CC Certified in Cybersecurity All-in-One Exam Guide Steven Bennett 2024 Scribd Download
CC Certified in Cybersecurity All-in-One Exam Guide Steven Bennett 2024 Scribd Download
com
https://ebookmass.com/product/cc-certified-in-cybersecurity-
all-in-one-exam-guide-steven-bennett-2/
OR CLICK HERE
DOWLOAD NOW
https://ebookmass.com/product/cc-certified-in-cybersecurity-all-in-
one-exam-guide-steven-bennett/
ebookmass.com
https://ebookmass.com/product/cciso-certified-chief-information-
security-officer-all-in-one-exam-guide-steve-bennett/
ebookmass.com
https://ebookmass.com/product/aws-certified-security-specialty-all-in-
one-exam-guide-exam-scs-c01-tracy-pierce/
ebookmass.com
https://ebookmass.com/product/cancer-survivorship-sourcebook-health-
reference-series-angela-l-williams/
ebookmass.com
Physics for Scientists and Engineers with Modern Physics
4th Edition Douglas C. Giancoli
https://ebookmass.com/product/physics-for-scientists-and-engineers-
with-modern-physics-4th-edition-douglas-c-giancoli/
ebookmass.com
https://ebookmass.com/product/ebook-pdf-microeconomics-as-a-second-
language/
ebookmass.com
https://ebookmass.com/product/the-economics-of-the-stock-market-
andrew-smithers/
ebookmass.com
https://ebookmass.com/product/management-divided-contradictions-of-
labor-management-matt-vidal/
ebookmass.com
https://ebookmass.com/product/graber-and-wilburs-family-medicine-
examination-and-board-review-5th-edition-edition-jason-k-wilbur/
ebookmass.com
Blackness and Social Mobility in Brazil Doreen Joy Gordon
https://ebookmass.com/product/blackness-and-social-mobility-in-brazil-
doreen-joy-gordon/
ebookmass.com
ABOUT THE AUTHORS
ISBN: 978-1-26-520394-8
MHID: 1-26-520394-6
The material in this eBook also appears in the print version of this
title: ISBN: 978-1-26-520381-8, MHID: 1-26-520381-4.
This is a copyrighted work and McGraw Hill (“McGraw Hill”) and its
licensors reserve all rights in and to the work. Use of this work is
subject to these terms. Except as permitted under the Copyright Act
of 1976 and the right to store and retrieve one copy of the work,
you may not decompile, disassemble, reverse engineer, reproduce,
modify, create derivative works based upon, transmit, distribute,
disseminate, sell, publish or sublicense the work or any part of it
without McGraw Hill’s prior consent. You may use the work for your
own noncommercial and personal use; any other use of the work is
strictly prohibited. Your right to use the work may be terminated if
you fail to comply with these terms.
McGraw Hill and its licensors do not warrant or guarantee that the
functions contained in the work will meet your requirements or that
its operation will be uninterrupted or error free. Neither McGraw Hill
nor its licensors shall be liable to you or anyone else for any
inaccuracy, error or omission, regardless of cause, in the work or for
any damages resulting therefrom. McGraw Hill has no responsibility
for the content of any information accessed through the work. Under
no circumstances shall McGraw Hill and/or its licensors be liable for
any indirect, incidental, special, punitive, consequential or similar
damages that result from the use of or inability to use the work,
even if any of them has been advised of the possibility of such
damages. This limitation of liability shall apply to any claim or cause
whatsoever whether such claim or cause arises in contract, tort or
otherwise.
In memory of Scout Bennett.
CONTENTS AT A GLANCE
Index
CONTENTS
Acknowledgments
Introduction
Chapter 1 Security Principles
Security Fundamentals
The CAI Triad
Authentication
Message Authenticity and Nonrepudiation
Privacy
Information Assurance
Elements of a Typical Cyberattack
1. Conduct Research
2. Identify Targets
3. Exploit Targets
4. Do Bad Things
Elements of a Typical Security Program
Risk Management
Security Governance and Management
Security Controls
Professional Ethics
Chapter Review
Quick Review
Questions
Questions and Answers
Chapter 2 Access Controls Concepts
Access Control Fundamentals
Access Control Concepts
Access Control Practices
Identification, Authentication, Authorization, and
Accountability
Identity and Access Management
Identity and Access Management Lifecycle
Privileged Accounts
Logical Access Controls
Access Control Models
Identity Management Technologies
Monitoring Logical Access
Physical Access Control
Preventing and Controlling Physical Access
Monitoring Physical Access
Chapter Review
Quick Review
Questions
Questions and Answers
Chapter 3 Network Security
Network Fundamentals
Network Types
Wired and Wireless Networks
System Addresses
Network Devices and Terminology
Networking in Action
Protocols
Ports
OSI Model
TCP/IP
IP Addressing
Network Threats and Attacks
Conducting Research
Identifying Targets
Exploiting Targets
Doing Bad Things
Network Defenses
Firewalls
Network Security Architecture Elements
Network Access Control
E-mail and Web Application Filtering
Network Operations Elements
Wireless Security
Internet of Things Security
Security Assessments and Testing
Network Infrastructure
On-Premises Datacenter Infrastructure
Cloud Infrastructure
Chapter Review
Quick Review
Questions
Questions and Answers
Chapter 4 Security Operations
Data Security
Data Lifecycle
Cryptography
Logging and Monitoring
System Hardening
Patch Management
Configuration Baselines
Configuration Management
Best Practice Security Policies
CC-Recommended Security Policies
Security Awareness Training
Components of Security Awareness Training
Security Awareness Training Topics
Chapter Review
Quick Review
Questions
Questions and Answers
Chapter 5 Business Continuity (BC), Disaster Recovery (DR) &
Incident Response Concepts
Incident Response
Incident Response Terminology
Incident Response Governance Elements
Incident Response Process
Business Continuity Management
Business Continuity Program Purpose and
Governance
Business Continuity Plan
Business Continuity Activation
Disaster Recovery
IT Facility Recovery
User Environment Recovery
Data Recovery
Chapter Review
Quick Review
Questions
Questions and Answers
Appendix About the Online Content
System Requirements
Your Total Seminars Training Hub Account
Privacy Notice
Single User License Terms and Conditions
TotalTester Online
Technical Support
Glossary
Index
ACKNOWLEDGMENTS
The authors wish to thank their family members for their support,
without which this book would not be possible.
We also want to recognize the hardworking and dedicated staff at
the NIST Computer Security Division, who work behind the scenes to
develop the standards, guidelines, and innovative technologies that
help our nation address current and future cybersecurity threats and
challenges.
INTRODUCTION
About (ISC)2
The International Information System Security Certification
Consortium (ISC)2 is an international nonprofit organization that
provides certification and training for cybersecurity professionals.
(ISC)2 organizes industry conferences, provides cybersecurity best
practice material, and offers a variety of vendor-neutral certification
and training programs. (ISC)2 is the certification body for the
Certified in Cybersecurity (CC) certification. This means that they
manage the certification process and determine the requirements
and content for the exam. (ISC)2 is most widely known for its
Certified Information Systems Security Professional (CISSP)
certification, which has become a global standard certification for
experienced security professionals. In addition to those certifications
mentioned, (ISC)2 manages the following certifications:
(ISC)2 Requirements
The (ISC)2 requirements may change, so it is important for
candidates to check the (ISC)2 website (https://www.isc2.org/)
for the most up-to-date information. The requirements listed in
this section are accurate at the time of this writing.
Prerequisites
The CC certification is a foundational cybersecurity certification for
newcomers in the industry. As such, it does not have a minimum
experience requirement or other prerequisites that other
cybersecurity certifications require. The only requirement is that the
candidate must be at least 16 years of age to sit for the exam.
(ISC)2 recommends that candidates have basic information
technology knowledge.
Training Options
There are two primary training avenues available to become
certified:
Exam Information
The CC exam is an in-person exam proctored through (ISC)2-
authorized Pearson VUE Test Centers. The exam consists of 100
multiple-choice questions. Candidates are given two hours to
complete the exam and must achieve a minimum score of at least
700 points out of 1,000 (70%). Table 1 provides the examination
weights for each domain, indicating the percentage of questions
from each domain that appear on the exam.
Maintaining Certification
The learning doesn’t stop once you are certified. In order to ensure
certification holders keep up to date with industry knowledge,
certification bodies such as (ISC)2 have requirements that credential
holders submit continuing education credits. (ISC)2 calls them
continuing professional education (CPE) credits and requires 45 CPE
credits every three years to maintain the CC certification. In
addition, CC certification holders must pay an annual maintenance
fee (AMF) of $50 a year to maintain their certification.
Each chapter starts with a short outline and text introducing the
topics covered, followed by sections corresponding to the outline.
Throughout each chapter, supplemental information is provided
utilizing the following features to help you understand and
remember various topics:
In addition to the Notes, Tips, and Exam Tips, you will encounter
shaded boxes, which are used to dig deeper into a topic, present a
case study, or share an anecdote that illustrates or emphasizes a
subject in the chapter.
Like all McGraw Hill All-in-One Exam Guides, this book uses
repetition as an aid to reinforce the information presented and to
facilitate committing information to long-term memory. The end of
each chapter has a “Chapter Review” section that presents a review
of the essential themes of each section within the chapter. The
chapter review is followed by a “Quick Review” section, which is a
bulleted list of key points from the chapter that are important to
remember. The “Chapter Review” and “Quick Review” sections
combine to reinforce the information presented in the chapter.
Each chapter concludes with questions that test the CC
candidate’s retention and understanding of the topics covered. The
questions contained in the book are written as another means to
reinforce topics. The answers include short explanations describing
why the correct answer is right and, in some cases, why the
incorrect answers are wrong.
The appendix, “About the Online Content,” contains instructions
for accessing an online testing resource called TotalTester Online.
This online tool allows the CC candidate to practice questions similar
to the ones on the real exam by configuring tests by domain,
number of questions, and other customizable options.
1. Read this book and try to answer the questions at the end of
each chapter to reinforce comprehension of the information.
2. Use TotalTester Online to take practice tests by domain. Write
down the topic of every question that you answer incorrectly or
have difficulty understanding.
3. Using the list of difficult topics as a study list, go back and
reread the applicable sections of the book, taking notes or
using study methods that have worked for you in the past.
4. Repeat the cycle of reading, testing, and studying until you are
consistently scoring above 80 percent in each domain using the
TotalTester Online practice questions in Exam Mode. Using Total
Tester in Practice Mode may be too easy and may result in
higher scores so be sure you are practicing for the exam and
recording your scores in Exam Mode.
Security Principles
This chapter discusses the following topics:
• Security fundamentals
• Elements of a typical cyberattack
• Elements of a typical security program
• On one side of the coin there are the cyber criminals who carry
out offensive attacks against information systems and the
organizations that own and operate them. Their goal is to steal
assets (money or intellectual property) or disrupt the operation
of information systems for personal, political, or financial gain.
• On the other side of the coin there are the cybersecurity
professionals who carry out cyber defense. Their goal is to
defend against cyberattacks, detect them when they occur, and
respond to and recover from cyber incidents to minimize the
impact on the organization they are protecting.
Confidentiality
Confidentiality is the secrecy of the information within the asset
being protected. Confidentiality is the most common form of
protection that cyber criminals seek to compromise. The goal of
most cyberattacks is to steal data, which is a compromise of
confidentiality. Cyber criminals compromise confidentiality by
accessing data they are not authorized to access. Simply accessing
data without proper authorization is a compromise of confidentiality.
Cybersecurity professionals can protect data against breaches of
confidentiality in a number of ways. The use of access controls is
one way to provide confidentiality. Access controls (described in
more detail in Chapter 2) are processes, tools, or configuration
settings that ensure that access to data is restricted to only those
individuals who are authorized to access it. Another method of
ensuring confidentiality is the use of cryptography. Cryptography
(also explained in more detail later) makes data unreadable except
to authorized persons and protects the confidentiality of data while
the data is at rest (in storage) or while it is being transmitted.
Integrity
While confidentiality is important because it ensures data is not
accessed by those who are not authorized to access it, it is also
important to make sure data is not being altered or corrupted in any
way. Imagine if you electronically signed a contract to buy a house
and when the contract is returned to you, you find the price has
been increased by $100,000! Did somebody change the data?
Ensuring data is not changed by unauthorized users refers to its
integrity. Organizations and their users and customers must be
assured that their data is accurate and cannot be changed.
Therefore, the integrity of the data must be assured and is an
important security protection.
For instance, the value of the stock of publicly traded companies
depends on the accuracy of the financial information provided in
their financial statements, as well as the data the financial
information is based on. If a cyber criminal were able to alter any of
that information, the financial statements would be unreliable, which
could have serious consequences to the value of the stock and the
risk of their investors. This is one reason why the U.S. Sarbanes-
Oxley Act was passed. This law requires publicly traded corporations
to ensure the integrity of their financial data and reporting. Cyber
criminals’ goals are not always stealing data—sometimes they
attempt to alter data to achieve their goals to disrupt the operations
of their target.
Cybersecurity professionals can use access controls to combat
integrity attacks by ensuring only authorized persons can make
changes to data. There are other security controls described later in
this book that specifically address integrity protections. One of them
is using hashes, which is a technique to detect if the contents of a
data file or any data set have been altered from their original source.
Availability
Data assets and information resources need to be there when they
are needed. When a business publishes a website to sell their
products online, the website needs to be available to their
customers. Availability is as important as confidentiality and integrity
because an organization’s business depends on their systems and
data being operational. Availability is a key element by which an
organization’s customers judge the organization’s services, products,
and quality.
Threats against availability are similar in nature to threats against
confidentiality and integrity. Bad actors and natural disasters can
threaten availability, as they can bring down systems and prevent
the businesses that use them from performing essential business
functions. Cyberattackers perform specific attacks to bring down
websites of governments and businesses or disrupt operations of
critical infrastructure entities such as electric power companies, oil
and gas pipelines, financial institutions, and first responders.
Availability attacks are commonly known as denial of service (DoS)
attacks, which are described in greater detail in Chapter 3.
Authentication
So far in this chapter we have learned that there are information
assets and resources that are important to protect against threats.
Threat actors are cyber criminals who seek to compromise the
confidentiality, integrity, or availability of these information assets.
And we have learned that there are security controls, or
countermeasures that organizations put into place to protect the
confidentiality, integrity, and availability of assets. One of the primary
categories of security controls is access controls. Access controls are
mechanisms to ensure that only those persons or resources who are
specifically authorized to access an information resource are allowed
to have such access. However, how can a computer system
authorize a user unless it knows who the person is who is requesting
access to a resource? The answer is by using authentication.
Authentication is the method by which systems verify that a user
who is requesting access to a resource really is who they claim to
be. In cybersecurity there is the concept of “need to know,” which
means only those persons with a legitimate need should be able to
access a specific resource such as a system or data. You can’t
enforce need to know without authentication.
In practice, many methods are used to perform authentication. In
web-based applications, programs, or systems that require a user
login, authentication is a two-step process. The first step is
identification, usually requiring the user to enter a username. The
second step is verification, which usually requires the user to go
through one or more verification factors. Verification frequently
includes just one factor, such as requiring the user to enter a
password. This is known as single-factor authentication (SFA).
However, additional security can be achieved by requiring more than
one factor used in combination. The use of two authentication
factors in combination is known as dual-factor authentication or two-
factor authentication, and the use of two or more factors in
combination is multifactor authentication (MFA). Verification factors
are commonly categorized by type, as follows:
Authenticity
For a message to be authentic, it must have two characteristics. The
recipient must be able to trust that the message came from the
source it is believed to have come from, and the recipient must
know that the message has not been altered or corrupted.
Technologies that implement authenticity embed additional data into
the transmitted message that carries information used to prove the
identity of the source and the integrity of the data. Digital
signatures, explained later in this book, are one popular method of
accomplishing authenticity.
Nonrepudiation
Technologies like digital signatures are used to guarantee that a
sender of a message cannot later deny that they sent the message.
This is called nonrepudiation. Digital signatures achieve
nonrepudiation because they use a specialized authentication
process which ensures that the message could only have been
created by the sender and could not have been created by anyone
else.
Privacy
Data privacy is a concept closely related to cybersecurity, as both
deal with the handling of sensitive data. However, privacy refers to
the handling of someone else’s personal data and often with the
level of control and consent the individual should expect to have
over their own personal data. Cybersecurity is more focused on
protecting data from unauthorized access. Privacy expands beyond
cybersecurity to ensure the organization is authorized to collect, use,
process, and share the data. In most cases the data belongs to
customers, but the data could belong to any party including
employees or the organization. In some cases there are laws in
place that require the organization to protect the privacy of data. For
instance, in the United States, personal healthcare information (PHI)
is protected by the Health Insurance Portability and Accountability
Act of 1996 (HIPAA). HIPAA requires organizations that obtain a
patient’s PHI to protect that information from being disclosed
without the patient’s consent. Privacy is closely associated with
security because the same security controls that ensure the
protection of data also contribute to ensuring the privacy of the
data. Confidentiality, integrity, and availability all apply to privacy.
Information Assurance
As a cyber professional you will commonly hear the terms
information security, cybersecurity, and information assurance. These
terms are often used interchangeably, but they have different
meanings. Information security and cybersecurity are very similar—
they both deal with securing information; however, cybersecurity
usually is limited to the security of information within the cyber
world—(computers and networks)—whereas information security can
also include information that resides in noncyber media such as
print, works of art, or physical media.
Information assurance refers to the measure of information
security. The goal of information assurance is to verify and ensure
the confidentiality, integrity, and availability of data and assets, and
this can only be done by measuring the effectiveness of security
controls. Usually, organizations follow frameworks for information
assurance. These frameworks include standards and processes for
implementing and measuring an organization’s risk management
programs. Common information assurance frameworks include
1. Conduct research
2. Identify targets
3. Exploit targets
4. Do bad things
1. Conduct Research
The first step the cyber criminal performs in an attack is to gather as
much information as possible about the target to be able to carry
out the attack. To do this, the attacker performs a variety of
research activities including performing web searches; examining
social media accounts of the organization and its employees; reading
blogs and media articles; attending conferences, symposia, or trade
shows; or even physically observing the organization’s employees or
facilities. During this research, the attacker attempts to learn
information about the victim such as
• Domain names
• Corporate and financial information
• Names of employees and key managers
• E-mail addresses and phone numbers
• Social media activity and friends
• Facility locations and layouts
• Ingress/egress details
Exploring the Variety of Random
Documents with Different Content
Qu’il n’apaisera sa soif qu’en buvant
Toute la rafale !
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
Pourtant :
MON TOMBEAU
A. Vermenouze
Par quel soir, j’entends votre voix d’outre-tombe, mon cher grand
Vermenouze !
Au dix-septième jour de la mobilisation, 18 août 1914.
Des mois et des mois, j’avais abandonné ce livre juste aux
chapitres où je devais magnifier votre œuvre. J’avais délaissé
l’Auvergne, pour des voyages, qui vous eussent enthousiasmé, au
Maroc, et puis en Bretagne, et, ensuite, à travers Danemark,
Norvège et Suède ; il y a, à peine, six semaines, je rentrais par
l’Allemagne, je m’arrêtais à Hambourg, à Cologne, à Liège ! En
Afrique, j’étais allé par l’Espagne, par notre Espagne auvergnate. A
chaque station, je me rappelais nos projets de collaboration d’un
roman sur l’émigration hispano-cantalienne ! Au retour de la
randonnée dans le bled, je me reposais vers la pointe du Raz, que
vous aviez visitée lors de votre séjour en mon manoir de
Locquémeau :
UN VIEUX DE LA VIEILLE
UN BIEL DE LO BIELHO
UN VIELH DE LO VIEILHO
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookmass.com