CISSP Study Guide Conrad All Chapter Instant Download
CISSP Study Guide Conrad All Chapter Instant Download
com
https://textbookfull.com/product/cissp-study-
guide-conrad/
textbookfull
More products digital (pdf, epub, mobi) instant
download maybe you interests ...
https://textbookfull.com/product/cissp-official-study-guide-mike-
chapple/
https://textbookfull.com/product/isc%c2%b2-cissp-certified-
information-systems-security-professional-official-study-guide-
eighth-edition-chapple/
https://textbookfull.com/product/cissp-all-in-one-exam-guide-
harris/
https://textbookfull.com/product/cissp-all-in-one-exam-guide-
shon-harris/
CISSP All in one Exam Guide 7th Edition Shon Harris
https://textbookfull.com/product/cissp-all-in-one-exam-guide-7th-
edition-shon-harris/
https://textbookfull.com/product/cissp-all-in-one-exam-guide-8th-
edition-shon-harris/
https://textbookfull.com/product/cissp-official-practice-tests-
mike-chapple/
https://textbookfull.com/product/proteome-informatics-conrad-
bessant/
https://textbookfull.com/product/acls-study-guide-barbara-j-
aehlert/
CISSP Study Guide
Page left intentionally blank
CISSP Study Guide
Third Edition
Eric Conrad
Seth Misenar
Joshua Feldman
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or any information storage and retrieval system, without
permission in writing from the publisher. Details on how to seek permission, further information about the
Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance
Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher
(other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden
our understanding, changes in research methods, professional practices, or medical treatment may become
necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and
using any information, methods, compounds, or experiments described herein. In using such information
or methods they should be mindful of their own safety and the safety of others, including parties for whom
they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any
liability for any injury and/or damage to persons or property as a matter of products liability, negligence
or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in
the material herein.
ISBN: 978-0-12-802437-9
CHAPTER 1 Introduction.................................................................................. 1
How to Prepare for the Exam.......................................................... 2
The CISSP® Exam is a Management Exam............................. 2
The 2015 Update....................................................................... 2
The Notes Card Approach........................................................ 3
Practice Tests............................................................................ 3
Read the Glossary..................................................................... 3
Readiness Checklist.................................................................. 4
How to Take the Exam.................................................................... 4
Steps to Becoming a CISSP®................................................... 4
Computer Based Testing (CBT)............................................... 5
How to Take the Exam............................................................. 5
After the Exam.......................................................................... 9
Good Luck!...................................................................................... 9
References...................................................................................... 10
v
vi Contents
Due Care................................................................................. 24
Due Diligence......................................................................... 24
Legal Aspects of Investigations.............................................. 24
Intellectual Property................................................................ 31
Privacy.................................................................................... 36
International Cooperation....................................................... 38
Import/Export Restrictions.....................................................38
Trans-Border Data Flow......................................................... 39
Important Laws and Regulations............................................ 39
Security and 3rd Parties.................................................................. 43
Service Provider Contractual Security.................................... 44
Procurement............................................................................ 45
Vendor Governance................................................................ 45
Acquisitions............................................................................ 45
Divestitures............................................................................. 46
Ethics.............................................................................................46
The (ISC)2® Code of Ethics...................................................46
Computer Ethics Institute....................................................... 48
IAB’s Ethics and the Internet.................................................. 48
Information Security Governance.................................................. 49
Security Policy and Related Documents................................. 49
Personnel Security.................................................................. 52
Access Control Defensive Categories and Types.......................... 55
Preventive............................................................................... 55
Detective................................................................................. 56
Corrective................................................................................ 56
Recovery................................................................................. 56
Deterrent................................................................................. 56
Compensating......................................................................... 57
Comparing Access Controls................................................... 57
Risk Analysis................................................................................. 58
Assets...................................................................................... 58
Threats and Vulnerabilities..................................................... 58
Risk = Threat × Vulnerability................................................. 59
Impact..................................................................................... 60
Risk Analysis Matrix.............................................................. 60
Calculating Annualized Loss Expectancy.............................. 60
Total Cost of Ownership......................................................... 62
Return on Investment.............................................................. 63
Budget and Metrics................................................................. 64
Risk Choices........................................................................... 65
Contents vii
Degaussing.............................................................................. 91
Destruction.............................................................................. 92
Shredding................................................................................ 92
Determining Data Security Controls............................................. 92
Certification and Accreditation............................................... 92
Standards and Control Frameworks........................................ 93
Scoping and Tailoring............................................................. 96
Protecting Data in Motion and Data at Rest........................... 96
Summary of Exam Objectives....................................................... 98
Self Test......................................................................................... 98
Self Test Quick Answer Key....................................................... 100
References.................................................................................... 101
Spartan Scytale.....................................................................151
Caesar Cipher and other Rotation Ciphers...........................151
Vigenère Cipher.................................................................... 152
Cipher Disk........................................................................... 153
Jefferson Disks...................................................................... 153
Book Cipher and Running-Key Cipher................................155
Codebooks............................................................................155
One-Time Pad....................................................................... 155
Hebern Machines and Purple................................................ 157
Cryptography Laws............................................................... 160
Types of Cryptography................................................................ 160
Symmetric Encryption.......................................................... 160
Asymmetric Encryption........................................................ 168
Hash Functions.....................................................................170
Cryptographic Attacks................................................................. 171
Brute Force...........................................................................172
Social Engineering................................................................ 172
Rainbow Tables.................................................................... 172
Known Plaintext...................................................................173
Chosen Plaintext and Adaptive Chosen Plaintext................. 173
Chosen Ciphertext and Adaptive Chosen Ciphertext........... 174
Meet-in-the-Middle Attack................................................... 174
Known Key........................................................................... 174
Differential Cryptanalysis..................................................... 174
Linear Cryptanalysis............................................................. 175
Side-Channel Attacks...........................................................175
Implementation Attacks........................................................ 175
Birthday Attack..................................................................... 175
Key Clustering...................................................................... 176
Implementing Cryptography........................................................ 176
Digital Signatures.................................................................176
Message Authenticate Code.................................................. 177
HMAC..................................................................................177
Public Key Infrastructure...................................................... 178
SSL and TLS......................................................................... 179
IPsec...................................................................................... 179
PGP....................................................................................... 181
S/MIME................................................................................ 181
Escrowed Encryption............................................................ 181
Steganography......................................................................182
Digital Watermarks............................................................... 183
Contents xi
Honeypots............................................................................. 370
Honeynets............................................................................. 370
Asset Management....................................................................... 371
Configuration Management.................................................. 371
Change Management............................................................ 373
Continuity of Operations............................................................. 375
Service Level Agreements (SLA)......................................... 375
Fault Tolerance..................................................................... 376
BCP and DRP Overview and Process......................................... 383
Business Continuity Planning (BCP).................................... 383
Disaster Recovery Planning (DRP)...................................... 384
Relationship between BCP and DRP.................................... 384
Disasters or Disruptive Events.............................................. 385
The Disaster Recovery Process............................................. 392
Developing a BCP/DRP.............................................................. 394
Project Initiation...................................................................395
Scoping the Project............................................................... 398
Assessing the Critical State................................................... 398
Conduct Business Impact Analysis (BIA)............................ 399
Identify Preventive Controls................................................. 403
Recovery Strategy................................................................. 403
Related Plans......................................................................... 407
Plan Approval....................................................................... 412
Backups and Availability............................................................. 412
Hardcopy Data...................................................................... 413
Electronic Backups............................................................... 414
Software Escrow................................................................... 416
DRP Testing, Training and Awareness....................................... 417
DRP Testing.......................................................................... 417
Training................................................................................. 419
Awareness............................................................................. 420
Continued BCP/DRP Maintenance.............................................. 420
Change Management............................................................ 420
BCP/DRP Version Control................................................... 421
BCP/DRP Mistakes............................................................... 421
Specific BCP/DRP Frameworks.................................................. 421
NIST SP 800-34.................................................................... 422
ISO/IEC-27031..................................................................... 422
BS-25999 and ISO 22301..................................................... 422
BCI........................................................................................ 423
Summary of Exam Objectives..................................................... 423
xvi Contents
Eric Conrad (CISSP, GIAC GSE, GPEN, GCIH, GCIA, GCFA, GAWN, GSEC,
GISP, GCED), is a Senior SANS instructor and CTO of Backshore Communications,
which provides information warfare, hunt teaming, penetration testing, incident han-
dling, and intrusion detection consulting services. Eric started his professional career
in 1991 as a UNIX systems administrator for a small oceanographic communica-
tions company. He gained information security experience in a variety of industries,
including research, education, power, Internet, and healthcare, in positions ranging
from systems programmer to security engineer to HIPAA security officer and ISSO.
He is lead author of MGT414: SANS Training Program for CISSP® Certification, and
co-author of SANS SEC511: Continuous Monitoring and Security Operations and
SANS SEC542: Web App Penetration Testing and Ethical Hacking. Eric graduated
from the SANS Technology Institute with a Master of Science degree in Information
Security Engineering. He earned his Bachelor of Arts in English from Bridgewater
State College. Eric lives in Peaks Island, Maine, with his family, Melissa, Eric, and
Emma. His website is http://ericconrad.com.
Seth Misenar (CISSP, GIAC GSE, GSEC, GPPA, GCIA, GCIH, GCWN, GCFA,
GWAPT, GPEN) is a Cyber Security Expert who serves as Senior Instructor with
the SANS Institute and Principal Consultant at Context Security, LLC. He is num-
bered among the few security experts worldwide to have achieved the GIAC GSE
(#28) credential. Seth teaches a variety of cyber security courses for the SANS In-
stitute including two very popular courses for which he is lead author: the bestsell-
ing SEC511: Continuous Monitoring and Security Operations and SEC542: Web
Application Penetration Testing and Ethical Hacking. He also serves as co-author
for MGT414: SANS Training Program for CISSP® Certification. Seth’s background
includes security research, intrusion analysis, incident response, security architecture
design, network and web application penetration testing. He has previously served
as a security consultant for Fortune 100 companies, as well as, the HIPAA Security
Officer for a state government agency. Seth has a Bachelor of Science degree in
Philosophy from Millsaps College and resides in Jackson, Mississippi with his wife,
Rachel, and children, Jude, Hazel, and Shepherd.
US DoD cyber-security services contract. Supporting the DoD, he helped create the
current standard used for assessing cyber threats and analyzing potential adversaries
for impact. During his tenure, he supported many DoD organizations including the
Office of the Secretary of Defense, DISA, and the Combatant Commands. Joshua got
his start in the cyber security field when he left his high school science teaching posi-
tion in 1997 and began working for Network Flight Recorder (NFR, Inc.), a small
Washington, DC based startup making the first generation of Network Intrusion De-
tection Systems. He has a Bachelor’s of Science from the University of Maryland
and a Master’s in Cyber Operations from National Defense University. He currently
resides in New York, NY with his two dogs, Jacky and Lily.
Eric Conrad: I need to first thank my wife, Melissa, and my children, Eric and
Emma, for their love and patience while I wrote this book. Thank you to the contrib-
uting authors and my friends Joshua Feldman and Seth Misenar.
Thank you to my teachers and mentors: Thank you, Miss Gilmore, for sending
me on my way. Thank you, Dave Curado and Beef Mazzola, for showing me the right
way to do it. Thank you, Stephen Northcutt, Alan Paller, Deb Jorgensen, Scott Weil,
Eric Cole, Ed Skoudis, Johannes Ullrich, Mike Poor, Ted Demopoulos, Jason Fossen,
Kevin Johnson, John Strand, Jonathan Ham, and many others from the SANS Insti-
tute, for showing me how to take it to the next level.
I would like to thank the supergroup of information security professionals who
answered my last-minute call and collectively wrote the 500 questions compris-
ing the two sets of online practice exams: Rodney Caudle, David Crafts, Bruce
Diamond, Jason Fowler, Philip Keibler, Warren Mack, Eric Mattingly, Ron Reidy,
Mike Saurbaugh, and Gary Whitsett.
Seth Misenar: I would like to thank my wife, Rachel, the love of my life, who
showed continued patience, support, and strength while entertaining two young
children throughout this writing process. I am grateful to my children, Jude, Hazel,
and Shepherd who were amazingly gracious when Daddy had to write. And I count
myself lucky to have such wonderful parents, Bob and Jeanine, who, as always,
provided much of their time to ensure that my family was taken care of during this
writing period.
xxi
Page left intentionally blank
CHAPTER
Introduction
1
EXAM OBJECTIVES IN THIS CHAPTER
• How to Prepare for the Exam
• How to Take the Exam
• Good Luck!
This book is born out of real-world information security industry experience. The
authors of this book have held the titles of systems administrator, systems program-
mer, network engineer/security engineer, security director, HIPAA security officer,
ISSO, security consultant, instructor, and others.
This book is also born out of real-world instruction. We have logged countless
road miles teaching information security classes to professionals around the world.
We have taught thousands of students in hundreds of classes: both physically on
most of the continents, as well as online. Classes include CISSP®, of course, but also
continuous monitoring, hunt teaming, penetration testing, security essentials, hacker
techniques, information assurance boot camps, and others.
Good instructors know that students have spent time and money to be with them, and
time can be the most precious. We respect our students and their time: we do not waste
it. We teach our students what they need to know, and we do so as efficiently as possible.
This book is also a reaction to other books on the same subject. As the years have
passed, other books’ page counts have grown, often past 1000 pages. As Larry Wall
once said, “There is more than one way to do it.” [1] Our experience tells us that there
is another way. If we can teach someone with the proper experience how to pass the
CISSP® exam in a 6-day boot camp, is a 1000+ page CISSP® book really necessary?
We asked ourselves: what can we do that has not been done before? What can we
do better or differently? Can we write a shorter book that gets to the point, respects
our student’s time, and allows them to pass the exam?
We believe the answer is yes; you are reading the result. We know what is impor-
tant, and we will not waste your time. We have taken Strunk and White’s advice to
“omit needless words” [2] to heart: it is our mantra.
This book will teach you what you need to know, and do so as concisely as
possible.
1
2 CHAPTER 1 Introduction
PRACTICE TESTS
Quizzing can be the best way to gauge your understanding of this material, and of
your readiness to take the exam. A wrong answer on a test question acts as a laser
beam: showing you what you know, and more importantly, what you do not know.
Each chapter in this book has 15 practice test questions at the end, ranging from easy
to medium to hard. The Self Test Appendix includes explanations for all correct and
incorrect answers; these explanations are designed to help you understand why the
answers you chose were marked correct or incorrect. This book’s companion Web
site is located at http://booksite.elsevier.com/companion/conrad/index.php. It con-
tains 500 questions: two full practice exams. Use them.
You should aim for 80% or greater correct answers on any practice test. The real
exam requires 700 out of 1000 points, but achieving 80% or more on practice tests
will give you some margin for error. Take these quizzes closed book, just as you will
take the real exam. Pay careful attention to any wrong answers, and be sure to reread
the relevant section of this book. Identify any weaker domains (we all have them):
domains where you consistently get more wrong answers than others. Then focus
your studies on those weak areas.
Time yourself while taking any practice exam. Aim to answer at a rate of at least
one question per minute. You need to move faster than true exam pace because the
actual exam questions may be more difficult and therefore take more time. If you are
taking longer than that, practice more to improve your speed. Time management is
critical on the exam, and running out of time usually equals failure.
If you see a glossary definition that is not clear or obvious to you, go back to the
chapter it is based on, and reread that material. Ask yourself: do I understand this
concept enough to answer a question about it?
READINESS CHECKLIST
These steps will serve as a “readiness checklist” as you near the exam day. If
you remember to think like a manager, are consistently scoring over 80% on
practice tests, are answering practice questions quickly, understand all glossary
terms, and perform a final thorough read through of your notes card, you are ready
to go.
LONDON:
Printed by Schulze and Co., 13, Poland Street.
FOOTNOTE:
[1]Another feminine craft peculiar to the “west
country,” where many young girls, of a class inferior to
the workers of embroidery and opening, are employed
to clip the loose threads from webs of worked muslin.
Corrections
The first line indicates the original, the second the correction.
p. 198
that Nature, in learning to make the lily, turned out the convolvolus.
that Nature, in learning to make the lily, turned out the convolvulus.
p. 213
p. 264