CISSP Important Points From Exam Point View-:: Cissp Short Notes by V.P.Prabhakaran
CISSP Important Points From Exam Point View-:: Cissp Short Notes by V.P.Prabhakaran
PRABHAKARAN
o
11. Policy = Express Management Intents
o Standard = what is required
o Procedures = How do I do it
12. Governance = Set of Operation (Policy,standard,baseline and due diligence)
13. Budget = Number of Controls, Level of Security ,what task to be performed ,Requirement of
training ,Metrics Tracking
14. Need to Know= Military .Access Decide on the based on Need to Know
15. Due Care = Is the Act of Compliance
16. Assurance = Is Due Diligence
o
o DES Modes
1. Electronic Code Book (ECB) = Block Mode , No IV
2. Cipher Block Chaining (CBC) = Block Mode , IV
3. Cipher Feedback (CFB) = Stream Mode , IV
4. Output Feedback (OFB) = Stream Mode , IV
5. Counter Mode (CTR) = Stream Mode. IV
36. SDLC
o Memorizing the specific steps of each SDLC is not required, but be sure to
understand the logical (secure) flow of the SDLC process.
o Security is part of every step of secure SDLC on the exam. Any step that omits
security is the wrong answer. Also, any SDLC plan that omits secure disposal as the
final lifecycle step is also the wrong answer.
o SDLC Phases
Conceptual Definition
Functional requirements determination
Control specification development
Design review
Code review walk through
System test review
Maintenance and change management
o Database
The data dictionary contains a description of the database tables. This is
called metadata, which is data about data
Data definition language (DDL) and data manipulation language (DML). DDL
is used to create, modify, and delete tables. DML is used to query and
update data stored in the tables.
A database journal is a log of all database transactions.
Database Transaction have four Characteristics -;
(Atomicity,Consisteny,Isolation and Durablity)
Database contamination :Mixing data with different classification levels
and/or need-to-know requirements
Concurrency:uses a “lock” feature to allow one user to make changes
but deny other users access to views or make changes to data elements at
the same time
Polyinstantiation used as a defense against some types of inference attacks
Polymorphism used as a defense against some type of aggregation attack
Expert system has two main components: the knowledge base and the
inference engine
37. Security Engineering
The primary role of the security architect is to translate business
requirements into solutions that provide security for key assets.
System Components = Processors,Storage,Periherals and OS
Multitasking. Multiprocessing and Multithreading
Security Zone
Zachman Framework = TOGAF
Type of Security Models
State Machine Model
Multilevel Lattice Model
Noninterference Model
Matrix Based
Information Flow Model
Bell-LaPadula = Confidentiality
Simple security rule = A subject cannot read data within an object
that resides at a higher security level (the “no read up” rule).
*- property rule = A subject cannot write to an object at a lower
security level (the “no write down” rule).
Strong star property rule = For a subject to be able to read and write
to an object, the subject’s clearance and the object’s classification
must be equal.
B1 – Labeled Security
Protection
C –Discretionary C2 – Controlled Access o
Protection Protection
C1 – Discretionary
Security Protection
D- Minimal D1 Minimal Protection Lowest
Protection
o
ISO 27001 = ISMS Standard
PCI DSS = Payment Card Industry
Process Isolation
o Ring 0 ,1 ,2 ,3 and 4
38. Communication and Network Security
o You Need to Understand Protocols associated vulnerabilities and how it get Exploit
o As a CISSP you can recommend which Protocol we can use
o OSI
o ICMP
o Simplex, half duplex, and full duplex communication.
o Type of Wan technology
o TCP Ports
Well-Known Ports – Ports 0 through 1023
Registered Ports – Ports 1024 through 49151
Dynamic or Private Ports – Ports 49152 through 65535
o MPLS Is Very Important (Please Understand the Diagram how its work)
Label Edge Router (LER)
Label Switching Router
Egress Node
o VOIP and SIP
o Secure Design Network
Boundary Router
Secure Routing
o DMZ = Understand Placement of Host in DMZ and Secure Network
o Type of Attack = Please Go through all Attack Part
39. Security Operations
o Security operations are primarily concerned with the daily tasks required to keep
security services operating reliably and efficiently.
o Operations security is a quality of other services and also a set of services in its own
right.
o Forensic Process
Identifying Evidence –
Collecting or Acquiring Evidence –
Examining or Analyzing the Evidence –
Presentation of Findings –
o Locard’s exchange principle states that when a crime is committed, the perpetrators
leave something behind and take something with them,
o MOM , SWGDE,IOCE
o TRIAGE Phase = Detection, Identification, and Notification
o Chain of Custody
o Evidence Principle
Be authentic
Be accurate
Be complete
Be convincing
Be admissible
o Criminal Investigation Components
Information, Instrumentation, and Interviewing
o SIEM
Normalization and Aggregate
o DATA in Rest
o Data in Motion
o Data in Use
o Steganography and Watermarking
o SLA is Very Important
OLA
Indemnification
o Disposal Data
Degaussers can be used to erase data saved to magnetic media
o A successful incident management program combines people, processes, and
technology
o RCA (Root Cause Analysis)
o IDS
HIDS
NIDS
o Dynamic application security testing (DAST) technologies are designed to detect
conditions indicative of a security vulnerability in an application in its running state
o Patch and Vulnerability Management
o Change Management Process
Request
Impact Assessment
Approval / Disapproval
Build and Test
Notification
Implementation
Validation
Documentation
o Recovery Strategy
Type of Site
o Backup Strategy
RTO,RPO
o RAID = Type
o Electronic vaulting is accomplished by backing up system data over a network. The
backup location is usually at a separate geographical location known as the vault
site.
o Journaling is a technique used by database management systems to provide
redundancy for their transactions. When a transaction is completed, the database
management system duplicates the journal entry at a remote location.
40. Physical Security
o Mantrap—A preventive physical control with two doors. Each door requires a
separate form of authentication to open.
o Smart Card—A physical access control device containing an integrated circuit.