologies (ICT) for
cross-border services in Europe
• OBASHI provides a method for capturing, illustrating and
modeling the relationships, dependencies and data flows
between business and Information technology assets and
resources in a business context
Due Diligence
• Due diligence relates to the act of performing thorough
research before committing to a particular plan of action
• It involves proper information gathering, planning, testing,
and strategy before development, production, and
deployment
• Comprehensive hiring practices for security reasons
• Investigating a CSP thoroughly before signing a memorandum
of understanding (MOU)
• Using nonrepudiation techniques (digital signatures) before
signing contracts or using code
Due Care
• Due care refers to the degree of attention that a reasonable
person takes for a particular entity
• Due care is the level of judgment, attention, and activity
that a person would engage in under similar circumstances
• Performing the necessary maintenance to keep a system or
application available and secure
• Taking all the necessary precautions to ensure that an IP
packet arrives with CIA properly applied using various
controls
• Using the least privilege and defense-in-depth principles
Privacy Compliance
Tim Casey et al., “A Field Guide To Insider Threat,” PDF file, https://www.nationalinsiderthreatsig.org (IT@Intel, Intel Corporation, October 2015),
https://www.nationalinsiderthreatsig.org/itrmresources/Intel%20Insider%20Threat%20Field%20Guide.pdf.
• Administrative - Defines policies, procedures, and
guidelines
Security • Password policy, hiring policy, screening policy,
Control mandatory vacations, training
• Technical - Controls access to a resource
Categories • Firewalls, encryption, passwords, IDS/IPS, smartcards,
biometrics, RADIUS
Make
NPI* Plan Source (internal)
• Physical security
• Desktop security (clean desktop)
• Password security
• Phishing/hoaxes
• Malware and ransomware
• Copyrights and IP
• Data loss prevention (DLP)
Security Awareness
and Training
Example Awareness Program Process
• Custodian
• Is the keeper of the information from a
technical perspective
• Ensures CIA is maintained
• Processor
• Officer (CIO, CPO, CTO)
Intellectual Property (IP)
• The global shift towards service-oriented enterprises has enlarged
the role of intangible assets and intellectual property
• The need for protection and control of data loss and leakage has
increased drastically
• Copyrights
• Trademarks
• Patents
• Trade secrets
• Formulas
• Marketing campaigns
• Digital rights
Intellectual Property Management
• Copyright law guarantees that the creators of “original works of authorship” receive
protection against the unauthorized duplication of their work in 8 broad categories
of works:
• Literary
• Musical
• Dramatic
• Pantomimes and choreographic
• Pictorial, graphical, and sculptural
• Motion pictures and other audiovisual
• Sound recordings
• Architectural
• DRM is access-control technology that protects
licensed digital intellectual property (IP)
Digital • DRM is used by publishers, manufacturers, and IP
owners for digital content and device monitoring
Rights
• Digital media licensees attempt to balance the rights
Management of IP owners and Internet users by protecting rights
(DRM) and profits for digital product manufacturers and
retailers
• DRM protects copyrighted digital music files, apps,
software programs, films, TV shows, games, and other
media
Example:
Digital Stop screen Revoke
Manage Deny
Rights document unauthorized
captures or
printing to
Enforce
expiration
access based
on least
usage sharing
Managem files privilege