CISSP Certification All-in-One Exam Guide
-
Upload
shon-harris -
Category
Documents
-
view
236 -
download
4
Transcript of CISSP Certification All-in-One Exam Guide
-
ALL IN ONE
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0/ blind folio: 00
CISSP
E X A M G U I D E
F o u r t h E d i t i o n
FM.indd iFM.indd i 10/9/2007 1:59:58 PM10/9/2007 1:59:58 PM
-
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0 FMblind folio: ii
FM.indd iiFM.indd ii 10/9/2007 2:00:05 PM10/9/2007 2:00:05 PM
-
ALL IN ONE
CISSP E X A M G U I D E
F o u r t h E d i t i o n
Shon Harris
New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi
San Juan Seoul Singapore Sydney Toronto
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0 /FMblind folio: iii
FM.indd iiiFM.indd iii 10/9/2007 2:00:05 PM10/9/2007 2:00:05 PM
-
Cataloging-in-Publication Data is on file with the Library of Congress
McGraw-Hill books are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. For more information, please write to the Director of Special Sales, Professional Publishing, McGraw-Hill, Two Penn Plaza, New York, NY 10121-2298. Or contact your local bookstore.
CISSP All-in-One Exam Guide, Fourth Edition
Copyright 2008 by The McGraw-Hill Companies. All rights reserved. Printed in the United States of America. Except as permitted under the Copyright Act of 1976, no part of this publication may be repro-duced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication.
1234567890 DOC DOC 01987
ISBN: Book p/n 978-0-07-149786-2 and CD p/n 978-0-07-149788-6of Set 978-0-07-149787-9
MHID: Book p/n 0-07-149786-2 and CD p/n 0-07-149788-9of Set 0-07-149787-0
Sponsoring EditorTimothy Green
Editorial SupervisorJody McKenzie
Project EditorLaura Stone
Acquisitions CoordinatorJennifer Housh
Technical EditorsJoe Hoofnagle, Clement Dupuis
Copy EditorMike McGee
ProofreaderPaul Tyler
IndexerClaire Splan
Production SupervisorJames Kussow
CompositionApollo Publishing Services
Art Director, CoverJeff Weeks
Cover DesignerPattie Lee
Information has been obtained by McGraw-Hill from sources believed to be reliable. However, because of the possibility of human or mechanical error by our sources, McGraw-Hill, or others, McGraw-Hill does not guarantee the accuracy, adequacy, or completeness of any information and is not responsible for any errors or omissions or the results obtained from the use of such information.
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0blind folio iv
FM.indd ivFM.indd iv 10/9/2007 2:00:05 PM10/9/2007 2:00:05 PM
-
I lost my greatest hero this year, George Fairbairn, my Grandpa. He taught me many things about life that cannot be taught in books, but only by example:
integrity, unconditional love, humility, and the importance of internal strength and courage.
I dedicate this book to my Grandpa and my wonderful and supportive family. I am truly lucky because most of my best friends are also my family members,
especially my mother, Kathy Conlon, and my husband, David Harris.
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0 FMblind folio: v
FM.indd vFM.indd v 10/9/2007 2:00:05 PM10/9/2007 2:00:05 PM
-
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
ABOUT THE AUTHOR
Shon Harris, CISSP, MCSE, is the president of Logical Security, a security consultant, a former engineer in the Air Forces Information Warfare unit, an instructor, and an au-thor. She has authored two best-selling CISSP books, was a contributing author to Hackers Challenge: Test Your Incident Response Skills Using 20 Scenarios, and a contribut-ing author to Gray Hat Hacking: The Ethical Hackers Handbook (both published by McGraw-Hill). Shon has taught computer and information security to a wide range of clients, some of which have included RSA, Department of Defense, Department of Energy, National Security Agency (NSA), Bank of America, Defense Information Systems Agency (DISA), BMC, West Point, and many more.
Shon was recognized as one of the top 25 women in the Information Security field by Information Security Magazine.
About the Technical EditorsJoe Hoofnagle, CISSP, has more than 12 years experience in the field of Information Security, managing and developing security programs for private and commercial busi-nesses. Currently, Joe is the Director of Information Security Services at Magellan Health Services. In this role, he has been tasked with the development of policy and its enforce-ment in the critical areas of computer and network forensics analysis, intrusion detec-tion, regulatory assessment, and risk analysis. As a strategist, Joe created and maintains Magellans security risk modeling and computer forensic programs, which meet the stringent requirements of federal, state, legislative and business contracts. Joe has fos-tered collaborative working relationships with other organizations achieving best secu-rity practices. He is a member of the American Society for Industrial Security (ASIS) and the High Tech Crime Consortium (HTCC).
Clement Dupuis, CD, CISSP, Security+, GCFW, GCIA, CEH, ECSA, CCSA, CCSE, is a Senior Security Instructor at Vigilar, where he also conducts security and penetration testing. He remains an internationally renowned security professional with vast experi-ence as a trainer and security consultant for some of the worlds largest companies, having taught employees of Microsoft, the Canadian and U.S. DoD (Department of Defense), DISA (Defense Information System Agency), the Marine Corps, Bank of America, JP Morgan Chase, and many Top 100 companies. Prior to his work with Vigi-lar, Clement was employed by SANS as one of the three lead courseware developers for the Institute. All total, he has served over 20 years as a communication and IT specialist in the army signal corps for the Canadian Department of National Defense (DND).
FM.indd viFM.indd vi 10/9/2007 2:00:05 PM10/9/2007 2:00:05 PM
-
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
CONTENTS AT A GLANCE
Chapter 1 Becoming a CISSP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Chapter 2 Security Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Chapter 3 Information Security and Risk Management . . . . . . . . . . . . . . . . . . 53
Chapter 4 Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Chapter 5 Security Architecture and Design . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Chapter 6 Physical and Environmental Security . . . . . . . . . . . . . . . . . . . . . . . . 401
Chapter 7 Telecommunications and Network Security . . . . . . . . . . . . . . . . . . 481
Chapter 8 Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659
Chapter 9 Business Continuity and Disaster Recovery . . . . . . . . . . . . . . . . . . 769
Chapter 10 Legal, Regulations, Compliance, and Investigations . . . . . . . . . . . . . 835
Chapter 11 Application Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 905
Chapter 12 Operations Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1027
Appendix About the CD-ROM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1109
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1113
vii
FM.indd viiFM.indd vii 10/9/2007 2:00:06 PM10/9/2007 2:00:06 PM
-
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
FM.indd viiiFM.indd viii 10/9/2007 2:00:06 PM10/9/2007 2:00:06 PM
-
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
CONTENTS
Foreword . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiiiAcknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvIntroduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvii
Chapter 1 Becoming a CISSP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1Why Become a CISSP? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1The CISSP Exam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2CISSP: A Brief History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8How Do You Become a CISSP? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8Recertification Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9What Does This Book Cover? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10Tips for Taking the CISSP Exam . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10How to Use This Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Chapter 2 Security Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19How Security Became an Issue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19Areas of Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22Benign to Scary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Evidence of the Evolution of Hacking . . . . . . . . . . . . . . . . . . 24How Are Nations Affected? . . . . . . . . . . . . . . . . . . . . . . . . . . . 27How Are Companies Affected? . . . . . . . . . . . . . . . . . . . . . . . . 29The U.S. Governments Actions . . . . . . . . . . . . . . . . . . . . . . . . 31So What Does This Mean to Us? . . . . . . . . . . . . . . . . . . . . . . . 34
Hacking and Attacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35Internet and Web Activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Two-Tier Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40Database Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
A Layered Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44An Architectural View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
A Layer Missed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48Bringing the Layers Together . . . . . . . . . . . . . . . . . . . . . . . . . 48
Politics and Laws . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Chapter 3 Information Security and Risk Management . . . . . . . . . . . . . . . . . . 53Security Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Security Management Responsibilities . . . . . . . . . . . . . . . . . . 54The Top-Down Approach to Security . . . . . . . . . . . . . . . . . . . 55
ix
FM.indd ixFM.indd ix 10/9/2007 2:00:06 PM10/9/2007 2:00:06 PM
-
CISSP All-in-One Exam Guide
x
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
Security Administration and Supporting Controls . . . . . . . . . . . . . 56Fundamental Principles of Security . . . . . . . . . . . . . . . . . . . . 59Security Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61Security Through Obscurity . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Organizational Security Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65Security Program Components . . . . . . . . . . . . . . . . . . . . . . . . 67Business Requirements: Private Industry vs. Military
Organizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80Information Risk Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Who Really Understands Risk Management? . . . . . . . . . . . . . 81Information Risk Management Policy . . . . . . . . . . . . . . . . . . 82The Risk Management Team . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Risk Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83The Risk Analysis Team . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84The Value of Information and Assets . . . . . . . . . . . . . . . . . . . 85Costs That Make Up the Value . . . . . . . . . . . . . . . . . . . . . . . . 86Identifying Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87Failure and Fault Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89Quantitative Risk Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . 92Qualitative Risk Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98Quantitative vs. Qualitative . . . . . . . . . . . . . . . . . . . . . . . . . . 100Protection Mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102Putting It Together . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105Total Risk vs. Residual Risk . . . . . . . . . . . . . . . . . . . . . . . . . . . 106Handling Risk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Policies, Standards, Baselines, Guidelines, and Procedures . . . . . . 109Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112Baselines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Information Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117Private Business vs. Military Classifications . . . . . . . . . . . . . . 117Classification Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Layers of Responsibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122Whos Involved? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123The Data Owner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130The Data Custodian . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131The System Owner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131The Security Administrator . . . . . . . . . . . . . . . . . . . . . . . . . . . 131The Security Analyst . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132The Application Owner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132The Supervisor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132The Change Control Analyst . . . . . . . . . . . . . . . . . . . . . . . . . . 132The Data Analyst . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
FM.indd xFM.indd x 10/9/2007 2:00:07 PM10/9/2007 2:00:07 PM
-
Contents
xi
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
The Process Owner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133The Solution Provider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133The User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134The Product Line Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . 134The Auditor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134Why So Many Roles? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134Personnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135Hiring Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136Employee Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138Termination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Security-Awareness Training . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139Different Types of Security-Awareness Training . . . . . . . . . . . 140Evaluating the Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141Specialized Security Training . . . . . . . . . . . . . . . . . . . . . . . . . 142
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143Quick Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Chapter 4 Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155Access Controls Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157Integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157Confidentiality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Identification, Authentication, Authorization, and Accountability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Identification and Authentication . . . . . . . . . . . . . . . . . . . . . 160Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Access Control Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210Discretionary Access Control . . . . . . . . . . . . . . . . . . . . . . . . . 211Mandatory Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . 212Role-Based Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
Access Control Techniques and Technologies . . . . . . . . . . . . . . . . . 217Rule-Based Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . 217Constrained User Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . 218Access Control Matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219Content-Dependent Access Control . . . . . . . . . . . . . . . . . . . . 221Context-Dependent Access Control . . . . . . . . . . . . . . . . . . . . 221
Access Control Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222Centralized Access Control Administration . . . . . . . . . . . . . . 223Decentralized Access Control Administration . . . . . . . . . . . . 230
Access Control Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230Access Control Layers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231Administrative Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
FM.indd xiFM.indd xi 10/9/2007 2:00:08 PM10/9/2007 2:00:08 PM
-
CISSP All-in-One Exam Guide
xii
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
Physical Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233Technical Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Access Control Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237Preventive: Administrative . . . . . . . . . . . . . . . . . . . . . . . . . . . 239Preventive: Physical . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239Preventive: Technical . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
Accountability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243Review of Audit Information . . . . . . . . . . . . . . . . . . . . . . . . . 245Keystroke Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245Protecting Audit Data and Log Information . . . . . . . . . . . . . . 246
Access Control Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246Unauthorized Disclosure of Information . . . . . . . . . . . . . . . . 247
Access Control Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250Intrusion Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250Intrusion Prevention Systems . . . . . . . . . . . . . . . . . . . . . . . . . 260
A Few Threats to Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263Dictionary Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263Brute Force Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264Spoofing at Logon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269Quick Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
Chapter 5 Security Architecture and Design . . . . . . . . . . . . . . . . . . . . . . . . . . 279Computer Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
The Central Processing Unit . . . . . . . . . . . . . . . . . . . . . . . . . . 281Multiprocessing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286Operating System Architecture . . . . . . . . . . . . . . . . . . . . . . . . 287Process Activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294Memory Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296Memory Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298Virtual Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306CPU Modes and Protection Rings . . . . . . . . . . . . . . . . . . . . . . 308Operating System Architecture . . . . . . . . . . . . . . . . . . . . . . . . 310Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312Layering and Data Hiding . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312The Evolution of Terminology . . . . . . . . . . . . . . . . . . . . . . . . 314Virtual Machines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315Additional Storage Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . 317Input/Output Device Management . . . . . . . . . . . . . . . . . . . . . 317
System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321Defined Subsets of Subjects and Objects . . . . . . . . . . . . . . . . 322Trusted Computing Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323Security Perimeter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326Reference Monitor and Security Kernel . . . . . . . . . . . . . . . . . 327
blind folio: xii
FM.indd xiiFM.indd xii 10/9/2007 2:00:08 PM10/9/2007 2:00:08 PM
-
Contents
xiii
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328Least Privilege . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Security Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330State Machine Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331The Bell-LaPadula Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333The Biba Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336The Clark-Wilson Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338The Information Flow Model . . . . . . . . . . . . . . . . . . . . . . . . . 342The Noninterference Model . . . . . . . . . . . . . . . . . . . . . . . . . . 345The Lattice Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346The Brewer and Nash Model . . . . . . . . . . . . . . . . . . . . . . . . . . 348The Graham-Denning Model . . . . . . . . . . . . . . . . . . . . . . . . . 349The Harrison-Ruzzo-Ulman Model . . . . . . . . . . . . . . . . . . . . . 349
Security Modes of Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351Dedicated Security Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352System High-Security Mode . . . . . . . . . . . . . . . . . . . . . . . . . . 352Compartmented Security Mode . . . . . . . . . . . . . . . . . . . . . . . 352Multilevel Security Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353Trust and Assurance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
Systems Evaluation Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356Why Put a Product Through Evaluation? . . . . . . . . . . . . . . . . 356The Orange Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
The Orange Book and the Rainbow Series . . . . . . . . . . . . . . . . . . . . 361The Red Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
Information Technology Security Evaluation Criteria . . . . . . . . . . . 364Common Criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366Certification vs. Accreditation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
Certification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370Accreditation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
Open vs. Closed Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372Open Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372Closed Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
Enterprise Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373A Few Threats to Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
Maintenance Hooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382Time-of-Check/Time-of-Use Attacks . . . . . . . . . . . . . . . . . . . . 383Buffer Overflows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388Quick Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397
Chapter 6 Physical and Environmental Security . . . . . . . . . . . . . . . . . . . . . . . . 401Introduction to Physical Security . . . . . . . . . . . . . . . . . . . . . . . . . . . 401The Planning Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
Crime Prevention Through Environmental Design . . . . . . . . 409Designing a Physical Security Program . . . . . . . . . . . . . . . . . 414
FM.indd xiiiFM.indd xiii 10/9/2007 2:00:09 PM10/9/2007 2:00:09 PM
-
CISSP All-in-One Exam Guide
xiv
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
Protecting Assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428Internal Support Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
Electric Power . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430Environmental Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436Ventilation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438Fire Prevention, Detection, and Suppression . . . . . . . . . . . . . 438
Perimeter Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446Facility Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447Personnel Access Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . 454External Boundary Protection Mechanisms . . . . . . . . . . . . . . 455Intrusion Detection Systems . . . . . . . . . . . . . . . . . . . . . . . . . . 464Patrol Force and Guards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467Dogs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468Auditing Physical Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468Testing and Drills . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470Quick Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
Chapter 7 Telecommunications and Network Security . . . . . . . . . . . . . . . . . . 481Open Systems Interconnection Reference Model . . . . . . . . . . . . . . . 483
Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483Application Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487Presentation Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487Session Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489Transport Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490Network Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491Data Link Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492Physical Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494Functions and Protocols in the OSI Model . . . . . . . . . . . . . . 494Tying the Layers Together . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496
TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497TCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504IPv6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505
Types of Transmission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505Analog and Digital . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505Asynchronous and Synchronous . . . . . . . . . . . . . . . . . . . . . . 507Broadband and Baseband . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507
LAN Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508Network Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509LAN Media Access Technologies . . . . . . . . . . . . . . . . . . . . . . . 512Cabling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519Transmission Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524Media Access Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . 525LAN Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529
FM.indd xivFM.indd xiv 10/9/2007 2:00:10 PM10/9/2007 2:00:10 PM
-
Contents
xv
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
Routing Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532Networking Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536
Repeaters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536Bridges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545PBXs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548Honeypot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 566Network Segregation and Isolation . . . . . . . . . . . . . . . . . . . . 567
Networking Services and Protocols . . . . . . . . . . . . . . . . . . . . . . . . . 567Network Operating Systems . . . . . . . . . . . . . . . . . . . . . . . . . . 567Domain Name Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 569Network Information System . . . . . . . . . . . . . . . . . . . . . . . . . 573Directory Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575Lightweight Directory Access Protocol . . . . . . . . . . . . . . . . . . 576Network Address Translation . . . . . . . . . . . . . . . . . . . . . . . . . 577
Intranets and Extranets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579Metropolitan Area Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 581Wide Area Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583
Telecommunications Evolution . . . . . . . . . . . . . . . . . . . . . . . 583Dedicated Links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 586WAN Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 589
Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603Dial-Up and RAS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603ISDN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604DSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606Cable Modems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608Authentication Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614Remote Access Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616
Wireless Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 618Wireless Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . 618WLAN Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 621Wireless Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623WAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635i-Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 636Mobile Phone Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637War Driving for WLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639Satellites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6403G Wireless Communication . . . . . . . . . . . . . . . . . . . . . . . . . 641
Rootkits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643Spyware and Adware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645Instant Messaging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 647
FM.indd xvFM.indd xv 10/9/2007 2:00:11 PM10/9/2007 2:00:11 PM
-
CISSP All-in-One Exam Guide
xvi
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
Quick Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 647Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655
Chapter 8 Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659The History of Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 660Cryptography Definitions and Concepts . . . . . . . . . . . . . . . . . . . . . 665
Kerckhoffs Principle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668The Strength of the Cryptosystem . . . . . . . . . . . . . . . . . . . . . . 668Services of Cryptosystems . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669One-Time Pad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671Running and Concealment Ciphers . . . . . . . . . . . . . . . . . . . . 673Steganography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 674
Governmental Involvement in Cryptography . . . . . . . . . . . . . . . . . . 675Types of Ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 676
Substitution Ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677Transposition Ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677
Methods of Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 679Symmetric vs. Asymmetric Algorithms . . . . . . . . . . . . . . . . . . 679Block and Stream Ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . 685Hybrid Encryption Methods . . . . . . . . . . . . . . . . . . . . . . . . . . 689
Types of Symmetric Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695Data Encryption Standard . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696Triple-DES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703The Advanced Encryption Standard . . . . . . . . . . . . . . . . . . . . 703International Data Encryption Algorithm . . . . . . . . . . . . . . . 704Blowfish . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704RC4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705RC5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705RC6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705
Types of Asymmetric Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 706The Diffie-Hellman Algorithm . . . . . . . . . . . . . . . . . . . . . . . . 706RSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 708El Gamal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 711Elliptic Curve Cryptosystems . . . . . . . . . . . . . . . . . . . . . . . . . 712LUC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713Knapsack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713Zero Knowledge Proof . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713
Message Integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713The One-Way Hash . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 714Various Hashing Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . 718Attacks Against One-Way Hash Functions . . . . . . . . . . . . . . . 721Digital Signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 722Digital Signature Standard . . . . . . . . . . . . . . . . . . . . . . . . . . . 725
Public Key Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 725Certificate Authorities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 726
FM.indd xviFM.indd xvi 10/9/2007 2:00:12 PM10/9/2007 2:00:12 PM
-
Contents
xvii
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 729The Registration Authority . . . . . . . . . . . . . . . . . . . . . . . . . . . 729PKI Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 730
Key Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 732Key Management Principles . . . . . . . . . . . . . . . . . . . . . . . . . . 733Rules for Keys and Key Management . . . . . . . . . . . . . . . . . . . 734
Link Encryption vs. End-to-End Encryption . . . . . . . . . . . . . . . . . . . 735E-mail Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
Multipurpose Internet Mail Extension . . . . . . . . . . . . . . . . . . 738Privacy-Enhanced Mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 738Message Security Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . 739Pretty Good Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 739Quantum Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 741
Internet Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 743Start with the Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 743
Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753Cipher-Only Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753Known-Plaintext Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753Chosen-Plaintext Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . 754Chosen-Ciphertext Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . 754Differential Cryptanalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755Linear Cryptanalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755Side-Channel Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755Replay Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756Algebraic Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756Analytic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756Statistical . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757Quick Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 758
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 761Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 765
Chapter 9 Business Continuity and Disaster Recovery . . . . . . . . . . . . . . . . . . 769Business Continuity and Disaster Recovery . . . . . . . . . . . . . . . . . . . 770
Business Continuity Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . 772Making BCP Part of the Security Policy and Program . . . . . . 774Project Initiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 776
Business Continuity Planning Requirements . . . . . . . . . . . . . . . . . . 778Business Impact Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 778Preventive Measures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 786Recovery Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 786Business Process Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . 788Facility Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 789Supply and Technology Recovery . . . . . . . . . . . . . . . . . . . . . . 795The End-User Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . 800Data Backup Alternatives . . . . . . . . . . . . . . . . . . . . . . . . . . . . 801
FM.indd xviiFM.indd xvii 10/9/2007 2:00:13 PM10/9/2007 2:00:13 PM
-
CISSP All-in-One Exam Guide
xviii
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
Electronic Backup Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . 803Choosing a Software Backup Facility . . . . . . . . . . . . . . . . . . . 806Insurance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 808Recovery and Restoration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 809Developing Goals for the Plans . . . . . . . . . . . . . . . . . . . . . . . 814Implementing Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 815Testing and Revising the Plan . . . . . . . . . . . . . . . . . . . . . . . . . 816Maintaining the Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 821
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 825Quick Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 825
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 827Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832
Chapter 10 Legal, Regulations, Compliance, and Investigations . . . . . . . . . . . . . 835The Many Facets of Cyberlaw . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 836The Crux of Computer Crime Laws . . . . . . . . . . . . . . . . . . . . . . . . . 836Complexities in Cybercrime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 839
Electronic Assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 842The Evolution of Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 842Different Countries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 844Types of Laws . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 846
Intellectual Property Laws . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 849Trade Secret . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 849Copyright . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 850Trademark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 850Patent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 851Internal Protection of Intellectual Property . . . . . . . . . . . . . . 851Software Piracy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 852
Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 853Laws, Directives, and Regulations . . . . . . . . . . . . . . . . . . . . . . 854Employee Privacy Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 859
Liability and Its Ramifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 861Personal Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 864Hacker Intrusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 865
Investigations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 866Incident Response . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 866Incident Response Procedures . . . . . . . . . . . . . . . . . . . . . . . . 869
Computer Forensics and Proper Collection of Evidence . . . . . . . . . 872International Organization on Computer Evidence . . . . . . . . 873Motive, Opportunity, and Means . . . . . . . . . . . . . . . . . . . . . . 874Incident Investigators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 875The Forensics Investigation Process . . . . . . . . . . . . . . . . . . . . 876What Is Admissible in Court? . . . . . . . . . . . . . . . . . . . . . . . . . 880Surveillance, Search, and Seizure . . . . . . . . . . . . . . . . . . . . . . 883Interviewing and Interrogating . . . . . . . . . . . . . . . . . . . . . . . . 884A Few Different Attack Types . . . . . . . . . . . . . . . . . . . . . . . . . 884
FM.indd xviiiFM.indd xviii 10/9/2007 2:00:13 PM10/9/2007 2:00:13 PM
-
Contents
xix
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
Ethics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 888The Computer Ethics Institute . . . . . . . . . . . . . . . . . . . . . . . . 889The Internet Architecture Board . . . . . . . . . . . . . . . . . . . . . . . 890Corporate Ethics Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . 891
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 892Quick Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 892
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 895Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 900
Chapter 11 Application Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 905Softwares Importance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 905Where Do We Place the Security? . . . . . . . . . . . . . . . . . . . . . . . . . . . 906Different Environments Demand Different Security . . . . . . . . . . . . 908Environment vs. Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 908Complexity of Functionality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 909Data Types, Format, and Length . . . . . . . . . . . . . . . . . . . . . . . . . . . . 910Implementation and Default Issues . . . . . . . . . . . . . . . . . . . . . . . . . 910Failure States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 912Database Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 912
Database Management Software . . . . . . . . . . . . . . . . . . . . . . . 913Database Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 914Database Programming Interfaces . . . . . . . . . . . . . . . . . . . . . 919Relational Database Components . . . . . . . . . . . . . . . . . . . . . 921Integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 924Database Security Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 927Data Warehousing and Data Mining . . . . . . . . . . . . . . . . . . . 932
System Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 935Management of Development . . . . . . . . . . . . . . . . . . . . . . . . . 936Life-Cycle Phases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 936Software Development Methods . . . . . . . . . . . . . . . . . . . . . . . 950Computer-Aided Software Engineering . . . . . . . . . . . . . . . . . 952Prototyping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 953Change Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 953The Capability Maturity Model . . . . . . . . . . . . . . . . . . . . . . . . 955Software Escrow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 957
Application Development Methodology . . . . . . . . . . . . . . . . . . . . . 957Object-Oriented Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . 958Data Modeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 966Software Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 966Data Structures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 967Cohesion and Coupling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 967
Distributed Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 969CORBA and ORBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 969COM and DCOM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 971Enterprise JavaBeans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 972Object Linking and Embedding . . . . . . . . . . . . . . . . . . . . . . . 973Distributed Computing Environment . . . . . . . . . . . . . . . . . . 974
FM.indd xixFM.indd xix 10/9/2007 2:00:14 PM10/9/2007 2:00:14 PM
-
CISSP All-in-One Exam Guide
xx
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
Expert Systems and Knowledge-Based Systems . . . . . . . . . . . . . . . . 975Artificial Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 977Web Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 979
Vandalism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 980Financial Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 980Privileged Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 980Theft of Transaction Information . . . . . . . . . . . . . . . . . . . . . . 981Theft of Intellectual Property . . . . . . . . . . . . . . . . . . . . . . . . . 981Denial-of-Service (DoS) Attacks . . . . . . . . . . . . . . . . . . . . . . . 981Create a Quality Assurance Process . . . . . . . . . . . . . . . . . . . . 982Web Application Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . 982Intrusion Prevention Systems . . . . . . . . . . . . . . . . . . . . . . . . . 982Implement SYN Proxies on the Firewall . . . . . . . . . . . . . . . . . 982Specific Threats for Web Environments . . . . . . . . . . . . . . . . . 983
Mobile Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 992Java . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 993ActiveX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 995Malicious Software (Malware) . . . . . . . . . . . . . . . . . . . . . . . . 995Antivirus Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1001Spam Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1004Anti-Malware Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1005
Patch Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1006Step 1: Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1007Step 2: Research . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1007Step 3: Assess and Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1007Step 4: Mitigation (Rollback) . . . . . . . . . . . . . . . . . . . . . . . 1008Step 5: Deployment (Rollout) . . . . . . . . . . . . . . . . . . . . . . . 1008Step 6: Validation, Reporting, and Logging . . . . . . . . . . . . . . 1008Limitations to Patching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1008Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1009Anything Else? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1009Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1009
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1014Quick Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1014
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1018Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1023
Chapter 12 Operations Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1027The Role of the Operations Department . . . . . . . . . . . . . . . . . . . . . 1028Administrative Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1028
Security and Network Personnel . . . . . . . . . . . . . . . . . . . . . . . 1031Accountability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1032Clipping Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1033
Assurance Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1034Operational Responsibilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1034
Unusual or Unexplained Occurrences . . . . . . . . . . . . . . . . . . 1035
FM.indd xxFM.indd xx 10/9/2007 2:00:15 PM10/9/2007 2:00:15 PM
-
Contents
xxi
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
Deviations from Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . 1035Unscheduled Initial Program Loads (a.k.a. Rebooting) . . . . . 1036Asset Identification and Management . . . . . . . . . . . . . . . . . . 1036System Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1037Trusted Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1038Input and Output Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . 1040System Hardening . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1042Remote Access Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1044
Configuration Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1045Change Control Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1045Change Control Documentation . . . . . . . . . . . . . . . . . . . . . . 1047
Media Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1048Data Leakage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1054Network and Resource Availability . . . . . . . . . . . . . . . . . . . . . . . . . . 1056
Mean Time Between Failures (MTBF) . . . . . . . . . . . . . . . . . . . 1057Mean Time to Repair (MTTR) . . . . . . . . . . . . . . . . . . . . . . . . . 1058Single Points of Failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1058Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1066Contingency Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1070
Mainframes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1070E-mail Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1072
How E-mail Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1074Facsimile Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1076Hack and Attack Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1078
Vulnerability Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1087Penetration Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1090Wardialing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1094Other Vulnerability Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1095Postmortem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1097
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1099Quick Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1099
Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1101Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1106
Appendix About the CD-ROM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1109Running the QuickTime Cryptography Video Sample . . . . . . . . . . . 1110
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1111Installing Total Seminars Test Software . . . . . . . . . . . . . . . . . . . . . . 1111
Navigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1111Practice Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1111Final Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1111Minimum System Requirements for Total Seminars
Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1112Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1112
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1113
FM.indd xxiFM.indd xxi 10/9/2007 2:00:16 PM10/9/2007 2:00:16 PM
-
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
FM.indd xxiiFM.indd xxii 10/9/2007 2:00:17 PM10/9/2007 2:00:17 PM
-
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
FOREWORD
As a teacher and practitioner of computer security, I am often asked the same two questions: How do I learn the basics of computer security to perform my job better, and how do I keep up to date on the latest security standards and practices?
The first recorded computer incident occurred in 1958, and the first federally prosecuted crime identified as a computer crime involved modifying records at a bank in Minnesota in 1966. In the 1960s and 1970s, computer security was not taken seriously because it was not re-quired as it is today. In 1976, the FBI established a four-week training course for its agents in the investigation of computer crime. Then, in 1977, Senator Ribicoff introduced the Federal Com-puter Systems Protection Act bill, which eventually became the Computer Fraud and Abuse Act of 1986. The publication 2600: The Hacker Quarterly was started in 1984 (containing instructions on how to hack telecommunication systems and computers), and additional sources of com-puter security where illegal copies of software were made available to everyone (warez sites) were established around the world. Toward the end of the 1980s, new security products were being introduced into the marketplace and organizations were beginning to realize they needed a se-curity specialist to help augment their traditional information technology departments.
I mention the FBI training course and the advent of the 2600 publication because these two events were crucial to starting the process of capturing and codifying a set of guidelines relating to the security practitioner. If you look at the history of how computer security has evolved into what it is today, one thing stands out above all elsethe control of information.
Nearly 20 years after the Morris worm wreaked havoc across the Internet, we still find our-selves struggling to patch systems, learn about the newest vendor vulnerabilities, and obtain information from our peers about potential trouble circulating through systems around the globe. For any IT professional, keeping up with new technologies, the associated business demands, and related security knowledge required to keep it all safe is a daunting task. The human element still remains the biggest single point of weakness when dealing with techno-logical advancement and change.
The good news is that progress has been made in the area of providing information related to industry best practices and knowledge sharing. The National Security Agency has certified 59 colleges and universities as Centers of Excellence for teaching information assurance, with many more programs being developed and certified every year. Training organizations now in-clude security topics along with other sources of IT and business training. Information Sharing and Analysis Centers (ISACs) have been established for all sectors of our nations critical infra-structure. The National Institute of Standards and Technology (NIST) and other organizations are now publishing technical standards for security of the technologies that organizations rely upon to run their operations.
Shon Harris started this book in 2001 as a way of codifying a set of best practices that could also be used to satisfy the requirements for passing the CISSP exam. She has accom-plished both tasks extremely well, and as one of the best-selling security books, IT profession-als are increasingly using this resource as a way of solidifying their security knowledge. I often use this book as an answer to the questions I described earlier, referring students to start with this book as a foundation upon which to build their security knowledge set. Obtaining the CISSP is a worthy objective, but absorbing the knowledge contained within this book will serve to make you a better security practitioner.
Jeff RecorSecurity Management Center of ExcellenceDeloitte & Touche LLP xxiii
FM.indd xxiiiFM.indd xxiii 10/9/2007 2:00:17 PM10/9/2007 2:00:17 PM
-
CISSP All-in-One Exam Guide
xxiv
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
Over the last 15 to 20 years, Information Security has evolved from an obscure disci-pline found primarily in government institutions, the military, and financial institu-tions to become a mainstream activity practiced in most large and medium-sized com-panies around the world.
Numerous and varied factors have brought information security to where it is today. These include (partial list):
The growth of the Internet. Ubiquitous connectivity, along with anonymity, have combined to make a complex and challenging threat landscape.
The continued migration of the vast majority of corporate information and intellectual property into digital forms, which are then connected to the Internet, has provided a target-rich environment for those wishing to acquire such data.
The rapid growth in outsourcing has required that companies completely rethink the controls that their outsourced service provider implement to protect their corporate data and intellectual property.
We have seen an explosion of laws such as Sarbanes Oxley (SOX), the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Act (GLBA), Californias SB1386, the Family Educational Rights and Privacy Act (FERPA), the Communications Assistance for Law Enforcement Act (CALEA), the OECD privacy guidelines, and the Payment Card Industry Data Security Standards (PCI).
These laws, combined with the very public and embarrassing breaches that a number of companies and government entities have suffered (such as ChoicePoint, Bank of America, the Georgia DMV, CardSystems, La Salle Bank, ABN AMRO Mortgage Group, and The Department of Agriculture), have all contributed to the raising of this awareness.
This raised awareness has translated into a huge demand for skilled and experienced Infor-mation Security professionals around the world. It is my belief that the demand will not slow down anytime soon, chiefly due to a constantly expanding and mutating threat landscape that is rooted in the continued migration of corporate data into electronic form, ubiquitous con-nectivity, and the highly competitive globalized marketplace.
I am often asked by people wanting to get into information security, How can I become an Information Security Practitioner? Where do I start? I consistently tell them they need two things: a thorough education as to what information security is, and solid real-world experi-ence. I also recommend they read and thoroughly understand Shon Harriss CISSP study guide and then get their CISSP certification. This is a wonderful start that should be combined with both extensive experience and the practical application of the information security principals and concepts outlined in this book.
I have had the honor of knowing Shon both as a friend and co-worker. She has an unbe-lievably detailed and thorough understanding of this subject, which is reflected in the current edition of the book you are currently holding. The pages herein have been updated and ex-panded since the first edition. It is superbly laid out and well written, making it easy to under-stand for anyone wanting to become an Information Security Practitioner. I would highly recommend this work to anyone.
Russell WalkerVice President, Information Security
Warner Bros. Entertainment Inc.
FM.indd xxivFM.indd xxiv 10/9/2007 2:00:17 PM10/9/2007 2:00:17 PM
-
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
ACKNOWLEDGMENTS
I would like to thank Sam Tomaino for attempting to explain to me many, many years ago how computers work; Dan Ferguson for never complaining about the bombard-ment of questions I continually fling his way and for fostering my never-ceasing curios-ity and quest for knowledge; and my Dad (Tom Conlon), who had the courage to re-new and deepen our relationship. Each one of these people has helped me write this book in more ways than they will ever know.
For my fourth edition, I would also like to thank the following individuals for tak-ing the time to help me with some new topics:
Dr. Burt Kaliski, vice president of research at RSA Security and chief scientist of its research center, RSA Laboratories. Thanks for answering those questions that no one else could!
Dr. Dorothy Denning, professor in the Department of Defense Analysis at the Naval Postgraduate School, for always graciously answering my questions whenever Ive hit a wall.
David Miller, whose work ethic, loyalty, and friendship have inspired me. I am truly grateful to have David as part of my life. I never would have known the secret world of tequila without him.
Allen Harper, whose knowledge, impeccable character, and honesty have made him a role model to many in this worldincluding myself. He is an officer in the Marines who voluntarily went to war (Baghdad, Iraq) this year (2007); we are all thankful for your dedication and sacrifices for all of us, Allen.
Clement Dupuis, who, with his deep passion for sharing and helping others, has proven a wonderful and irreplaceable mentor and friend.
Jay Libove, whose knowledge base about information security is extremely advanced. I hope to grow up and be as smart as he is one day.
Mike Lester, who is probably the smartest and funniest guy I have ever known, and really comes through when I need him the most. Thanks a lot, Sparky. We will work on getting you to understand the months of the year and where static electricity comes from.
Joe Hoofnagle, who has always been there when I needed help, is a good friend, and is the only person with whom I play Twister through e-mail.
Jason Radar, who helped me when I called upon him as the deadlines for this monster of a book loomed over me. I am looking forward to you being a new member of our Logical Security team!
Tom and Kathy Conlon, my parents. Without their love and support, my life would be a whole lot different today.
Most especially, I would like to thank my husband, David Harris, for his continual support and love. Without his steadfast confidence in me, I would not have been able to accomplish half the things I have taken on in my life. xxv
FM.indd xxvFM.indd xxv 10/9/2007 2:00:17 PM10/9/2007 2:00:17 PM
-
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
FM.indd xxviFM.indd xxvi 10/9/2007 2:00:18 PM10/9/2007 2:00:18 PM
-
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
INTRODUCTION
Computer, information, and physical security are becoming more important at an ex-ponential rate since the continual increase in computer crimes. Over the last few years, the necessity for computer and information security has grown rapidly as web sites have been defaced, Denial-of-Service attacks have increased, credit card information has been stolen, publicly available hacking tools have become more sophisticated, and todays viruses and worms cause more damage than ever before.
Companies have had to spend millions of dollars to clean up the effects of these issues and millions of dollars more to secure their perimeter and internal networks with equipment, software, consultants, and education. But after September 11, 2001, the necessity and urgency for this type of security has taken on a new paradigm. It is slowly becoming apparent that governments, nations, and societies are vulnerable to many different types of attacks that can happen over the network wire and airwaves. Societies depend heavily on all types of computing power and functionality, mostly provided by the public and private sectors. This means that although governments are responsible for protecting their citizens, it is becoming apparent that the citizens and their businesses must become more secure to protect the nation as a whole.
This type of protection can really only begin through proper education and under-standing, and must continue with the dedicated execution of this knowledge. This book is written to provide a foundation of the many different areas that make up effective security. We need to understand all of the threats and dangers we are vulnerable to and the steps that must be taken to mitigate these vulnerabilities.
xxvii
FM.indd xxviiFM.indd xxvii 10/9/2007 2:00:18 PM10/9/2007 2:00:18 PM
-
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
FM.indd xxviFM.indd xxvi 10/9/2007 2:00:18 PM10/9/2007 2:00:18 PM
-
CHAPTER
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
1Becoming a CISSPThis chapter presents the following
The definition of a CISSP Reasons to become a CISSP What the CISSP exam entails The Common Body of Knowledge and what it contains The history of (ISC)2 and the CISSP exam Recertification requirements An assessment test to gauge your current knowledge of security
This book is intended not only to provide you with the necessary information to help you gain a CISSP certification, but also to welcome you into the exciting and challeng-ing world of security.
The Certified Information Systems Security Professional (CISSP) exam covers ten different subjects, more commonly referred to as domains. The subject matter of each domain can easily be seen as its own area of study, and in many cases individuals work exclusively in these fields as experts. For many of these subjects, extensive resources can be consulted and referenced to become an expert in that area. Because of this, a com-mon misconception is that the only way to succeed at the CISSP exam is to immerse yourself in a massive stack of texts and study materials. Fortunately, an easier approach exists. By using this fourth edition of the CISSP All-in-One Exam Guide, you can success-fully complete and pass the CISSP exam and achieve your CISSP certification. The goal of this book is to combine into a single resource all the information you need to pass the CISSP exam. This book should also serve as a useful reference tool long after youve achieved your CISSP certification.
Why Become a CISSP?As our world changes, the need for improvements in security and technology continues to grow. Security was once a hot issue only in the field of technology, but now it is be-coming more and more a part of our everyday lives. Security is a concern of every orga-nization, government agency, corporation, and military unit. Ten years ago computer and information security was an obscure field that only concerned a few people. Because the risks were essentially low, few were interested in security expertise. Ethical hacking
1
ch01.indd 1ch01.indd 1 10/5/2007 11:30:12 AM10/5/2007 11:30:12 AM
-
CISSP All-in-One Exam Guide
2
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
and vulnerability assessments required great talent and knowledge and thus were not a common practice.
Things have changed, however, and today corporations and other organizations are desperate to recruit talented and experienced security professionals to help protect the resources they depend on to run their businesses and to remain competitive. With a CISSP certification, you will be seen as a security professional of proven ability who has successfully met a predefined standard of knowledge and experience that is well under-stood and respected throughout the industry. By keeping this certification current, you will demonstrate your dedication to staying abreast of security developments.
Reasons for attaining a CISSP certification:
To meet the growing demand and to thrive in an ever-expanding field
To broaden your current knowledge of security concepts and practices
To bring security expertise to your current occupation
To become more marketable in a competitive workforce
To show a dedication to the security discipline
To increase your salary and be eligible for more employment opportunities
The CISSP certification helps companies identify which individuals have the ability, knowledge, and experience necessary to implement solid security practices, perform risk analysis, identify necessary countermeasures, and help the organization as a whole protect its facility, network, systems, and information. The CISSP certification also shows potential employers you have achieved a level of proficiency and expertise in skill sets and knowledge required by the security industry. The increasing importance placed on security in corporate success will only continue in the future, leading to even greater demands for highly skilled security professionals. CISSP certification shows that a respected third-party organization has recognized an individuals technical and theo-retical knowledge and expertise, and distinguishes that individual from those who lack this level of knowledge.
Understanding and implementing security practices is an essential part of being a good network administrator, programmer, or engineer. Job descriptions that do not specifically target security professionals still often require that a potential candidate have a good understanding of security concepts as well as how to implement them. Due to staff size and budget restraints, many organizations cant afford separate network and security staffs. But this doesnt mean they dont believe security is vital to their or-ganization. Thus, they often try to combine knowledge of technology and security into a single role. With a CISSP designation, you can put yourself head and shoulders above other individuals in this regard.
The CISSP ExamTo meet the certification requirements of a CISSP, you must have one of the following:
Five years professional experience in two (or more) of the domains within the Common Body of Knowledge (CBK).
ch01.indd 2ch01.indd 2 10/5/2007 11:30:19 AM10/5/2007 11:30:19 AM
-
Chapter 1: Becoming a CISSP
3
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
Four years experience in two (or more) of the ten domains, and a four-year college degree or masters degree in information security from a National Center of Excellence.
At least three years experience in two (or more) of the ten domains and a four-year college degree or masters degree in information security from a National Center of Excellence, plus a professional certification from the following list (candidates are permitted a waiver of one year of experience for any credential on the approved credentials list):
CERT Certified Computer Security Incident Handler (CSIH)
Certified Business Continuity Planner (CBCP)
Certified Computer Crime Investigator (Advanced) (CCCI)
Certified Computer Crime Prosecutor
Certified Computer Examiner (CCE)
Certified Fraud Examiner (CFE)
Certified Information Systems Auditor (CISA)
Certified Information Security Manager (CISM)
Certified Internal Auditor (CIA)
Certified Protection Professional (CPP)
Certified Wireless Security Professional (CWSP)
CompTIA Security+
Computer Forensic Computer Examiner (CFCE)
GIAC Security Essentials Certification (GSEC)
GIAC Certified Firewall Analyst (GCFW)
GIAC Certified Intrusion Analyst (GCIA)
GIAC Certified Incident Handler (GCIH)
GIAC Certified Windows Security Administrator (GCWN)
GIAC Certified UNIX Security Administrator (GCUX)
GIAC Certified Forensic Analyst (GCFA)
GIAC Information Security Officer (GISO)
GIAC IT Security Audit Essentials (GSAE)
GIAC Security Expert (GSE)
GIAC Certified ISO-17799 Specialist (G7799)
GIAC Security Leadership Certification (GSLC)
GIAC Systems and Network Auditor (GSNA)
GIAC Certified Security Consultant (GCSC)
Microsoft Certified Systems Administrator (MCSA)
Microsoft Certified Systems Engineer (MCSE)
Master Business Continuity Planner (MBCP)
System Security Certified Practitioner (SSCP)
ch01.indd 3ch01.indd 3 10/5/2007 11:30:20 AM10/5/2007 11:30:20 AM
-
CISSP All-in-One Exam Guide
4
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
Consult www.isc2.org for a complete list and description of requirements for your CISSP certification.
Because the CISSP exam covers the ten domains making up the CISSP CBK, it is often described as being an inch deep and a mile wide, a reference to the fact that many questions on the exam are not very detailed in nature and do not require you to be an expert in every subject. However, the questions do require you be familiar with many different security subjects.
The CISSP exam is comprised of 250 multiple-choice questions, and you have six hours to complete it. The questions are pulled from a much larger question bank to ensure the exam is as unique as possible for each entrant. In addition, the test bank con-stantly changes and evolves to more accurately reflect the real world of security. The exam questions are continually rotated and replaced in the bank as necessary. Each ques-tion has four answer choices, only one of which is correct. Only 225 questions are grad-ed, while 25 are used for research purposes. The 25 research questions are integrated into the exam, so you wont know which go towards your final grade. To pass the exam, you need a minimum raw score of 700 points out of 1,000. Questions are weighted based on their difficulty; not all questions are worth the same number of points. The exam is not product- or vendor-oriented, meaning no questions will be specific to cer-tain products or vendors (for instance, Windows 2000, Unix, or Cisco). Instead, you will be tested on the security models and methodologies used by these types of systems.
(ISC)2 has also added scenario-based questions to the CISSP exam. These questions present a short scenario to the test taker rather than asking the test taker to identify terms and/or concepts. A scenario-based question would be worded something like John returned from lunch and found that the companys IDS indicated that a critical server has had continuous ICMP traffic sent to it for over 45 minutes, which is taking up 85% of the servers CPU resource. What does John need to do at this point?
The goal of the scenario-based questions is to ensure that test takers not only know and understand the concepts within the CBK, but also can apply this knowledge to real-life situations. This is more practical because in the real world, you wont be challenged by having someone come up to you and ask, What is the definition of collusion? You need to know how to detect and prevent collusion from taking place, in addition to knowing the definition of the term.
NOTE NOTE Hundreds of scenario-based questions have been added to the CD-ROM in the back of this book to help you prepare for this exam.
The International Information Systems Security Certification Consortium (ISC)2 process for earning credentials will change as of October 2007. In order to obtain this credential, candidates for any of the (ISC)2 credential will be required to obtain an en-dorsement of their candidature exclusively from an (ISC)2 certified professional in good standing. The professional endorsing the candidate can hold any (ISC)2 certification, such as the CISSP, SSCP, or CAP. This sponsor will vouch for your years of experience.
ch01.indd 4ch01.indd 4 10/5/2007 11:30:20 AM10/5/2007 11:30:20 AM
-
Chapter 1: Becoming a CISSP
5
All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0
After passing the exam, you will be asked to supply documentation, supported by a sponsor, proving that you indeed have this type of experience. The sponsor must sign a document vouching for the security experience you are submitting. So, make sure you have this sponsor lined up prior to registering for the exam and providing payment. You dont want to pay for and pass the exam, only to find you cant find a sponsor for the final step needed to achieve your certification.
The reason behind the sponsorship requirement is to insure that those who achieve the certification have real-world experience to offer companies. Book knowledge i