Isc2 Cisssp: Certification Training
Isc2 Cisssp: Certification Training
Conducted by
• Md Showkat Ali,
• CISSP, CCSP, PMP, CISA, CISM, CISSP, CRISC, CGEIT
CISSP DOMAINS
• The CISSP exam evaluates expertise across eight security domains.
2019 CISSP Review Course
CHAPTER 3
Security Engineering
Domains Weight
1. Security and Risk Management 15%
2. Asset Security 10%
3. Security Architecture and Engineering 13%
4. Communication and Network Security 14%
5. Identity and Access Management (IAM) 13%
6. Security Assessment and Testing 12%
7. Security Operations 13%
8. Software Development Security 10%
Total: 100%
Domain 3 Agenda
• Cryptography
• Principles of Secure Design
• Trusted Computer Base Elements
• Security Perimeter
• Reference Monitor
• Security Kernel
• Security Models
• Computer/Security Architecture
• Security Models
• Security Evaluation Criteria
CRYPTOGRAPHY
• Historical uses of Cryptography
• Symmetric Cryptography
• Asymmetric Cryptography
• Hybrid Cryptography
• IPSec
• Attacks on Cryptography
CRYPTOGRAPHY DEFINITIONS & GOALS
• The art of creating and implementing secret codes and ciphers is known as cryptography.
• Cryptography is paralleled by the art of cryptanalysis—the study of methods to defeat codes and
ciphers.
Goals of Cryptography:
• Caesar Cipher
• Scytale
• Vignere
• Vernam
• Simple Substitution
• Substitution Ciphers are subject to pattern analysis. Its said ‘Shift Cipher’ also.
SCYTALE
• First letter of the key is matched up against first letter of the message, and so on
Plaintext: attackatdawn
Key: LEMONLEMONLE
Ciphertext: LXFOPVEFRNHR
CRYPTOGRAPHY IN WARFARE
• Breaking the cryptography of these devices is credited with reducing the length of the war.
VERNAM CIPHER
Boolean Mathematics:
• AND: NOT:
• OR XOR
• OR:
SECURITY SERVICES PROVIDED BY CRYPTOGRAPHY
• Non-Repudiation: Combines authenticity and integrity. A sender can’t dispute having sent a
message, nor its contents.