CISSP Certification All-in-One Exam Guide

1193

Transcript of CISSP Certification All-in-One Exam Guide

  • ALL IN ONE

    All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0/ blind folio: 00

    CISSP

    E X A M G U I D E

    F o u r t h E d i t i o n

    FM.indd iFM.indd i 10/9/2007 1:59:58 PM10/9/2007 1:59:58 PM

  • All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0 FMblind folio: ii

    FM.indd iiFM.indd ii 10/9/2007 2:00:05 PM10/9/2007 2:00:05 PM

  • ALL IN ONE

    CISSP E X A M G U I D E

    F o u r t h E d i t i o n

    Shon Harris

    New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi

    San Juan Seoul Singapore Sydney Toronto

    All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0 /FMblind folio: iii

    FM.indd iiiFM.indd iii 10/9/2007 2:00:05 PM10/9/2007 2:00:05 PM

  • Cataloging-in-Publication Data is on file with the Library of Congress

    McGraw-Hill books are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. For more information, please write to the Director of Special Sales, Professional Publishing, McGraw-Hill, Two Penn Plaza, New York, NY 10121-2298. Or contact your local bookstore.

    CISSP All-in-One Exam Guide, Fourth Edition

    Copyright 2008 by The McGraw-Hill Companies. All rights reserved. Printed in the United States of America. Except as permitted under the Copyright Act of 1976, no part of this publication may be repro-duced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication.

    1234567890 DOC DOC 01987

    ISBN: Book p/n 978-0-07-149786-2 and CD p/n 978-0-07-149788-6of Set 978-0-07-149787-9

    MHID: Book p/n 0-07-149786-2 and CD p/n 0-07-149788-9of Set 0-07-149787-0

    Sponsoring EditorTimothy Green

    Editorial SupervisorJody McKenzie

    Project EditorLaura Stone

    Acquisitions CoordinatorJennifer Housh

    Technical EditorsJoe Hoofnagle, Clement Dupuis

    Copy EditorMike McGee

    ProofreaderPaul Tyler

    IndexerClaire Splan

    Production SupervisorJames Kussow

    CompositionApollo Publishing Services

    Art Director, CoverJeff Weeks

    Cover DesignerPattie Lee

    Information has been obtained by McGraw-Hill from sources believed to be reliable. However, because of the possibility of human or mechanical error by our sources, McGraw-Hill, or others, McGraw-Hill does not guarantee the accuracy, adequacy, or completeness of any information and is not responsible for any errors or omissions or the results obtained from the use of such information.

    All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0blind folio iv

    FM.indd ivFM.indd iv 10/9/2007 2:00:05 PM10/9/2007 2:00:05 PM

  • I lost my greatest hero this year, George Fairbairn, my Grandpa. He taught me many things about life that cannot be taught in books, but only by example:

    integrity, unconditional love, humility, and the importance of internal strength and courage.

    I dedicate this book to my Grandpa and my wonderful and supportive family. I am truly lucky because most of my best friends are also my family members,

    especially my mother, Kathy Conlon, and my husband, David Harris.

    All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0 FMblind folio: v

    FM.indd vFM.indd v 10/9/2007 2:00:05 PM10/9/2007 2:00:05 PM

  • All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    ABOUT THE AUTHOR

    Shon Harris, CISSP, MCSE, is the president of Logical Security, a security consultant, a former engineer in the Air Forces Information Warfare unit, an instructor, and an au-thor. She has authored two best-selling CISSP books, was a contributing author to Hackers Challenge: Test Your Incident Response Skills Using 20 Scenarios, and a contribut-ing author to Gray Hat Hacking: The Ethical Hackers Handbook (both published by McGraw-Hill). Shon has taught computer and information security to a wide range of clients, some of which have included RSA, Department of Defense, Department of Energy, National Security Agency (NSA), Bank of America, Defense Information Systems Agency (DISA), BMC, West Point, and many more.

    Shon was recognized as one of the top 25 women in the Information Security field by Information Security Magazine.

    About the Technical EditorsJoe Hoofnagle, CISSP, has more than 12 years experience in the field of Information Security, managing and developing security programs for private and commercial busi-nesses. Currently, Joe is the Director of Information Security Services at Magellan Health Services. In this role, he has been tasked with the development of policy and its enforce-ment in the critical areas of computer and network forensics analysis, intrusion detec-tion, regulatory assessment, and risk analysis. As a strategist, Joe created and maintains Magellans security risk modeling and computer forensic programs, which meet the stringent requirements of federal, state, legislative and business contracts. Joe has fos-tered collaborative working relationships with other organizations achieving best secu-rity practices. He is a member of the American Society for Industrial Security (ASIS) and the High Tech Crime Consortium (HTCC).

    Clement Dupuis, CD, CISSP, Security+, GCFW, GCIA, CEH, ECSA, CCSA, CCSE, is a Senior Security Instructor at Vigilar, where he also conducts security and penetration testing. He remains an internationally renowned security professional with vast experi-ence as a trainer and security consultant for some of the worlds largest companies, having taught employees of Microsoft, the Canadian and U.S. DoD (Department of Defense), DISA (Defense Information System Agency), the Marine Corps, Bank of America, JP Morgan Chase, and many Top 100 companies. Prior to his work with Vigi-lar, Clement was employed by SANS as one of the three lead courseware developers for the Institute. All total, he has served over 20 years as a communication and IT specialist in the army signal corps for the Canadian Department of National Defense (DND).

    FM.indd viFM.indd vi 10/9/2007 2:00:05 PM10/9/2007 2:00:05 PM

  • All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    CONTENTS AT A GLANCE

    Chapter 1 Becoming a CISSP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

    Chapter 2 Security Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

    Chapter 3 Information Security and Risk Management . . . . . . . . . . . . . . . . . . 53

    Chapter 4 Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155

    Chapter 5 Security Architecture and Design . . . . . . . . . . . . . . . . . . . . . . . . . . 279

    Chapter 6 Physical and Environmental Security . . . . . . . . . . . . . . . . . . . . . . . . 401

    Chapter 7 Telecommunications and Network Security . . . . . . . . . . . . . . . . . . 481

    Chapter 8 Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659

    Chapter 9 Business Continuity and Disaster Recovery . . . . . . . . . . . . . . . . . . 769

    Chapter 10 Legal, Regulations, Compliance, and Investigations . . . . . . . . . . . . . 835

    Chapter 11 Application Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 905

    Chapter 12 Operations Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1027

    Appendix About the CD-ROM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1109

    Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1113

    vii

    FM.indd viiFM.indd vii 10/9/2007 2:00:06 PM10/9/2007 2:00:06 PM

  • All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    FM.indd viiiFM.indd viii 10/9/2007 2:00:06 PM10/9/2007 2:00:06 PM

  • All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    CONTENTS

    Foreword . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiiiAcknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvIntroduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvii

    Chapter 1 Becoming a CISSP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1Why Become a CISSP? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1The CISSP Exam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2CISSP: A Brief History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8How Do You Become a CISSP? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8Recertification Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9What Does This Book Cover? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10Tips for Taking the CISSP Exam . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10How to Use This Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

    References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

    Chapter 2 Security Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19How Security Became an Issue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19Areas of Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22Benign to Scary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

    Evidence of the Evolution of Hacking . . . . . . . . . . . . . . . . . . 24How Are Nations Affected? . . . . . . . . . . . . . . . . . . . . . . . . . . . 27How Are Companies Affected? . . . . . . . . . . . . . . . . . . . . . . . . 29The U.S. Governments Actions . . . . . . . . . . . . . . . . . . . . . . . . 31So What Does This Mean to Us? . . . . . . . . . . . . . . . . . . . . . . . 34

    Hacking and Attacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35Internet and Web Activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

    Two-Tier Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40Database Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

    A Layered Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44An Architectural View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

    A Layer Missed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48Bringing the Layers Together . . . . . . . . . . . . . . . . . . . . . . . . . 48

    Politics and Laws . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

    Chapter 3 Information Security and Risk Management . . . . . . . . . . . . . . . . . . 53Security Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

    Security Management Responsibilities . . . . . . . . . . . . . . . . . . 54The Top-Down Approach to Security . . . . . . . . . . . . . . . . . . . 55

    ix

    FM.indd ixFM.indd ix 10/9/2007 2:00:06 PM10/9/2007 2:00:06 PM

  • CISSP All-in-One Exam Guide

    x

    All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    Security Administration and Supporting Controls . . . . . . . . . . . . . 56Fundamental Principles of Security . . . . . . . . . . . . . . . . . . . . 59Security Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61Security Through Obscurity . . . . . . . . . . . . . . . . . . . . . . . . . . 63

    Organizational Security Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65Security Program Components . . . . . . . . . . . . . . . . . . . . . . . . 67Business Requirements: Private Industry vs. Military

    Organizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80Information Risk Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

    Who Really Understands Risk Management? . . . . . . . . . . . . . 81Information Risk Management Policy . . . . . . . . . . . . . . . . . . 82The Risk Management Team . . . . . . . . . . . . . . . . . . . . . . . . . . 82

    Risk Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83The Risk Analysis Team . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84The Value of Information and Assets . . . . . . . . . . . . . . . . . . . 85Costs That Make Up the Value . . . . . . . . . . . . . . . . . . . . . . . . 86Identifying Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87Failure and Fault Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89Quantitative Risk Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . 92Qualitative Risk Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98Quantitative vs. Qualitative . . . . . . . . . . . . . . . . . . . . . . . . . . 100Protection Mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102Putting It Together . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105Total Risk vs. Residual Risk . . . . . . . . . . . . . . . . . . . . . . . . . . . 106Handling Risk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107

    Policies, Standards, Baselines, Guidelines, and Procedures . . . . . . 109Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112Baselines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115

    Information Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117Private Business vs. Military Classifications . . . . . . . . . . . . . . 117Classification Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120

    Layers of Responsibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122Whos Involved? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123The Data Owner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130The Data Custodian . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131The System Owner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131The Security Administrator . . . . . . . . . . . . . . . . . . . . . . . . . . . 131The Security Analyst . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132The Application Owner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132The Supervisor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132The Change Control Analyst . . . . . . . . . . . . . . . . . . . . . . . . . . 132The Data Analyst . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133

    FM.indd xFM.indd x 10/9/2007 2:00:07 PM10/9/2007 2:00:07 PM

  • Contents

    xi

    All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    The Process Owner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133The Solution Provider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133The User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134The Product Line Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . 134The Auditor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134Why So Many Roles? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134Personnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135Hiring Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136Employee Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138Termination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138

    Security-Awareness Training . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139Different Types of Security-Awareness Training . . . . . . . . . . . 140Evaluating the Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141Specialized Security Training . . . . . . . . . . . . . . . . . . . . . . . . . 142

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143Quick Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144

    Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152

    Chapter 4 Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155Access Controls Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156

    Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157Integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157Confidentiality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157

    Identification, Authentication, Authorization, and Accountability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158

    Identification and Authentication . . . . . . . . . . . . . . . . . . . . . 160Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195

    Access Control Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210Discretionary Access Control . . . . . . . . . . . . . . . . . . . . . . . . . 211Mandatory Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . 212Role-Based Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . 214

    Access Control Techniques and Technologies . . . . . . . . . . . . . . . . . 217Rule-Based Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . 217Constrained User Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . 218Access Control Matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219Content-Dependent Access Control . . . . . . . . . . . . . . . . . . . . 221Context-Dependent Access Control . . . . . . . . . . . . . . . . . . . . 221

    Access Control Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222Centralized Access Control Administration . . . . . . . . . . . . . . 223Decentralized Access Control Administration . . . . . . . . . . . . 230

    Access Control Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230Access Control Layers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231Administrative Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232

    FM.indd xiFM.indd xi 10/9/2007 2:00:08 PM10/9/2007 2:00:08 PM

  • CISSP All-in-One Exam Guide

    xii

    All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    Physical Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233Technical Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234

    Access Control Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237Preventive: Administrative . . . . . . . . . . . . . . . . . . . . . . . . . . . 239Preventive: Physical . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239Preventive: Technical . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240

    Accountability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243Review of Audit Information . . . . . . . . . . . . . . . . . . . . . . . . . 245Keystroke Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245Protecting Audit Data and Log Information . . . . . . . . . . . . . . 246

    Access Control Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246Unauthorized Disclosure of Information . . . . . . . . . . . . . . . . 247

    Access Control Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250Intrusion Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250Intrusion Prevention Systems . . . . . . . . . . . . . . . . . . . . . . . . . 260

    A Few Threats to Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263Dictionary Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263Brute Force Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264Spoofing at Logon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269Quick Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269

    Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276

    Chapter 5 Security Architecture and Design . . . . . . . . . . . . . . . . . . . . . . . . . . 279Computer Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281

    The Central Processing Unit . . . . . . . . . . . . . . . . . . . . . . . . . . 281Multiprocessing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286Operating System Architecture . . . . . . . . . . . . . . . . . . . . . . . . 287Process Activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294Memory Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296Memory Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298Virtual Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306CPU Modes and Protection Rings . . . . . . . . . . . . . . . . . . . . . . 308Operating System Architecture . . . . . . . . . . . . . . . . . . . . . . . . 310Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312Layering and Data Hiding . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312The Evolution of Terminology . . . . . . . . . . . . . . . . . . . . . . . . 314Virtual Machines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315Additional Storage Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . 317Input/Output Device Management . . . . . . . . . . . . . . . . . . . . . 317

    System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321Defined Subsets of Subjects and Objects . . . . . . . . . . . . . . . . 322Trusted Computing Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323Security Perimeter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326Reference Monitor and Security Kernel . . . . . . . . . . . . . . . . . 327

    blind folio: xii

    FM.indd xiiFM.indd xii 10/9/2007 2:00:08 PM10/9/2007 2:00:08 PM

  • Contents

    xiii

    All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328Least Privilege . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329

    Security Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330State Machine Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331The Bell-LaPadula Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333The Biba Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336The Clark-Wilson Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338The Information Flow Model . . . . . . . . . . . . . . . . . . . . . . . . . 342The Noninterference Model . . . . . . . . . . . . . . . . . . . . . . . . . . 345The Lattice Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346The Brewer and Nash Model . . . . . . . . . . . . . . . . . . . . . . . . . . 348The Graham-Denning Model . . . . . . . . . . . . . . . . . . . . . . . . . 349The Harrison-Ruzzo-Ulman Model . . . . . . . . . . . . . . . . . . . . . 349

    Security Modes of Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351Dedicated Security Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352System High-Security Mode . . . . . . . . . . . . . . . . . . . . . . . . . . 352Compartmented Security Mode . . . . . . . . . . . . . . . . . . . . . . . 352Multilevel Security Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353Trust and Assurance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355

    Systems Evaluation Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356Why Put a Product Through Evaluation? . . . . . . . . . . . . . . . . 356The Orange Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357

    The Orange Book and the Rainbow Series . . . . . . . . . . . . . . . . . . . . 361The Red Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362

    Information Technology Security Evaluation Criteria . . . . . . . . . . . 364Common Criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366Certification vs. Accreditation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369

    Certification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370Accreditation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371

    Open vs. Closed Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372Open Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372Closed Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372

    Enterprise Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373A Few Threats to Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382

    Maintenance Hooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382Time-of-Check/Time-of-Use Attacks . . . . . . . . . . . . . . . . . . . . 383Buffer Overflows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388Quick Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389

    Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397

    Chapter 6 Physical and Environmental Security . . . . . . . . . . . . . . . . . . . . . . . . 401Introduction to Physical Security . . . . . . . . . . . . . . . . . . . . . . . . . . . 401The Planning Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404

    Crime Prevention Through Environmental Design . . . . . . . . 409Designing a Physical Security Program . . . . . . . . . . . . . . . . . 414

    FM.indd xiiiFM.indd xiii 10/9/2007 2:00:09 PM10/9/2007 2:00:09 PM

  • CISSP All-in-One Exam Guide

    xiv

    All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    Protecting Assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428Internal Support Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430

    Electric Power . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430Environmental Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436Ventilation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438Fire Prevention, Detection, and Suppression . . . . . . . . . . . . . 438

    Perimeter Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446Facility Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447Personnel Access Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . 454External Boundary Protection Mechanisms . . . . . . . . . . . . . . 455Intrusion Detection Systems . . . . . . . . . . . . . . . . . . . . . . . . . . 464Patrol Force and Guards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467Dogs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468Auditing Physical Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468Testing and Drills . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470Quick Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470

    Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477

    Chapter 7 Telecommunications and Network Security . . . . . . . . . . . . . . . . . . 481Open Systems Interconnection Reference Model . . . . . . . . . . . . . . . 483

    Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483Application Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487Presentation Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487Session Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489Transport Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490Network Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491Data Link Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492Physical Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494Functions and Protocols in the OSI Model . . . . . . . . . . . . . . 494Tying the Layers Together . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496

    TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497TCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504IPv6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505

    Types of Transmission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505Analog and Digital . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505Asynchronous and Synchronous . . . . . . . . . . . . . . . . . . . . . . 507Broadband and Baseband . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507

    LAN Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508Network Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509LAN Media Access Technologies . . . . . . . . . . . . . . . . . . . . . . . 512Cabling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519Transmission Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524Media Access Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . 525LAN Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529

    FM.indd xivFM.indd xiv 10/9/2007 2:00:10 PM10/9/2007 2:00:10 PM

  • Contents

    xv

    All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    Routing Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532Networking Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536

    Repeaters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536Bridges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545PBXs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548Honeypot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 566Network Segregation and Isolation . . . . . . . . . . . . . . . . . . . . 567

    Networking Services and Protocols . . . . . . . . . . . . . . . . . . . . . . . . . 567Network Operating Systems . . . . . . . . . . . . . . . . . . . . . . . . . . 567Domain Name Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 569Network Information System . . . . . . . . . . . . . . . . . . . . . . . . . 573Directory Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575Lightweight Directory Access Protocol . . . . . . . . . . . . . . . . . . 576Network Address Translation . . . . . . . . . . . . . . . . . . . . . . . . . 577

    Intranets and Extranets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579Metropolitan Area Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 581Wide Area Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583

    Telecommunications Evolution . . . . . . . . . . . . . . . . . . . . . . . 583Dedicated Links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 586WAN Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 589

    Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603Dial-Up and RAS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603ISDN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604DSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606Cable Modems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608Authentication Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614Remote Access Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616

    Wireless Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 618Wireless Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . 618WLAN Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 621Wireless Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623WAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635i-Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 636Mobile Phone Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637War Driving for WLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639Satellites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6403G Wireless Communication . . . . . . . . . . . . . . . . . . . . . . . . . 641

    Rootkits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643Spyware and Adware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645Instant Messaging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 647

    FM.indd xvFM.indd xv 10/9/2007 2:00:11 PM10/9/2007 2:00:11 PM

  • CISSP All-in-One Exam Guide

    xvi

    All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    Quick Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 647Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655

    Chapter 8 Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659The History of Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 660Cryptography Definitions and Concepts . . . . . . . . . . . . . . . . . . . . . 665

    Kerckhoffs Principle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668The Strength of the Cryptosystem . . . . . . . . . . . . . . . . . . . . . . 668Services of Cryptosystems . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669One-Time Pad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671Running and Concealment Ciphers . . . . . . . . . . . . . . . . . . . . 673Steganography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 674

    Governmental Involvement in Cryptography . . . . . . . . . . . . . . . . . . 675Types of Ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 676

    Substitution Ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677Transposition Ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677

    Methods of Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 679Symmetric vs. Asymmetric Algorithms . . . . . . . . . . . . . . . . . . 679Block and Stream Ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . 685Hybrid Encryption Methods . . . . . . . . . . . . . . . . . . . . . . . . . . 689

    Types of Symmetric Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695Data Encryption Standard . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696Triple-DES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703The Advanced Encryption Standard . . . . . . . . . . . . . . . . . . . . 703International Data Encryption Algorithm . . . . . . . . . . . . . . . 704Blowfish . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704RC4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705RC5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705RC6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705

    Types of Asymmetric Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 706The Diffie-Hellman Algorithm . . . . . . . . . . . . . . . . . . . . . . . . 706RSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 708El Gamal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 711Elliptic Curve Cryptosystems . . . . . . . . . . . . . . . . . . . . . . . . . 712LUC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713Knapsack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713Zero Knowledge Proof . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713

    Message Integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713The One-Way Hash . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 714Various Hashing Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . 718Attacks Against One-Way Hash Functions . . . . . . . . . . . . . . . 721Digital Signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 722Digital Signature Standard . . . . . . . . . . . . . . . . . . . . . . . . . . . 725

    Public Key Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 725Certificate Authorities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 726

    FM.indd xviFM.indd xvi 10/9/2007 2:00:12 PM10/9/2007 2:00:12 PM

  • Contents

    xvii

    All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 729The Registration Authority . . . . . . . . . . . . . . . . . . . . . . . . . . . 729PKI Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 730

    Key Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 732Key Management Principles . . . . . . . . . . . . . . . . . . . . . . . . . . 733Rules for Keys and Key Management . . . . . . . . . . . . . . . . . . . 734

    Link Encryption vs. End-to-End Encryption . . . . . . . . . . . . . . . . . . . 735E-mail Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737

    Multipurpose Internet Mail Extension . . . . . . . . . . . . . . . . . . 738Privacy-Enhanced Mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 738Message Security Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . 739Pretty Good Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 739Quantum Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 741

    Internet Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 743Start with the Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 743

    Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753Cipher-Only Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753Known-Plaintext Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753Chosen-Plaintext Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . 754Chosen-Ciphertext Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . 754Differential Cryptanalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755Linear Cryptanalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755Side-Channel Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755Replay Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756Algebraic Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756Analytic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756Statistical . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757Quick Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 758

    Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 761Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 765

    Chapter 9 Business Continuity and Disaster Recovery . . . . . . . . . . . . . . . . . . 769Business Continuity and Disaster Recovery . . . . . . . . . . . . . . . . . . . 770

    Business Continuity Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . 772Making BCP Part of the Security Policy and Program . . . . . . 774Project Initiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 776

    Business Continuity Planning Requirements . . . . . . . . . . . . . . . . . . 778Business Impact Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 778Preventive Measures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 786Recovery Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 786Business Process Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . 788Facility Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 789Supply and Technology Recovery . . . . . . . . . . . . . . . . . . . . . . 795The End-User Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . 800Data Backup Alternatives . . . . . . . . . . . . . . . . . . . . . . . . . . . . 801

    FM.indd xviiFM.indd xvii 10/9/2007 2:00:13 PM10/9/2007 2:00:13 PM

  • CISSP All-in-One Exam Guide

    xviii

    All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    Electronic Backup Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . 803Choosing a Software Backup Facility . . . . . . . . . . . . . . . . . . . 806Insurance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 808Recovery and Restoration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 809Developing Goals for the Plans . . . . . . . . . . . . . . . . . . . . . . . 814Implementing Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 815Testing and Revising the Plan . . . . . . . . . . . . . . . . . . . . . . . . . 816Maintaining the Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 821

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 825Quick Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 825

    Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 827Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832

    Chapter 10 Legal, Regulations, Compliance, and Investigations . . . . . . . . . . . . . 835The Many Facets of Cyberlaw . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 836The Crux of Computer Crime Laws . . . . . . . . . . . . . . . . . . . . . . . . . 836Complexities in Cybercrime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 839

    Electronic Assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 842The Evolution of Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 842Different Countries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 844Types of Laws . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 846

    Intellectual Property Laws . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 849Trade Secret . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 849Copyright . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 850Trademark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 850Patent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 851Internal Protection of Intellectual Property . . . . . . . . . . . . . . 851Software Piracy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 852

    Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 853Laws, Directives, and Regulations . . . . . . . . . . . . . . . . . . . . . . 854Employee Privacy Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 859

    Liability and Its Ramifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 861Personal Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 864Hacker Intrusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 865

    Investigations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 866Incident Response . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 866Incident Response Procedures . . . . . . . . . . . . . . . . . . . . . . . . 869

    Computer Forensics and Proper Collection of Evidence . . . . . . . . . 872International Organization on Computer Evidence . . . . . . . . 873Motive, Opportunity, and Means . . . . . . . . . . . . . . . . . . . . . . 874Incident Investigators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 875The Forensics Investigation Process . . . . . . . . . . . . . . . . . . . . 876What Is Admissible in Court? . . . . . . . . . . . . . . . . . . . . . . . . . 880Surveillance, Search, and Seizure . . . . . . . . . . . . . . . . . . . . . . 883Interviewing and Interrogating . . . . . . . . . . . . . . . . . . . . . . . . 884A Few Different Attack Types . . . . . . . . . . . . . . . . . . . . . . . . . 884

    FM.indd xviiiFM.indd xviii 10/9/2007 2:00:13 PM10/9/2007 2:00:13 PM

  • Contents

    xix

    All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    Ethics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 888The Computer Ethics Institute . . . . . . . . . . . . . . . . . . . . . . . . 889The Internet Architecture Board . . . . . . . . . . . . . . . . . . . . . . . 890Corporate Ethics Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . 891

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 892Quick Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 892

    Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 895Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 900

    Chapter 11 Application Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 905Softwares Importance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 905Where Do We Place the Security? . . . . . . . . . . . . . . . . . . . . . . . . . . . 906Different Environments Demand Different Security . . . . . . . . . . . . 908Environment vs. Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 908Complexity of Functionality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 909Data Types, Format, and Length . . . . . . . . . . . . . . . . . . . . . . . . . . . . 910Implementation and Default Issues . . . . . . . . . . . . . . . . . . . . . . . . . 910Failure States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 912Database Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 912

    Database Management Software . . . . . . . . . . . . . . . . . . . . . . . 913Database Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 914Database Programming Interfaces . . . . . . . . . . . . . . . . . . . . . 919Relational Database Components . . . . . . . . . . . . . . . . . . . . . 921Integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 924Database Security Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 927Data Warehousing and Data Mining . . . . . . . . . . . . . . . . . . . 932

    System Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 935Management of Development . . . . . . . . . . . . . . . . . . . . . . . . . 936Life-Cycle Phases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 936Software Development Methods . . . . . . . . . . . . . . . . . . . . . . . 950Computer-Aided Software Engineering . . . . . . . . . . . . . . . . . 952Prototyping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 953Change Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 953The Capability Maturity Model . . . . . . . . . . . . . . . . . . . . . . . . 955Software Escrow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 957

    Application Development Methodology . . . . . . . . . . . . . . . . . . . . . 957Object-Oriented Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . 958Data Modeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 966Software Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 966Data Structures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 967Cohesion and Coupling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 967

    Distributed Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 969CORBA and ORBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 969COM and DCOM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 971Enterprise JavaBeans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 972Object Linking and Embedding . . . . . . . . . . . . . . . . . . . . . . . 973Distributed Computing Environment . . . . . . . . . . . . . . . . . . 974

    FM.indd xixFM.indd xix 10/9/2007 2:00:14 PM10/9/2007 2:00:14 PM

  • CISSP All-in-One Exam Guide

    xx

    All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    Expert Systems and Knowledge-Based Systems . . . . . . . . . . . . . . . . 975Artificial Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 977Web Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 979

    Vandalism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 980Financial Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 980Privileged Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 980Theft of Transaction Information . . . . . . . . . . . . . . . . . . . . . . 981Theft of Intellectual Property . . . . . . . . . . . . . . . . . . . . . . . . . 981Denial-of-Service (DoS) Attacks . . . . . . . . . . . . . . . . . . . . . . . 981Create a Quality Assurance Process . . . . . . . . . . . . . . . . . . . . 982Web Application Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . 982Intrusion Prevention Systems . . . . . . . . . . . . . . . . . . . . . . . . . 982Implement SYN Proxies on the Firewall . . . . . . . . . . . . . . . . . 982Specific Threats for Web Environments . . . . . . . . . . . . . . . . . 983

    Mobile Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 992Java . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 993ActiveX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 995Malicious Software (Malware) . . . . . . . . . . . . . . . . . . . . . . . . 995Antivirus Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1001Spam Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1004Anti-Malware Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1005

    Patch Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1006Step 1: Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1007Step 2: Research . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1007Step 3: Assess and Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1007Step 4: Mitigation (Rollback) . . . . . . . . . . . . . . . . . . . . . . . 1008Step 5: Deployment (Rollout) . . . . . . . . . . . . . . . . . . . . . . . 1008Step 6: Validation, Reporting, and Logging . . . . . . . . . . . . . . 1008Limitations to Patching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1008Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1009Anything Else? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1009Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1009

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1014Quick Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1014

    Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1018Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1023

    Chapter 12 Operations Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1027The Role of the Operations Department . . . . . . . . . . . . . . . . . . . . . 1028Administrative Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1028

    Security and Network Personnel . . . . . . . . . . . . . . . . . . . . . . . 1031Accountability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1032Clipping Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1033

    Assurance Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1034Operational Responsibilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1034

    Unusual or Unexplained Occurrences . . . . . . . . . . . . . . . . . . 1035

    FM.indd xxFM.indd xx 10/9/2007 2:00:15 PM10/9/2007 2:00:15 PM

  • Contents

    xxi

    All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    Deviations from Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . 1035Unscheduled Initial Program Loads (a.k.a. Rebooting) . . . . . 1036Asset Identification and Management . . . . . . . . . . . . . . . . . . 1036System Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1037Trusted Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1038Input and Output Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . 1040System Hardening . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1042Remote Access Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1044

    Configuration Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1045Change Control Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1045Change Control Documentation . . . . . . . . . . . . . . . . . . . . . . 1047

    Media Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1048Data Leakage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1054Network and Resource Availability . . . . . . . . . . . . . . . . . . . . . . . . . . 1056

    Mean Time Between Failures (MTBF) . . . . . . . . . . . . . . . . . . . 1057Mean Time to Repair (MTTR) . . . . . . . . . . . . . . . . . . . . . . . . . 1058Single Points of Failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1058Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1066Contingency Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1070

    Mainframes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1070E-mail Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1072

    How E-mail Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1074Facsimile Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1076Hack and Attack Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1078

    Vulnerability Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1087Penetration Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1090Wardialing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1094Other Vulnerability Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1095Postmortem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1097

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1099Quick Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1099

    Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1101Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1106

    Appendix About the CD-ROM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1109Running the QuickTime Cryptography Video Sample . . . . . . . . . . . 1110

    Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1111Installing Total Seminars Test Software . . . . . . . . . . . . . . . . . . . . . . 1111

    Navigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1111Practice Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1111Final Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1111Minimum System Requirements for Total Seminars

    Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1112Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1112

    Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1113

    FM.indd xxiFM.indd xxi 10/9/2007 2:00:16 PM10/9/2007 2:00:16 PM

  • All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    FM.indd xxiiFM.indd xxii 10/9/2007 2:00:17 PM10/9/2007 2:00:17 PM

  • All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    FOREWORD

    As a teacher and practitioner of computer security, I am often asked the same two questions: How do I learn the basics of computer security to perform my job better, and how do I keep up to date on the latest security standards and practices?

    The first recorded computer incident occurred in 1958, and the first federally prosecuted crime identified as a computer crime involved modifying records at a bank in Minnesota in 1966. In the 1960s and 1970s, computer security was not taken seriously because it was not re-quired as it is today. In 1976, the FBI established a four-week training course for its agents in the investigation of computer crime. Then, in 1977, Senator Ribicoff introduced the Federal Com-puter Systems Protection Act bill, which eventually became the Computer Fraud and Abuse Act of 1986. The publication 2600: The Hacker Quarterly was started in 1984 (containing instructions on how to hack telecommunication systems and computers), and additional sources of com-puter security where illegal copies of software were made available to everyone (warez sites) were established around the world. Toward the end of the 1980s, new security products were being introduced into the marketplace and organizations were beginning to realize they needed a se-curity specialist to help augment their traditional information technology departments.

    I mention the FBI training course and the advent of the 2600 publication because these two events were crucial to starting the process of capturing and codifying a set of guidelines relating to the security practitioner. If you look at the history of how computer security has evolved into what it is today, one thing stands out above all elsethe control of information.

    Nearly 20 years after the Morris worm wreaked havoc across the Internet, we still find our-selves struggling to patch systems, learn about the newest vendor vulnerabilities, and obtain information from our peers about potential trouble circulating through systems around the globe. For any IT professional, keeping up with new technologies, the associated business demands, and related security knowledge required to keep it all safe is a daunting task. The human element still remains the biggest single point of weakness when dealing with techno-logical advancement and change.

    The good news is that progress has been made in the area of providing information related to industry best practices and knowledge sharing. The National Security Agency has certified 59 colleges and universities as Centers of Excellence for teaching information assurance, with many more programs being developed and certified every year. Training organizations now in-clude security topics along with other sources of IT and business training. Information Sharing and Analysis Centers (ISACs) have been established for all sectors of our nations critical infra-structure. The National Institute of Standards and Technology (NIST) and other organizations are now publishing technical standards for security of the technologies that organizations rely upon to run their operations.

    Shon Harris started this book in 2001 as a way of codifying a set of best practices that could also be used to satisfy the requirements for passing the CISSP exam. She has accom-plished both tasks extremely well, and as one of the best-selling security books, IT profession-als are increasingly using this resource as a way of solidifying their security knowledge. I often use this book as an answer to the questions I described earlier, referring students to start with this book as a foundation upon which to build their security knowledge set. Obtaining the CISSP is a worthy objective, but absorbing the knowledge contained within this book will serve to make you a better security practitioner.

    Jeff RecorSecurity Management Center of ExcellenceDeloitte & Touche LLP xxiii

    FM.indd xxiiiFM.indd xxiii 10/9/2007 2:00:17 PM10/9/2007 2:00:17 PM

  • CISSP All-in-One Exam Guide

    xxiv

    All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    Over the last 15 to 20 years, Information Security has evolved from an obscure disci-pline found primarily in government institutions, the military, and financial institu-tions to become a mainstream activity practiced in most large and medium-sized com-panies around the world.

    Numerous and varied factors have brought information security to where it is today. These include (partial list):

    The growth of the Internet. Ubiquitous connectivity, along with anonymity, have combined to make a complex and challenging threat landscape.

    The continued migration of the vast majority of corporate information and intellectual property into digital forms, which are then connected to the Internet, has provided a target-rich environment for those wishing to acquire such data.

    The rapid growth in outsourcing has required that companies completely rethink the controls that their outsourced service provider implement to protect their corporate data and intellectual property.

    We have seen an explosion of laws such as Sarbanes Oxley (SOX), the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Act (GLBA), Californias SB1386, the Family Educational Rights and Privacy Act (FERPA), the Communications Assistance for Law Enforcement Act (CALEA), the OECD privacy guidelines, and the Payment Card Industry Data Security Standards (PCI).

    These laws, combined with the very public and embarrassing breaches that a number of companies and government entities have suffered (such as ChoicePoint, Bank of America, the Georgia DMV, CardSystems, La Salle Bank, ABN AMRO Mortgage Group, and The Department of Agriculture), have all contributed to the raising of this awareness.

    This raised awareness has translated into a huge demand for skilled and experienced Infor-mation Security professionals around the world. It is my belief that the demand will not slow down anytime soon, chiefly due to a constantly expanding and mutating threat landscape that is rooted in the continued migration of corporate data into electronic form, ubiquitous con-nectivity, and the highly competitive globalized marketplace.

    I am often asked by people wanting to get into information security, How can I become an Information Security Practitioner? Where do I start? I consistently tell them they need two things: a thorough education as to what information security is, and solid real-world experi-ence. I also recommend they read and thoroughly understand Shon Harriss CISSP study guide and then get their CISSP certification. This is a wonderful start that should be combined with both extensive experience and the practical application of the information security principals and concepts outlined in this book.

    I have had the honor of knowing Shon both as a friend and co-worker. She has an unbe-lievably detailed and thorough understanding of this subject, which is reflected in the current edition of the book you are currently holding. The pages herein have been updated and ex-panded since the first edition. It is superbly laid out and well written, making it easy to under-stand for anyone wanting to become an Information Security Practitioner. I would highly recommend this work to anyone.

    Russell WalkerVice President, Information Security

    Warner Bros. Entertainment Inc.

    FM.indd xxivFM.indd xxiv 10/9/2007 2:00:17 PM10/9/2007 2:00:17 PM

  • All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    ACKNOWLEDGMENTS

    I would like to thank Sam Tomaino for attempting to explain to me many, many years ago how computers work; Dan Ferguson for never complaining about the bombard-ment of questions I continually fling his way and for fostering my never-ceasing curios-ity and quest for knowledge; and my Dad (Tom Conlon), who had the courage to re-new and deepen our relationship. Each one of these people has helped me write this book in more ways than they will ever know.

    For my fourth edition, I would also like to thank the following individuals for tak-ing the time to help me with some new topics:

    Dr. Burt Kaliski, vice president of research at RSA Security and chief scientist of its research center, RSA Laboratories. Thanks for answering those questions that no one else could!

    Dr. Dorothy Denning, professor in the Department of Defense Analysis at the Naval Postgraduate School, for always graciously answering my questions whenever Ive hit a wall.

    David Miller, whose work ethic, loyalty, and friendship have inspired me. I am truly grateful to have David as part of my life. I never would have known the secret world of tequila without him.

    Allen Harper, whose knowledge, impeccable character, and honesty have made him a role model to many in this worldincluding myself. He is an officer in the Marines who voluntarily went to war (Baghdad, Iraq) this year (2007); we are all thankful for your dedication and sacrifices for all of us, Allen.

    Clement Dupuis, who, with his deep passion for sharing and helping others, has proven a wonderful and irreplaceable mentor and friend.

    Jay Libove, whose knowledge base about information security is extremely advanced. I hope to grow up and be as smart as he is one day.

    Mike Lester, who is probably the smartest and funniest guy I have ever known, and really comes through when I need him the most. Thanks a lot, Sparky. We will work on getting you to understand the months of the year and where static electricity comes from.

    Joe Hoofnagle, who has always been there when I needed help, is a good friend, and is the only person with whom I play Twister through e-mail.

    Jason Radar, who helped me when I called upon him as the deadlines for this monster of a book loomed over me. I am looking forward to you being a new member of our Logical Security team!

    Tom and Kathy Conlon, my parents. Without their love and support, my life would be a whole lot different today.

    Most especially, I would like to thank my husband, David Harris, for his continual support and love. Without his steadfast confidence in me, I would not have been able to accomplish half the things I have taken on in my life. xxv

    FM.indd xxvFM.indd xxv 10/9/2007 2:00:17 PM10/9/2007 2:00:17 PM

  • All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    FM.indd xxviFM.indd xxvi 10/9/2007 2:00:18 PM10/9/2007 2:00:18 PM

  • All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    INTRODUCTION

    Computer, information, and physical security are becoming more important at an ex-ponential rate since the continual increase in computer crimes. Over the last few years, the necessity for computer and information security has grown rapidly as web sites have been defaced, Denial-of-Service attacks have increased, credit card information has been stolen, publicly available hacking tools have become more sophisticated, and todays viruses and worms cause more damage than ever before.

    Companies have had to spend millions of dollars to clean up the effects of these issues and millions of dollars more to secure their perimeter and internal networks with equipment, software, consultants, and education. But after September 11, 2001, the necessity and urgency for this type of security has taken on a new paradigm. It is slowly becoming apparent that governments, nations, and societies are vulnerable to many different types of attacks that can happen over the network wire and airwaves. Societies depend heavily on all types of computing power and functionality, mostly provided by the public and private sectors. This means that although governments are responsible for protecting their citizens, it is becoming apparent that the citizens and their businesses must become more secure to protect the nation as a whole.

    This type of protection can really only begin through proper education and under-standing, and must continue with the dedicated execution of this knowledge. This book is written to provide a foundation of the many different areas that make up effective security. We need to understand all of the threats and dangers we are vulnerable to and the steps that must be taken to mitigate these vulnerabilities.

    xxvii

    FM.indd xxviiFM.indd xxvii 10/9/2007 2:00:18 PM10/9/2007 2:00:18 PM

  • All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    FM.indd xxviFM.indd xxvi 10/9/2007 2:00:18 PM10/9/2007 2:00:18 PM

  • CHAPTER

    All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    1Becoming a CISSPThis chapter presents the following

    The definition of a CISSP Reasons to become a CISSP What the CISSP exam entails The Common Body of Knowledge and what it contains The history of (ISC)2 and the CISSP exam Recertification requirements An assessment test to gauge your current knowledge of security

    This book is intended not only to provide you with the necessary information to help you gain a CISSP certification, but also to welcome you into the exciting and challeng-ing world of security.

    The Certified Information Systems Security Professional (CISSP) exam covers ten different subjects, more commonly referred to as domains. The subject matter of each domain can easily be seen as its own area of study, and in many cases individuals work exclusively in these fields as experts. For many of these subjects, extensive resources can be consulted and referenced to become an expert in that area. Because of this, a com-mon misconception is that the only way to succeed at the CISSP exam is to immerse yourself in a massive stack of texts and study materials. Fortunately, an easier approach exists. By using this fourth edition of the CISSP All-in-One Exam Guide, you can success-fully complete and pass the CISSP exam and achieve your CISSP certification. The goal of this book is to combine into a single resource all the information you need to pass the CISSP exam. This book should also serve as a useful reference tool long after youve achieved your CISSP certification.

    Why Become a CISSP?As our world changes, the need for improvements in security and technology continues to grow. Security was once a hot issue only in the field of technology, but now it is be-coming more and more a part of our everyday lives. Security is a concern of every orga-nization, government agency, corporation, and military unit. Ten years ago computer and information security was an obscure field that only concerned a few people. Because the risks were essentially low, few were interested in security expertise. Ethical hacking

    1

    ch01.indd 1ch01.indd 1 10/5/2007 11:30:12 AM10/5/2007 11:30:12 AM

  • CISSP All-in-One Exam Guide

    2

    All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    and vulnerability assessments required great talent and knowledge and thus were not a common practice.

    Things have changed, however, and today corporations and other organizations are desperate to recruit talented and experienced security professionals to help protect the resources they depend on to run their businesses and to remain competitive. With a CISSP certification, you will be seen as a security professional of proven ability who has successfully met a predefined standard of knowledge and experience that is well under-stood and respected throughout the industry. By keeping this certification current, you will demonstrate your dedication to staying abreast of security developments.

    Reasons for attaining a CISSP certification:

    To meet the growing demand and to thrive in an ever-expanding field

    To broaden your current knowledge of security concepts and practices

    To bring security expertise to your current occupation

    To become more marketable in a competitive workforce

    To show a dedication to the security discipline

    To increase your salary and be eligible for more employment opportunities

    The CISSP certification helps companies identify which individuals have the ability, knowledge, and experience necessary to implement solid security practices, perform risk analysis, identify necessary countermeasures, and help the organization as a whole protect its facility, network, systems, and information. The CISSP certification also shows potential employers you have achieved a level of proficiency and expertise in skill sets and knowledge required by the security industry. The increasing importance placed on security in corporate success will only continue in the future, leading to even greater demands for highly skilled security professionals. CISSP certification shows that a respected third-party organization has recognized an individuals technical and theo-retical knowledge and expertise, and distinguishes that individual from those who lack this level of knowledge.

    Understanding and implementing security practices is an essential part of being a good network administrator, programmer, or engineer. Job descriptions that do not specifically target security professionals still often require that a potential candidate have a good understanding of security concepts as well as how to implement them. Due to staff size and budget restraints, many organizations cant afford separate network and security staffs. But this doesnt mean they dont believe security is vital to their or-ganization. Thus, they often try to combine knowledge of technology and security into a single role. With a CISSP designation, you can put yourself head and shoulders above other individuals in this regard.

    The CISSP ExamTo meet the certification requirements of a CISSP, you must have one of the following:

    Five years professional experience in two (or more) of the domains within the Common Body of Knowledge (CBK).

    ch01.indd 2ch01.indd 2 10/5/2007 11:30:19 AM10/5/2007 11:30:19 AM

  • Chapter 1: Becoming a CISSP

    3

    All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    Four years experience in two (or more) of the ten domains, and a four-year college degree or masters degree in information security from a National Center of Excellence.

    At least three years experience in two (or more) of the ten domains and a four-year college degree or masters degree in information security from a National Center of Excellence, plus a professional certification from the following list (candidates are permitted a waiver of one year of experience for any credential on the approved credentials list):

    CERT Certified Computer Security Incident Handler (CSIH)

    Certified Business Continuity Planner (CBCP)

    Certified Computer Crime Investigator (Advanced) (CCCI)

    Certified Computer Crime Prosecutor

    Certified Computer Examiner (CCE)

    Certified Fraud Examiner (CFE)

    Certified Information Systems Auditor (CISA)

    Certified Information Security Manager (CISM)

    Certified Internal Auditor (CIA)

    Certified Protection Professional (CPP)

    Certified Wireless Security Professional (CWSP)

    CompTIA Security+

    Computer Forensic Computer Examiner (CFCE)

    GIAC Security Essentials Certification (GSEC)

    GIAC Certified Firewall Analyst (GCFW)

    GIAC Certified Intrusion Analyst (GCIA)

    GIAC Certified Incident Handler (GCIH)

    GIAC Certified Windows Security Administrator (GCWN)

    GIAC Certified UNIX Security Administrator (GCUX)

    GIAC Certified Forensic Analyst (GCFA)

    GIAC Information Security Officer (GISO)

    GIAC IT Security Audit Essentials (GSAE)

    GIAC Security Expert (GSE)

    GIAC Certified ISO-17799 Specialist (G7799)

    GIAC Security Leadership Certification (GSLC)

    GIAC Systems and Network Auditor (GSNA)

    GIAC Certified Security Consultant (GCSC)

    Microsoft Certified Systems Administrator (MCSA)

    Microsoft Certified Systems Engineer (MCSE)

    Master Business Continuity Planner (MBCP)

    System Security Certified Practitioner (SSCP)

    ch01.indd 3ch01.indd 3 10/5/2007 11:30:20 AM10/5/2007 11:30:20 AM

  • CISSP All-in-One Exam Guide

    4

    All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    Consult www.isc2.org for a complete list and description of requirements for your CISSP certification.

    Because the CISSP exam covers the ten domains making up the CISSP CBK, it is often described as being an inch deep and a mile wide, a reference to the fact that many questions on the exam are not very detailed in nature and do not require you to be an expert in every subject. However, the questions do require you be familiar with many different security subjects.

    The CISSP exam is comprised of 250 multiple-choice questions, and you have six hours to complete it. The questions are pulled from a much larger question bank to ensure the exam is as unique as possible for each entrant. In addition, the test bank con-stantly changes and evolves to more accurately reflect the real world of security. The exam questions are continually rotated and replaced in the bank as necessary. Each ques-tion has four answer choices, only one of which is correct. Only 225 questions are grad-ed, while 25 are used for research purposes. The 25 research questions are integrated into the exam, so you wont know which go towards your final grade. To pass the exam, you need a minimum raw score of 700 points out of 1,000. Questions are weighted based on their difficulty; not all questions are worth the same number of points. The exam is not product- or vendor-oriented, meaning no questions will be specific to cer-tain products or vendors (for instance, Windows 2000, Unix, or Cisco). Instead, you will be tested on the security models and methodologies used by these types of systems.

    (ISC)2 has also added scenario-based questions to the CISSP exam. These questions present a short scenario to the test taker rather than asking the test taker to identify terms and/or concepts. A scenario-based question would be worded something like John returned from lunch and found that the companys IDS indicated that a critical server has had continuous ICMP traffic sent to it for over 45 minutes, which is taking up 85% of the servers CPU resource. What does John need to do at this point?

    The goal of the scenario-based questions is to ensure that test takers not only know and understand the concepts within the CBK, but also can apply this knowledge to real-life situations. This is more practical because in the real world, you wont be challenged by having someone come up to you and ask, What is the definition of collusion? You need to know how to detect and prevent collusion from taking place, in addition to knowing the definition of the term.

    NOTE NOTE Hundreds of scenario-based questions have been added to the CD-ROM in the back of this book to help you prepare for this exam.

    The International Information Systems Security Certification Consortium (ISC)2 process for earning credentials will change as of October 2007. In order to obtain this credential, candidates for any of the (ISC)2 credential will be required to obtain an en-dorsement of their candidature exclusively from an (ISC)2 certified professional in good standing. The professional endorsing the candidate can hold any (ISC)2 certification, such as the CISSP, SSCP, or CAP. This sponsor will vouch for your years of experience.

    ch01.indd 4ch01.indd 4 10/5/2007 11:30:20 AM10/5/2007 11:30:20 AM

  • Chapter 1: Becoming a CISSP

    5

    All-in-1 / CISSP All-in-One Exam Guide, Fourth Edition / Harris / 787-0

    After passing the exam, you will be asked to supply documentation, supported by a sponsor, proving that you indeed have this type of experience. The sponsor must sign a document vouching for the security experience you are submitting. So, make sure you have this sponsor lined up prior to registering for the exam and providing payment. You dont want to pay for and pass the exam, only to find you cant find a sponsor for the final step needed to achieve your certification.

    The reason behind the sponsorship requirement is to insure that those who achieve the certification have real-world experience to offer companies. Book knowledge i