Cissp - Domain 8
Cissp - Domain 8
Tables (relations)
contains a number of attributes, or fields. Each attribute corresponds to a column
in the table.
Rows (records/tuples)
a data record within a table. Each row, which represents a complete record of
specific item data, holds different data within the same structure.
Columns (fields/attributes)
a set of data values of a particular type, one value for each row of the
database.
DOMAIN 8: RELATIONAL DATABASE MGMT SYSTEMS
table
row
column
DOMAIN 8: RELATIONAL DATABASE MGMT SYSTEMS
Foreign Key
(example)
Virtual storage
allows a system to simulate secondary storage resources through the use of primary storage.
Most common example is RAM disk that presents itself to the operating system as a secondary
storage device but is actually implemented in volatile RAM.
provides a very fast file system for apps but no recovery capability.
Volatile storage
loses its contents when power is removed from the resource.
Nonvolatile storage
does not depend upon the presence of power to maintain its contents.
PRELIMINARY DESIGN
DETAILED DESIGN
TESTING
in a word – “iterative”
DOMAIN 8: SW DEVELOPMENT MATURITY MODELS
Level 1: Initial
No plan.
Level 2: Repeatable.
Basic lifecycle mgmt.
Level 3: Defined.
Formal, documented SW development processes.
Level 4: Managed.
Quantitative measures to gain detailed understanding.
Level 5: Optimized. CI/CD
Continuous development process, w/ feedback loops.
ideal model
model for software development which
implements many of the SW-CMM attributes
Initiating. Business reasons outlined, support &
infrastructure for initiative put in place.
Diagnosing. Engineers analyze current state of org &
make recommendations for change.
Establishing. Org takes recommendations &
develops plan to achieve those changes.
Acting. Plan put into action. Org develops solutions,
tests, refines & implements
Learning. Org continuously analyzes efforts and results,
proposes new actions to drive better results.
change and configuration management
Request Control
provides an organized framework within which users can request
modifications, managers can conduct cost/benefit analysis, and
developers can prioritize tasks.
Change Control
used by developers to re-create the situation encountered by the user and
analyze the appropriate changes to remedy the situation.
Release Control changes = code changes
Once the changes are finalized, they must be approved for release through the
release control procedure. Should also include acceptance testing to ensure that
any alterations are understood and functional
DOMAIN 8: ANTIVIRUS SOFTWARE
Password Crackers
designed to take credential data stolen in a data breach or other hack and extract passwords
from it.
Dictionary Attacks
uses a large dictionary file with thousands of words and then runs an encryption function
against all words to obtain their encrypted equivalents.
Social Engineering Attacks
consists of simply calling the user and asking for their password or posing as a technical
support representative or other authority figure who needs the information immediately.
Buffer Overflow
exist when a developer does not validate user input to ensure that it is of an
appropriate size (allows Input that is too large can “overflow” memory buffer)
Back Door often used during development and debugging
undocumented command sequences that allow individuals with knowledge of the
back door to bypass normal access restrictions
Time-of-Check-to-Time-of-Use
a timing vulnerability that occurs when a program checks access
permissions too far in advance of a resource request.
Rootkit (escalation of privilege)
freely available on the internet and exploit known vulnerabilities in various
operating systems enabling attackers to elevate privilege.
web application vulnerabilities
used to compromise web front-end and backend databases
Cross-site scripting (XSS) occur when web apps contain ‘reflected input’
A type of injection, in which malicious scripts are injected into
otherwise benign and trusted websites.
Occur when an attacker uses a web application to send
malicious code to a different end user.
SQL injection attacks
Use unexpected input to a web application to gain
unauthorized access to an underlying database.
network reconnaissance techniques
IP Probes
Automated tools simply attempt to ping each address in a range. Systems that
respond to the ping request are logged for further analysis
Port Scans
Scans a system for open/listening ports. Often, web servers, file servers, and
other servers supporting critical operations are prime targets
Vulnerability Scans
Used discover specific vulnerabilities in a system. popular tools for this
purpose include Nessus, OpenVAS, Qualys, Core Impact
protection rings
aka “hierarchical
protection domains”
the software development lifecycle
1.
Requirements Real
5. Evolution analysis
Developers
Ideas
4. Testing 2. Design
Take
3.
Effort
Implementation
CONCENTRIC CIRCLE SECURITY
several mutually independent security applications, processes, or
services that operate toward a single common goal.
THANKS
FOR WATCHING!