Time - TestOut

advertisement
Lesson Plans
LabSim for (ISC)²
Certified Information Systems
Security Professional
(Exam CISSP)
Version 2.0
Table of Contents
Course Overview ........................................................................................................ 3
Section 1.1: Security Management ................................................................... 7
Section 1.2: Risk Analysis ................................................................................... 9
Section 1.3: Security Planning .......................................................................12
Section 2.1: Operational Security Planning ............................................15
Section 2.2: Employee Management ..............................................................18
Section 2.3: Facility Management ..................................................................20
Section 2.4: Auditing and Testing .................................................................24
Section 3.1: Crime and Law .............................................................................27
Section 3.2: Incidence Response ......................................................................30
Section 3.3: Ethics..................................................................................................33
Section 4.1: Cryptography Concepts ..............................................................35
Section 4.2: Hashing .............................................................................................39
Section 4.3: Symmetric Cryptography..........................................................42
Section 4.4: Asymmetric Cryptography .......................................................45
Section 4.5: Implementations ...........................................................................48
Section 5.1: Access Controls ...............................................................................51
Section 5.2: Physical Security .........................................................................53
Section 5.3: Authentication ..............................................................................56
Section 5.4: Authorization ................................................................................59
Section 5.5: Auditing ...........................................................................................61
Section 5.6: Academic Models..........................................................................63
Section 6.1: Trusted Computing ......................................................................65
Section 6.2: Computer Architecture ..............................................................67
Section 6.3: Software Development................................................................71
Section 6.4: Database Management ...............................................................76
Section 7.1: Networking Models and Standards .....................................80
Section 7.2: Network Technology ....................................................................83
Section 7.3: Network Devices ............................................................................87
Section 7.4: Fault Tolerance .............................................................................91
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
1
Section 7.5: Internetworking .............................................................................94
Section 7.6: Transmission Security ...............................................................97
Section 7.7: Wireless...........................................................................................100
Section 8.1: Cryptosystem Attacks ...............................................................103
Section 8.2: Access Control Attacks ............................................................105
Section 8.3: Availability Attacks ................................................................108
Section 8.4: Trusted Computing Base Attacks .......................................111
Section 8.5: Communication Attacks ........................................................115
Summary ..................................................................................................................117
Appendix A: Approximate Time for the Course .................................118
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
2
Course Overview
This course prepares students for the Certified Information
Systems Security Professional certification exam by the
International Information Systems Security Certification
Consortium, Inc. (ISC)2. To qualify to take the exam, a candidate
must have 4 years experience in a security-related field. This
course focuses on how to protect organizations’ assets by providing
the highest standards of security.
Module 0 – Introduction
This module introduces the instructor, the requirements for CISSP
certification, and the goals of a security program.
Module 1 – Security Management
This module teaches how to manage security by identifying
security needs and creating security policies, and creating a
Business Continuity Plan (BCP) and a Disaster Recovery Plan
(DRP) to implement preventive and corrective measures.
Completing a risk analysis and a Business Impact Analysis (BIA)
will help to determine appropriate countermeasures.
Module 2 – Operational Security
Module 2 explains the day-to-day operational security of the
security program. This includes the basics of employee
management, facility management, and testing the security
program to identify weaknesses in the policies.
Module 3 – Law and Ethics
Module 3 discusses legal issues regarding cyber crime. Topics
include procedures for collecting information and evidence,
incident response plans, and an overview of United States and
International legal systems. The code of ethics that should be
adhered to by a security professional is also presented.
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
3
Module 4 – Cryptography
Module 4 covers cryptography from the historical ciphers to the
present day technologies, which are hybrids of symmetric
cryptography, asymmetric cryptography and hashing.
Module 5 – Access Control
In Module 5 students will learn the methods to control access to
objects. These include access controls, controlling physical access,
authentication, and authorization. Auditing, recording user and
system activities, is used by organizations to detect unauthorized
activities. Students will also learn about several important
academic security models that can be used for analysis of security
systems and guidelines for implementation.
Module 6 – Computing Architecture
Module 6 explains the methods used to ensure computer
information system remain secure from the design of the
computing components, to the development of hardware and
software architecture, and management of databases.
Module 7 – Networking Security
Module 7 discusses the basics of networking security technology.
Subjects include network devices, fault tolerance, Wide Area
Network (WAN) technologies, security for LAN-based data and
also for Web-based applications, and security for wireless
implementations.
Module 8 – Attacks
In Module 8 students will learn that attackers have come up with
multiple ways to attack information systems. They include
cryptosystem attacks, access control attacks, availability attacks,
Trusted Computing Base attacks, and communication attacks.
Specific types of attacks for each of these are presented and the
countermeasures to protect the system.
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
4
Section 0.1: Introduction
Summary
The video introduces the video instructor for the Certified
Information Systems Security Professional certification exam and
the requirements for CISSP certification. Details include:

Goals of a security program:
o Confidentiality
o Integrity
o Availability

Organizations to be familiar with:
o International Information Systems Security
Certification Consortium (ISC²)
o Common Body of Knowledge (CBK)
o National Institute of Standards and Technology (NIST)
o International Organization for Standardization (ISO)
o Defense Information Systems Agency (DISA)
o Generally Accepted System Security Principle (GASSP)
CISSP Objectives

3. Security Management
Lecture Focus Questions:

What are the things a security program must do in order to
be effective?

What are the respective purposes of maintaining
confidentiality, availability, and integrity?

What are the main organizations with which IS
professionals need to be familiar?
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
5
Video/Demo
0.1.1 Introduction
Time
9:14
Number of Exam Questions
5 questions
Time
About 15 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
6
Section 1.1: Security Management
Summary
In this section, students will learn security management is the
overall security vision for an organization to preserve
confidentiality, integrity and availability of assets. Under the
direction of senior management, security professionals establish
security policies for implementation. Concepts covered include:

An effective security policy must be:
o Planned
o Maintained
o Used

Components of a security policy document include:
o Policy
o Standard
o Baseline
o Procedure
o Guideline

Security planning results in the following documents:
o Organization security policy
o Business Continuity Plan (BCP)
o Disaster Recovery Plan (DRP)
o Business Impact Analysis (BIA)
o Acceptable Use Policy

Senior management’s responsibilities
CISSP Objectives

3. Security Management
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
7
Lecture Focus Questions:

How do the five components of a security policy document
work together to provide an overall security program for an
organization?

In what situations would you use a security guideline
instead of a security procedure?

How does a Business Continuity Plan differ from a Disaster
Recovery Plan?

Which security documents use data from the Business
Impact Analysis?

What is senior management's role in security management?

What is the most important function of the Business Impact
Analysis?

How are baseline documents used?
Video/Demo
Time
1.1.1 Security Management
3:21
Number of Exam Questions
11 questions
Total Time
About 20 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
8
Section 1.2: Risk Analysis
Summary
This section discusses how by completing a risk analysis of
critical assets and types of possible threats the security
professional should be able to determine appropriate
countermeasures. Details covered include:

Terms related to risk analysis:
o Asset
o Threat
o Vulnerability
o Threat agent
o Attack
o Countermeasure
o Exposure
o Loss
o Risk
o Residual risk

Asset identification

Asset valuation
o Tangible asset
o Intangible asset

Major types of asset valuation:
o Quantitative
o Qualitative

Methods to prioritize assets:
o Asset classification
o Delphi method
o Sensitivity vs. risk
o Comparative

Document procedures relating to classifications and other
security procedures
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
9

Risk analysis process

When identifying threats consider the sources of threats:
o External
o Internal
o Natural events
o Disasters

Considerations when selecting countermeasures

Responses to risk
o Deploy countermeasures
o Transfer risk
o Accept risk
o Reject risk

Terms that relate to calculating the cost associated with a
risk:
o Asset Value (AV)
o Exposure Factor (EF)
o Single Loss Expectancy (SLE)
o Annualized Rate of Occurrence (ARO)
o Annualized Loss Expectancy (ALE)
o Control Gap (CG)
o Residual Risk (RR)
CISSP Objectives

3. Security Management

8. Business Continuity Planning
Lecture Focus Questions:

What is the relationship between the control gap and
residual risk?

How does the single loss expectancy affect the annualize rate
of occurrence?

What are the five steps for performing a risk analysis?
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
10

When should a countermeasure not be implemented?

When is risk acceptance appropriate? When is risk rejection
appropriate?
Video/Demo
1.2.1 Asset Identification
1.2.4 Risk Analysis
Total
Time
12:30
8:25
20:55
Number of Exam Questions
17 questions
Time
About 50 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
11
Section 1.3: Security Planning
Summary
This section presents information about planning operational
security through the use of Disaster Recovery Planning (DRP) to
identify short-term corrective actions and Business Continuity
Planning (BCP) to identify long-term actions. Also discussed, is
the purpose and functionality of a Business Impact Analysis (BIA).

Activities required by operational security:
o Disaster Recovery Planning (DRP)
o Business Continuity Planning (BCP)

Objectives of security planning

Considerations when incident planning

Roles that must be played to ensure that all aspects of DRP
and BCP are implemented effectively:
o Senior management
o Recovery team
o Salvage team
o Security officers

Phases an organization goes through to recover from an
incident:
o During or immediately following the event
o Short-term
o Mid-term
o Long-term phase

Considerations when creating the disaster and business
continuity plans

Guidelines for plan testing
o Test types:
o Checklist
o Structured walk-through
o Simulation
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
12
o Parallel test
o Full interruption

The role of the Business Impact Analysis (BIA)

Categories based on maximum tolerable downtime:
o Critical
o Urgent
o Important
o Normal
o Non-essential

Considerations when analyzing the business impact

Categories of business interruption that NIST has identified:
o Non-disaster
o Disaster
o Catastrophe
CISSP Objectives

3. Security Management

8. Business Continuity Planning
Lecture Focus Questions:

What is the highest priority of security planning?

How do the primary tasks of the recovery team differ from
the primary tasks of the salvage team?

How does a parallel test of the security plan differ from a
full interruption test?

How does the Business Impact Analysis use data from risk
management and risk analysis?

Why is it important to establish maximum tolerable down
time?
Video/Demo
Time
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
13
1.3.1 Security Planning
1.3.4 Business Impact Analysis
Total
11:13
6:24
17:37
Number of Exam Questions
18 questions
Time
About 45 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
14
Section 2.1: Operational Security Planning
Summary
This section discusses how operational security is the day-to-day
implementation of the security program as defined by the security
policies. It defines the major components of a security policy,
timelines, multiple layers of security and operational tasks.
Details include:

The role of operational security

Defense in depth

Components of operational security that help to establish
defense and depth:
o Change management
o Employee management
o Security awareness
o Physical security

The role of change control

Organizational roles of an operational security program
team:
o Senior management
o Information System Security Administrator
o Application or Database Administrator
o Data Entry
o Media Librarian
o Backup Operator
o Restore Operator
o Auditor
o Process Owner
o Technology Provider
o Data Owner
o Data Custodian
o System Owner
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
15
o User or Subject

Comparison of roles providing security counterbalance:
o Information System Security Administrator vs. Network
Administrator
o Network Administrator vs. Auditor
o Application or Database Developers vs. Application or
Database Administrator
o Backup Operator vs. Restore Operator
o Data Owner vs. Data custodian
o User or Subject vs. System Owner
CISSP Objectives

3. Security Management
Lecture Focus Questions:

Why are security awareness and employee management
important components of operational security?

How does change control enhance security?

How do the four components of operational security work
together to establish defense and depth in securing an
organization?

What security principle is being implemented when the
Information System Security Administrator is required to
report to different management than the Network
Administrator?

How does role counterbalancing work?

How does the role of the Data Owner differ from the role of
the Data Custodian?
Video/Demo
Time
2.1.1 Operational Security Planning
10:05
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
16
Number of Exam Questions
10 questions
Time
About 30 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
17
Section 2.2: Employee Management
Summary
This section covers the basics of managing employees to protect
company assets. This includes hiring and termination procedures,
employee agreements, employee monitoring, and security
awareness training. Details include:

Employment management practices:
o Pre-employment
o Security awareness
o Termination

Security principles:
o Least privilege
o Separation of duties
o Two-man control

Common security vulnerabilities:
o Fraud
o Collusion

Employee agreement documents include:
o Non-disclosure agreement
o Non-complete agreement
o Ownership of materials agreement
o Acceptable use agreement
o Employee monitoring agreement
o Exit interview cooperation agreement

Documents employees should receive on the first day of
employment:
o Security policy
o Employee handbook
o Job description
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
18
CISSP Objectives

7. Operations Security
Lecture Focus Questions:

How can pre-employment processing improve the security of
an organization?

Why is security awareness training so important?

What is the role of the policy handbook regarding security?

What guidelines must be considered when deploying
employee monitoring?

Why should employees be required to sign employment
agreements?
Video/Demo
Time
2.2.1 Employee Management
7:18
Number of Exam Questions
15 questions
Time
About 30 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
19
Section 2.3: Facility Management
Summary
This section discusses the points to be considered when selecting a
secure facility to protect personnel and assets. In case of a disaster,
redundant systems and facilities can assure availability of
critical assets to speed recovery. Another important part of facility
management is fire prevention, detection, and suppression. Details
include:

Considerations when choosing or constructing a facility

Types of protection that should be considered when choosing
or building a facility

Proximity to emergency services, and the likelihood of
severe weather and earthquakes

Evaluating the building construction

Location of the data center

Infrastructure components:
o AC power
o Heating
o Ventilation
o Air conditioning system (HVAC)
o Gas
o Water

Power conditions:
o Surge/Spike
o Sag/Dip
o Brownout
o Blackout
o Fault
o Transient
o Electro-magnetic interference (EMI)
o Radio frequency interference (RFI)
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
20

Recommendations for preventing or correcting infrastructure
problems:
o AC power
o HVAC system
o Water and gas

Redundancy solutions:
o Mirror
o Hot
o Warm
o Cold
o Mutual aid (or reciprocal) agreement
o Service bureau

Important facts about redundant facilities

Recovery terms:
o Service Level Agreement (SLA)
o Mean Time Between Failure (MTBF)
o Mean Time to Repair (MTR)
o Maximum Tolerable Downtime (MTD)

Types of fire and smoke detectors:
o Thermal
o Photo-electric
o Infrared
o Ionized

Components required for a fire to burn
o Fuel
o Oxygen
o Heat
o Chemical reaction

Stages of fire
o Incipient
o Smoldering
o Flame
o Heat
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
21

Fire classes and the appropriate suppressant type:
o Class A – Water or soda acid
o Class B – CO2 or FM200
o Class C – Halon or CO2
o Class D – Dry powders
o Class K – Halon, CO2, soda acid

Types of automated sprinkler systems for fire suppression:
o Wet pipe
o Dry pipe
o Pre-action
o Deluge
CISSP Objectives

10. Physical Security
Lecture Focus Questions:

What is the relationship between redundant site selection to
maximum tolerable down time?

Why are hot sites typically not implemented? Why might
cold sites be of little use when recovering from a disaster?

How is EMI different than RFI?

What is the difference between a UPS and a redundant
power source?

Why are positive pressure HVAC system recommended over
negative pressure systems?

What common disadvantages do mutual aid agreements and
service bureaus have as redundant solutions?

What is the best type of fire suppression system to use in a
data center?
Video/Demo
Time
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
22
2.3.1 Facility Selection
2.3.3 Redundancy
5:47
4:32
2.3.6 Fire Protection Systems
Total
7:11
17:30
Number of Exam Questions
19 questions
Time
About 50 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
23
Section 2.4: Auditing and Testing
Summary
This section discusses how auditing and penetration testing are
used to ensure systems are secure. Audits are used to protect an
organization from unwanted change in security settings.
Penetration testing attempts to breach security to evaluate the
effectiveness of system security and identify vulnerabilities.
Details include:

Auditing terms to be familiar with:
o Audit
o Creeping privileges
o Privilege escalation
o Principle of least privilege
o Privilege auditing
o Usage auditing
o Escalation auditing

Penetration testing terms to be familiar with:
o Rules of Engagement (ROE)
o Penetration testing teams:


Red team

Blue team

White team
Types of penetration testing:
o Physical penetration
o Operations penetration
o Electronic penetration

Types of penetration tests that depend on the knowledge of
the attacker and system personnel prior to attack:
o Single blind test
o Double blind test
o Zero knowledge test
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
24

Stages of penetration testing:
o Passive reconnaissance
o Active scanning mode
o Network enumeration
o Target selection
o System enumeration
o Gaining access
o Reporting
CISSP Objectives

3. Security Management

8. Business Continuity Planning
Lecture Focus Questions:

Why are physical penetration and operations penetration
tests valuable to system security?

What boundaries should you define before starting a
penetration test? Why?

Why does a double blind penetration test provide more
valuable data than a single blind test?

What is the difference between network enumeration and
system enumeration?

How do creeping privileges occur? What countermeasures are
used to prevent them?

How do audits enhance security?
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
25
Video/Demo
2.4.2 Penetration Testing
Time
7:44
Number of Exam Questions
10 questions
Time
About 25 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
26
Section 3.1: Crime and Law
Summary
In this section students will learn that cyber crime, a criminal
act dealing with computers, is on the rise both locally and
internationally. Organizations need to be aware of and in
compliance with the laws and regulations for the areas in which
business is conducted. Details include:

Cybercrime major categories:
o Computer-assisted
o Computer-incidental
o Computer-specific

Reasons that successful prosecution for computer crime is
difficult

Procedures to effectively collect information in trans-border
crimes

Inter-connectivity to other organizations may make an
organization vulnerable to a system attack:
o Downstream liability
o Upstream liability

International legal system:
o Common law
o Customary
o Religious

American legal system:
o Administrative
o Criminal
o Civil (tort)

United States-specific acts and laws that affect business
continuity planning and disaster recovery planning:
o United Stated Code 18.1030
o Electronic Communications Privacy Act of 1986
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
27
o Computer Security Act of 1987
o U. S. Federal Privacy Act of 1974
o Healthcare Insurance Portability and Accountability
Act (HIPAA)
o The Federal Computer Fraud and Abuse Act of 1986
(amended in 1996)
o SEC Act of 1934
o Sarbanes-Oxley Act
o California Senate Bill 1386

U. S. mechanisms for protecting corporate and individual
rights:
o Patents
o Copyrights
o Digital Millennium Copyright Act
o Trade secrets
o Sales and licensing
o Privacy laws
CISSP Objectives

9. Law, Investigations, and Ethics
Lecture Focus Questions:

What are some obstacles that prosecutors face when dealing
with cyber crime?

How might you be liable to attacks carried out on other
organizations?

What are the differences between common, customary, and
religious laws?

What are the different types of punishments associated with
administrative, civil, and criminal law?

What is the difference between a misdemeanor and a
felony?
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
28

How could the Sarbanes-Oxley Act affect your business?

What mechanisms can you put in place to protect company
intellectual assets?
Video/Demo
3.1.1 Legal Issues
Time
8:31
Number of Exam Questions
7 questions
Time
About 30 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
29
Section 3.2: Incidence Response
Summary
This section discusses how to create an incidence response plan to
deal with an incident that is a result of a security policy
violation or a catastrophic event. This will include identifying
members of a Computer Incident Response Team (CIRT) and their
roles to act in the event of an emergency. Specialized training is
required for evidence collection to be effective for successful
prosecution. Details include:

Terms to be familiar with:
o Security incident
o Incident response
o Method of Operation (MO)

Computer Incident Response Team (CIRT)

Keeping evidence admissible

Types of evidence:
o Best
o Secondary
o Direct
o Conclusive
o Opinion
o Circumstantial
o Corroborative
o Real or physical
o Documentary
o Demonstrative
o Hearsay

Evidence life cycle

Stages of the evidence life cycle:
o Collection and identification
o Preservation and analysis
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
30
o Storage
o Transportation and processing
o Presentation in court
o Return to owner

Special procedures to follow when collecting computer
evidence
CISSP Objectives

9. Law, Investigations, and Ethics
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
31
Lecture Focus Questions:

What are the main objectives of a security response plan?

Who are the people that should be included in a CERT and
how does that affect incident response?

What are the main goals of short-term, mid-term, and
long-term incident response?

What is the biggest consideration that should be made when
deciding to involve the police?

What is the importance of the chain of custody? When
should it start?

Under what circumstances is hearsay evidence considered
admissible?

What is the correct process for collecting evidence from a
crime scene involving a computer or its components?
Video/Demo
Time
3.2.1 Incident Handling
3:54
3.2.3 Evidence Collection
6:12
Total
10:06
Number of Exam Questions
18 questions
Time
About 35 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
32
Section 3.3: Ethics
Summary
This section covers the ethics required of a CISSP security
professional. The students should be familiar with these general
principles of ethical behavior. Details include:

Terms to be familiar with:
o Ethics
o Code of ethics

Organizations that publish a code of ethics for security
professionals:
o International Information Systems Security
Certification Consortium (ISC²)
o Internet Architecture Board (IAB)
o National Institute of Standards and Technology (NIST)
CISSP Objectives

9. Law, Investigations, and Ethics
Lecture Focus Questions:

Following the ISC² code of ethics, how do you decide
between conflicting canons?

What are the consequences of violating the ISC² code of
ethics?

What types of actions does the IAB board deem unethical?

What are the most important security principles proposed by
NIST?
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
33
Video/Demo
3.3.1 Ethics
Time
2:34
Number of Exam Questions
5 questions
Time
About 10 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
34
Section 4.1: Cryptography Concepts
Summary
In this section the students will learn how our security is based
on cryptography to protect confidentiality and integrity of data.
Historical ciphers are presented and also the components of
current cryptographic systems. The students will need to become
familiar with several cryptographic terms that are defined to
help understand cryptographic concepts. Details include:

Terms related to the science of cryptography:
o Cryptosystem
o Cryptanalysis
o Cryptology
o Standard

Cryptographic implementation can provide the following
security services:
o Confidentiality
o Integrity
o Authentication
o Non-repudiation

Terms used in cryptography:
o Cipher
o Plaintext
o Cipher text
o Encryption
o Decryption

Terms related to cryptography methods or procedures:
o Key
o Key space
o Key clustering
o Work factor
o Symmetric key
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
35
o Asymmetric key
o Public Key Infrastructure (PKI)
o Digital signature
o Digital certificate
o Sealing
o Master key/Persistent key/Long-term key
o Subkey/Session key/Temporary key
o Cryptographic Service Provider (CSP)
o Exclusive or (XOR)
o Bitwise operation
o Hashing
o Transposition cipher
o Substitution cipher
o Block cipher
o Stream cipher
o Poly-alphabetic
o One-time keypad

Historical ciphers:
o Hieroglyphics
o Scytale
o Caesar cipher
o Vigenere
o Vernam
o Enigma
o Runing key
o Concealment
o Code Square
o Steganography
CISSP Objectives

5. Cryptography
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
36
Lecture Focus Questions:

Why is non-repudiation an important component of
cryptography?

What are the advantages of asymmetric key cryptography
over symmetric key cryptography?

What is the relationship between keyspace and a
cryptosystem's work factor?

How are digital certificates used in asymmetric key
cryptography?

When would you sign and seal a document?

How do changes in computing power affect cryptosystems?
Video/Demo
4.1.1 Cryptography
Time
19:24
4.1.2 Cryptography Systems
Total
13:08
32:32
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
37
Number of Exam Questions
5 questions
Time
About 45 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
38
Section 4.2: Hashing
Summary
This section discusses the use of hashing to ensure the data
integrity of files and messages. Details include the following:

The role of a hash

Terms to be familiar with:
o Message digest/digital fingerprint
o High amplification/avalanche effect
o Collision
o Birthday attack

Hashing algorithms:
o MD-5
o SHA-1
o HAVAL

Hashing methods:
o Message Integrity Code (MIC)
o Message Authentication Code (MAC)
o Hashed Keyed Message Authentication Code (HMAC)
o Digital signatures
CISSP Objectives

5. Cryptography
Lecture Focus Questions:

What service or function is provided by hashes?

How are hashes used in digital signatures?

In what ways are HAVAL different from SHA-1? Which
method provides greater security?

What is collision and why is this condition undesirable in
a hashing algorithm?
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
39

Why is high amplification an indicator of a good hashing
algorithm?

How does HMAC differ from MAC?
Video/Demo
4.2.1 Hashing
Time
11:11
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
40
Number of Exam Questions
5 questions
Time
About 20 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
41
Section 4.3: Symmetric Cryptography
Summary
This section discusses how symmetric cryptography is up to 1000
times faster than asymmetric cryptography and is best used on
large amounts of data when confidentiality only is sufficient.

The role of symmetric cryptography

Issues when implementing symmetric key cryptography
systems

Types of symmetric key ciphers:
o Block cipher
o Stream cipher

The role of a symmetric block cipher

Common symmetric block cryptography methods:
o SkipJack
o Data Encryption Standard (DES)
o Triple DES (3DES)
o Advanced Encryption Standard (AES)
o Blowfish
o Twofish
o International Data Encryption Algorithm (IDEA)
o Ron’s Cipher v5 or Ron’s Code v5 (RC5)

Implementations of 3DES used to create strong cipher text:
o EDE2
o EEE3

Electronic Code Book (ECB)

Cipher Block Chaining (CBC)

The role of a symmetric key stream cipher

Common uses for symmetric key ciphers are encryption for:
o Keystrokes for think clients
o PIN numbers at ATMs
o Smart cards
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
42

Terms to be familiar with symmetric key stream ciphers:
o Keystream
o Linear Shift Feedback Registers (LSFRs)
o Keystream generator
o

Types of input typically fed into a keystream generator:
o Initialization vector
o Subkey
o Pseudo-Random Number Generator (PRNG)

Types of symmetric key stream cipher algorithms include:
o Ron’s Code (Ron’s Cipher) v4 also known as RC4 (most
frequently implemented)
o Chameleon
o Fish
o Helix
o SOBER
o WAKE

Types of symmetric key stream and block cipher
combinations:
o Output Feedback (FB)
o Cipher Feedback (CFB)
CISSP Objectives

5. Cryptography
Lecture Focus Questions:

Why are symmetric key stream ciphers considered to be
stronger than symmetric key block ciphers?

How is a pseudo-random number generator different than
an initialization vector?

What advantage does cipher block chaining have over other
cipher block encryption methods?
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
43

What is the main disadvantage of symmetric key
cryptography?

What advantages does AES have over Triple DES?
Video/Demo
4.3.1 Symmetric Cryptography
Time
8:28
4.3.3 Symmetric Block Ciphers
11:20
4.3.5 Symmetric Stream Ciphers
Total
5:20
25:08
Number of Exam Questions
11 questions
Time
About 45 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
44
Section 4.4: Asymmetric Cryptography
Summary
This section discusses how asymmetric cryptography provides, not
only confidentiality, but also strong authentication, integrity and
non-repudiation. This allows users to communicate securely.

The role of asymmetric cryptography (public key
cryptography)

Asymmetric key cryptography process and services of each:
o Signing
o Sealing
o Signing and sealing
o Mutual authentication and return receipt
o Digital envelope

Management consideration in implementing asymmetric key
cryptography

Public Key Infrastructure (PKI) components:
o Certificate Authority (CA)
o Registration Authority
o Cryptographic Practices Statement (CPS)
o Certificate Revocation List (CRL)
o Subordinate CA

The structure of a PKI hierarchy:
o Can vary from one to four tiers
o Can be collapsed or expanded
o Can implement two types of CA hierarchies:

Private

Public

The role of cross certification

Agent classes of registration agents:
o Class 2
o Class 3
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
45
o Class 4
o Class 5

Certificate management areas:
o Template standard
o Certificate validation
o Certificate revocation
o Certificate Revocation List (CRL)
o Key archival
o Certificate renewal
CISSP Objectives

5. Cryptography
Lecture Focus Questions:

How do public keys differ from private keys? What is the
relationship between the two?

How does sealing differ from signing?

When is a two tier PKI hierarchy appropriate?

How does a hierarchy of trust differ from a web of trust?

When should a private hierarchy be implemented? When
should a public hierarchy be implemented?

How does signing and sealing differ from a mutual
authentication and return receipt?
Video/Demo
Time
4.4.1 Asymmetric Cryptography
15:41
4.4.2 Asymmetric Ciphers
5:35
4.4.3 Diffie Hellman
7:28
4.4.5 Public Key Infrastructure
4.4.6 Certificate Management
16:50
7:01
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
46
Total
52:35
Number of Exam Questions
17 questions
Time
About 80 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
47
Section 4.5: Implementations
Summary
In this section students will learn how combining the
technologies of symmetric cryptography, asymmetric cryptography,
and hashing provides much of our current security. Details
include:

Strengths and weaknesses of cryptography types:
o Symmetric key
o Asymmetric key

Technologies implemented in LAN- and Web-based
environments:
o Secure Hyper Text Transport Protocol (S-HTTP)
o Hyper Text Transport Protocol Secure (HTTPS)
o Domain Name System Security (DNSSec)
o Secure Remote Procedure Call (Secure RPC)
o Secure Shell (SSH)

Encryption technologies implemented in securing e-mail
messages:
o Privacy Enhanced Mail (PEM)
o Message Security Protocol (MSP)
o Simple Mail Transport Protocol (SMTP) over SSL
o Post Office Protocol v3 (POP3) over SSL
o Internet Messaging Access Protocol v4 (IMAP4) over SSL

Methods for securing e-mail attachments:
o Secure Multipurpose Internet Mail Extensions
(S/MIME)
o Pretty Good Privacy (PGP)

Types of integrity validation and authentication for
messages using symmetric key cryptography (a weaker form
of authentication):
o Message Authentication Code (MAC)
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
48
o Hashed Message Authentication Code (HMAC)
o Cipher Block Chaining Message Authentication Code
(CBCMAC)
o Digital signatures
o Secure Electronic Transaction (SET)
o Link Encryption
o Encrypting File System (EFS)

Key management protects the confidentiality of keys used for
encryption. Key management areas include:
o Key protection
o Crypto period
o Key strength
o Key generation
o Distribution
o Storage
o Key archival
o Certificate renewal
o Key disposal
CISSP Objectives

5. Cryptography
Lecture Focus Questions:

For expired keys, when should you issue new keys? When
should you reissue the expired keys?

What are two ways that the M of n function can be used in
key archival?

How do distribution methods vary for symmetric and
asymmetric keys?

How can symmetric and asymmetric cryptography be used
together?
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
49

What are the advantages of symmetric key cryptography over
asymmetric key cryptography?
Video/Demo
Time
4.5.1 Cryptographic Implementations
4.5.3 Key Management
Total
12:27
5:50
18:17
Number of Exam Questions
14 questions
Time
About 40 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
50
Section 5.1: Access Controls
Summary
This section discusses access controls, which limit a subject’s
access to objects. Details include:

Types of access control:
o Administrative
o Technical
o Physical

Characteristics for access controls:
o Preventive
o Deterrent
o Detective
o Corrective
o Recovery
o Compensative

Considerations when implementing access control in
multiple layers and of different types
CISSP Objectives

1. Access Controls
Lecture Focus Questions:

How does authentication differ from authorization?

What are the differences between administrative, physical,
and technical access controls?

How are corrective and recovery access controls similar?

How can layering improve access control implementation?

How do preventive access controls differ from deterrent access
controls?
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
51
Video/Demo
Time
5.1.1 Access Control
4:50
Number of Exam Questions
1 question
Time
About 10 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
52
Section 5.2: Physical Security
Summary
In this section students learn how restricting physical access to
facilities and computer systems is an organization’s first line of
defense. Details include:

Types of physical access controls:
o Doors
o Door locks
o Security guards
o Guard dogs
o Closed-circuit television (CCTV)
o Fences and barriers
o Mantraps
o Lighting
o Sensors
o Physical Intrusion Detection and Assessment System
(PIDAS)

Implementing a layered defense system

Removable media types:
o Tape drives
o CD/DVD writers
o Removable hard drives
o Zip or floppy drives
o Flash or memory sticks
o Smart cards

Recommendations and terms to be familiar with when
managing removable media:
o Library-based inventory control
o Sheep dip system
o Sanitation
o Cleaning
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
53
o Degaussing
o Purge or sanitization
o Destruction
CISSP Objectives

10. Physical Security
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
54
Lecture Focus Questions:

What advantages do security guards give you over various
physical and technological controls?

What can be added to a mantrap to increase its
effectiveness?

The use of guard dogs should be limited to which area of
your facility?

What two purposes are served by closed-circuit television?

Why do removable media drives pose a security threat?

What is the difference between cleaning and sanitizing?

Why doesn't deleting files from a hard disk offer sufficient
protection against disclosure?
Video/Demo
Time
5.2.1 Physical Security
7:50
Number of Exam Questions
16 questions
Time
About 30 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
55
Section 5.3: Authentication
Summary
This section discusses providing authentication credentials to
access an object. Details include:

Three ways a user can prove identity to an authentication
server are:
o Type 1: Something you know
o Type 2: Something you have
o Type 3: Something you are

To increase security, you can use a combination of
authentication methods:
o Two-factor, Multi-factor
o Strong
o Mutual

Methods to improve the security of password authentication:
o Implement a strong password policy
o Educate user on how to create and remember strong
passwords
o Use account lockout to limit the number of attempts a
user has to enter the password
o Protect access to the password file
o Train user to create complex passwords that are easy to
remember
o Consider restricting password lifetime

Weaknesses of smart cards:
o Microprobing
o Software attacks
o Eavesdropping
o Fault generation

Considerations when implementing biometrics

Measures of the effectiveness of a biometric solution
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
56
o False negative
o False positive
o Crossover rate
o Processing rate

Advantages and disadvantages of Single Sign-on (SSO)

SSO systems are:
o Kerberos
o SESAME
CISSP Objectives

1. Access Controls
Lecture Focus Questions:

Which form of authentication is generally considered the
strongest?

What are common attributes examined in a biometric
system?

What is the difference between synchronous and
asynchronous token devices?

What is the difference between strong authentication and
two-factor authentication?

How do behavioral biometric systems work? What types of
information do they use for authentication?

What types of attacks can be directed against smart cards?

Which biometric error type is the most severe (Type I or Type
II)? Why?

What additional benefits does SESAME provide over
Kerberos?
Video/Demo
Time
5.3.1 Authentication
12:20
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
57
5.3.4 Single Sign-on
Total
7:01
19:21
Number of Exam Questions
18 questions
Time
About 50 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
58
Section 5.4: Authorization
Summary
In this section students will learn how authorization is
implemented through privileges and permissions to identify the
level of access granted to a subject. Details include:

Authorization types are:
o Centralized
o Decentralized
o Hybrid

Commonly used access control models:
o Mandatory Access Control (MAC)
o Discretionary Access Control (DAC)
o Role-Based Access Control (RBAC)
o Rule-Based Access Control

Use the principle of least privilege. Common forms of
privileges are:
o Implicit deny
o Explicit allow
o Explicit deny
CISSP Objectives

1. Access Controls
Lecture Focus Questions:

What are the advantages of a centralized authentication
system?

Which access control model uses a matrix? Which method
uses classifications labels?

How does role-based access control differ from rule-based
access control?
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
59

What is the best security configuration for a new system?

What three components are required for a lattice?

In what ways does a lattice protect data better than a
matrix?
Video/Demo
5.4.1 Authorization
Time
12:14
Number of Exam Questions
15 questions
Time
About 30 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
60
Section 5.5: Auditing
Summary
In this section students will discover that organizations use
auditing to record user and system actions. Auditing can be used
as a preventive method by informing users that their activities
are being logged or can be done in a more passive manner as a
detection security system.
CISSP Objectives

1. Access Controls
Lecture Focus Questions:

How can auditing be a preventative security measure?

In addition to defining the actions to record in an audit log,
what else must you do to make auditing effective?

What problems are associated with logging too many events
in the audit trail?

Why is auditing considered to be a passive detection system?

What purposes can audit trails serve other than detecting
unauthorized activities?
Video/Demo
Time
5.5.1 Auditing
1:27
Number of Exam Questions
6 questions
Time
About 10 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
61
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
62
Section 5.6: Academic Models
Summary
This section discusses access control models used for the analysis
of security and guidelines for the implementation of system
security. Details include:

Significant academic security models:
o Bell-LaPadula
o Biba
o Clark-Wilson
o Brewer and Nash Module/Chinese Wall
o Take-Grant
CISSP Objectives

6. Security Architecture
Lecture Focus Questions:

In the Bell-LaPadula model, how does the * property differ
from the strong * property?

Which academic model(s) address confidentiality? Integrity?

Which model addresses conflict of interest?

Which model(s) are examples of Mandatory Access Control
(MAC)?

What are the integrity goals included in the Clark-Wilson
model?

What are the requirements for the Clark-Wilson model?
Video/Demo
Time
5.6.1 Academic Models
10:23
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
63
Number of Exam Questions
3 questions
Time
About 20 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
64
Section 6.1: Trusted Computing
Summary
This section discusses how a Trusted Computing Base (TCB) is
used to ensure that computer information systems remain secure
at all times by defining the design, assembly, installation and
configuration of the system. Details include:

TCB is based on the following models:
o State machine
o Trusted recovery
o Information flow
o Non-interference

Ways to verify a system and its components fall within the
TCB perimeter:
o Assurance
o Certification
o Accreditation
o Provisional accreditation

Important terms to know are:
o Subject
o Object
o Access
o Security domain

Evaluation criteria standards:
o Trusted Computer Security Evaluation Criteria
(TCSEC)
o Information Technology Security Evaluation Criteria
(ITSEC)
o Common Criteria (CC)

Facts about the Red Book also known as the Trusted Network
Interpretation (TNI)
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
65
CISSP Objectives

6. Security Architecture
Lecture Focus Questions:

What are the defining qualities of the state machine? What
should take place in the event of a system restart?

According to the trusted recovery model, what should
happen in the case of a security breach?

How does certification differ from accreditation?

What is the difference between provisional and full
accreditation?

Which evaluation criteria use different classes for
functionality and assurance?

What is a major limitation of the TCSEC criteria compared
to the ITSEC criteria?

What are two disadvantages to obtaining a higher
classification level with any evaluation criteria?
Video/Demo
6.1.1 Trusted Computing
Time
10:37
Number of Exam Questions
18 questions
Time
About 40 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
66
Section 6.2: Computer Architecture
Summary
This section covers the basics of computer architecture. This will
include discussions of hardware and operating system
architecture. Hardware architecture of computer systems is
designed to support the security requirements of the trusted
computing base (TCB) and allow for secure computing.

Main components of a CPU
o Arithmetic Logic Unit (ALU)
o Registers
o Control unit

Types of storage:
o Random Access Memory (RAM)
o Buffers (registers)
o Cache
o Virtual memory
o Secondary storage

The role of the Virtual memory Manager (VMM)

Terms that relate to computer architecture:
o Memory Architecture

Memory mapped I/O address

Physical segmentation

Base address

Relative address
o Physical Architecture

Address bus

Data bus
o Features of modern operating systems:

Multithreading

Multitasking

Multiprocessing
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
67


Symmetric

Asymmetric
Concepts used by secure operating systems:
o Layering
o Ring architecture
o Hiding
o Isolation
o Virtual machine
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
68

Process states of an application:
o Stopped
o Sleeping
o Waiting
o Running
o Ready

Actions to harden the operating system and the device
CISSP Objectives

6. Security Architecture
Lecture Focus Questions:

What are the steps of the processing cycle?

What is the difference between dynamic RAM, ROM, static
RAM, and EEPROM?

While examining system events for a computer, you notice
that a page fault has been logged. What has happened?

What is the role of the virtual memory manager?

How does physical segmentation differ from logical
segmentation? How does each provide a level of security?

What is the difference between multitasking and
multithreading?

How can asymmetric multiprocessing provide security?

What three principles must a security kernel satisfy?
Video/Demo
Time
6.2.1 Hardware Architecture
10:23
6.2.3 OS Architecture
10:10
Total
20:33
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
69
Number of Exam Questions
7 questions
Time
About 35 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
70
Section 6.3: Software Development
Summary
This section discusses the fact that applications can introduce
vulnerabilities into information systems. Several methods have
been implemented at each phase of application development to
ensure security. Details include:

Secure planning models:
o Ad-hoc
o Waterfall planning
o Structured programming
o Prototype
o Object-oriented programming
o Spiral
o Clean room
o Extreme programming
o Computer-Aided Software Engineering (CASE)

Secure phases of application development:
o Initial concept
o Alternative evaluation
o Project initiation
o Functional design
o Development and coding
o Release
o Maintenance
o End of life

Concepts to be familiar with:
o Application vulnerability life cycle
o Code escrow
o Change control

Mechanisms programmers can use to improve security:
o Input validation
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
71
o Sandbox
o Signed software
o Check point
o Save point
o Application backup
o Fail secure
o Fail safe
o Fail soft
o Fail-over cluster
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
72

Problems that are typical in software development:
o Buffer overflow
o Back door
o Excessive permissions
o Unprotected temporary files

Different levels of programming languages:
o First Generation Language (1GL)
o Second Generation Language (2GL)
o Third Generation Language (3GL)
o Fourth Generation Language (4GL)
o Fifth Generation Language (5GL)

Object-oriented languages contain three main functions:
o Classes
o Objects
o Messages

Vocabulary when working with object-oriented
programming:
o Methods
o Procedure
o Data
o Polymorphism
o Polyinstantiation
o Cohesion
o Coupling
o Transformation Process (TP)
o Constrained Data Item (CDI)
o Unconstrained Data Item (UDI)
o Active Content
o Integrity Verification Procedures (IVP)

Object-oriented languages:
o C programming languages
o Java
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
73

Other types of languages and scripts: that do not deal with
traditional programming codes:
o Visual programming languages
o Hypertext Markup Language (HTML)
o Javascript (JS)
CISSP Objectives

4. Applications Security
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
74
Lecture Focus Questions:

How does the spiral model combine the waterfall model and
the prototype model?

How do object-oriented languages simplify development and
improve software quality?

Why is change control necessary?

What is the difference between a save point and a check
point?

How do temporary files present a security risk?

Why do programmers sometimes add back doors during
development?

What is the difference between interpreters, compilers, and
assemblers?
Video/Demo
Time
6.3.1 Software Development
10:00
6.3.2 Object Oriented Programming
Total
4:01
14:01
Number of Exam Questions
11 questions
Time
About 35 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
75
Section 6.4: Database Management
Summary
This section discusses the basics of database management. When
databases are written securely they can help to protect the
confidentiality and integrity of information assets. The integrity
of data in a database is ensured through rules imposed by the
database management system and through secure database
scripting techniques. A basic overview of distributed processing is
also presented including multiple standards of technology that
have been put in place to regulate and standardize distributed
object-oriented systems.

Databases are usually based off of one of the following types
of databases:
o Relational
o Hierarchical
o Distributed

Types of Artificial Intelligence (AI) systems:
o Expert system
o Artificial Neural Network (ANN)

The role of the Database Management System (DBMS)

Key terms related to Database Management Systems:
o User Database
o Data Warehouse
o Data Mark
o Data Mining
o Metadata
o Data Normalization
o Distributed Processing
o Verification
o Validation
o Data Dictionary
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
76
o Schema
o Query
o Query Language
o View
o File
o Open Database Connector (ODBC)
o Polyinstantiation

Relational Database Management Model terms:
o Table
o Tuple (also referred to as a field)
o Attribute
o Primary Key
o Foreign Key
o Cell (also referred to as an element)

Issues to aware of when protecting data integrity:
o Input Validation
o Locking
o Deadlocks
o Transaction Processing

Programmers should ensure that the change meets all of the
criteria define by the ACID test:
o Atomicity
o Consistency
o Isolation
o Durability

The role of distributed object-oriented processing

Standards of technology used to regulate and standardize
distributed object-oriented systems:
o Component Object Model (COM)
o Distributed Component Object Model (DCOM)
o ActiveX
o .NET
o .NET Passport
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
77
o Enterprise JavaBean (EJB)
o Object Resource Broker (ORB)
o Common Object Resource Broker Architecture (CORBA)

Additional methods of distributed processing:
o CGI script
o Cookie

Persistent

Session

First-party

Third-party
CISSP Objectives

4. Applications Security
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
78
Lecture Focus Questions:

What are the main differences between hierarchal,
distributed, and relational databases?

Which AI system type is best used to analyze concrete data
with a discrete number of options?

What functions are provided by the database management
system?

How can database views be used to provide a measure of
security?

How are a primary key and a foreign key different?

How does locking protect the integrity of a database? How
does locking sometimes lead to problems in query
processing?

When using transactions, what conditions must be met
before changes are committed?

How does Java use the sandbox to provide security?

How do cookies pose a security threat? Which CIA triad
component can be compromised by cookies?
Video/Demo
Time
6.4.1 Databases
17:31
6.4.4 Distributed Processing
Total
6:54
24:25
Number of Exam Questions
16 questions
Time
About 45 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
79
Section 7.1: Networking Models and Standards
Summary
In this section students will review the basics of the following
networking models and standards:

OSI model layers:
o Application
o Presentation
o Session
o Transport
o Network
o Data Link

Logical Link Control (LLC)

Media Access Control (MAC)
o Physical

TCP/IP model layers:
o Application
o Host-to-host
o Internet
o Network Access

TCP/IP protocols:
o Transport Control Protocol (TCP)
o User-Datagram Protocol (UDP)
o Address Resolution Protocol (ARP)
o Internet Control Message Protocol (ICMP)
o Internet Group Management Protocol (IGMP)

Institute of Electrical and Electronics Engineer (IEEE)
committees:
o 802.1
o 802.2
o 802.3
o 802.4
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
80
o 802.5
o 802.6
o 802.7
o 802.8
o 802.9
o 802.10
o 802.11
o 802.12
o 802.15
o 802.16
o 802.20
o 802.22
CISSP Objectives

2. Telecommunications and Network Security
Lecture Focus Questions:

What functions are performed by the Data Link layer?

Which devices operate at the Network layer?

How does the TCP/IP Network Access layer relate to the OSI
model?

What are the differences between TCP and UDP? How are
they the same?

What function is performed by the Address Resolution
Protocol (ARP)?

Which IEEE committee defines standards for Ethernet?
Wireless networking?
Video/Demo
Time
7.1.1 The OSI Model
9:27
7.1.3 The TCP/IP Model
6:49
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
81
7.1.5 IEEE Standards
Total
2:55
19:11
Number of Exam Questions
2 questions
Time
About 30 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
82
Section 7.2: Network Technology
Summary
This section overviews networking technologies. Topics include
presentations on signaling, media access methods, networking
components, and topologies. Students must have a basic and
broad understanding of networking technology to plan adequate
security measures to protect an information system. Details
include:

Network media:
o Wireless
o Twisted pair
o Coaxial
o Fiber optic

Media access methods:
o Carrier Sense, Multiple Access/Collision Detection
(CSMA/CD)
o Carrier Sense, Multiple Access/Collision Avoidance
(CSMA/CA)
o Token passing
o Polling

Network classifications:
o Local Area Network (LAN)
o Metropolitan Area Network (MAN)
o Wide Area Network (WAN)

Network classification based on the role of network devices:
o Peer-to-Peer
o Client/Server

Types of multiplexing:

Time-division
o Statistical time-division
o Frequency-division
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
83

Common physical topologies:
o Bus
o Ring
o Star
o Mesh
o Hybrid
CISSP Objectives

2. Telecommunications and Network Security
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
84
Lecture Focus Questions:

What is the difference between wave frequency, amplitude,
and phase?

How are synchronous and asynchronous communication
different?

What are the main types of weaknesses involved in
networking?

Which twisted pair cable rating(s) are appropriate for 100
megabit Ethernet?

Which media type is most resistant to EMI and
eavesdropping? Which media type is the most susceptible?

How does a plenum area pose a safety risk in the event of a
fire?

How does CSMA/CD differ from CSMA/CA?

What two features are provided by the dual rings of FDDI?

How many devices are affected by a cable break in a
physical bus topology? Physical ring? Physical star?

How are physical and logical topologies different?
Video/Demo
Time
7.2.1 Signaling
10:20
7.2.3 Networking Media
7.2.5 Media Access
7:27
16:38
7.2.7 Network Technologies
Total
11:31
45:56
Number of Exam Questions
9 questions
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
85
Time
About 70 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
86
Section 7.3: Network Devices
Summary
This section covers the network devices and systems that establish
the information systems infrastructure. Topics include:

Common internetworking devices:
o Repeater
o Hub
o Wireless Access Point WAP
o Switch
o Bridge
o Router
o Gateway

Segmenting the network
o Collision domain
o Broadcast domain

Firewall types:
o Generation one – packet filtering firewall
o Generation two – application layer firewall
o Generation three – stateful inspection firewall
o Generation four – dynamic packet filtering firewall
o Generation five – kernel proxy filtering firewall

Methods of placing or deploying firewalls:
o Screened host
o TCP wrapper
o Screened subnet


o Bastion or sacrificial host
NAT Address Translation (NAT)
Types of intruder detection:
o Intrusion Detection Systems (IDS) types:
 Network IDS
 Host IDS
o Intrusion Protection Systems (IPS)
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
87
CISSP Objectives

2. Telecommunications and Network Security
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
88
Lecture Focus Questions:

How are hubs and switches different?

What are the differences between collision domains and
broadcast domains?

How many collision domains are on a switch? How many
broadcast domains?

What is a multi-homed firewall?

Which firewall type can examine the entire contents of a
message?

What type of devices should be placed inside a
demilitarized zone (DMZ)?

How does NAT provide a measure of security to network
devices?

What is the difference between IDS and IPS?

How are network-based IDS and host-based IDS different?

How is a honey pot used?
Video/Demo
Time
7.3.1 Network Devices
7:48
7.3.3 Firewalls
6:46
7.3.4 Firewall Types
8:42
7.3.6 Network Address Translation (NAT)
7:25
7.3.8 Intrusion Detection Systems (IDS)
Total
10:55
41:36
Number of Exam Questions
16 questions
Time
About 70 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
89
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
90
Section 7.4: Fault Tolerance
Summary
In this section the students will review redundant information
systems and methods of backup to protect the availability of
valuable information assets. Details include:

Levels of RAID:
o RAID 0 (striping)
o RAID 1 (mirroring)
o RAID 2 (bit-level parity)
o RAID 3 (byte-level parity)
o RAID 4 (block-level parity)
o RAID 5 (striping with distributed parity)
o RAID 10 (also called RAID 0+1)

Methods of providing system redundancy:
o Mirroring
o Disk duplexing
o Shadowing
o Journaling
o Electronic vaulting
o Backups
o Network Load Balancing (NLB)
o Server clusters
o Code escrow

Redundant components:
o Dual components
o Mean Time Between Failure (MTBF)
o Hot spare
o Cold spare
o Hot-swappable

Backup methods
o Full
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
91
o Incremental
o Differential
o Copy
o Daily

Common backup strategies:
o Full Backup
o Full + Incremental
o Full + Differential

Electronic vaulting:
o Online tape vaulting
o Remote journaling
o Database shadowing
CISSP Objectives

2. Telecommunications and Network Security
Lecture Focus Questions:

What is the difference between RAID 1 and RAID 5?

Which RAID level does not provide fault tolerance?

Which RAID level does not provide an increase in
performance?

What is the difference between a cold spare and a hot spare?

What is the difference between a full + incremental backup
and a full + differential backup?

Why can't you combine incremental and differential
backup methods?

Which backup methods do not reset the Archive bit?

Where should backup media be stored for maximum
security?

Why should you test your restore methods?
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
92
Video/Demo
Time
7.4.1 Redundancy
13:19
7.4.4 Backups
10:40
Total
23:59
Number of Exam Questions
17 questions
Time
About 55 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
93
Section 7.5: Internetworking
Summary
This section discusses internetworking using Wide Area Network
(WAN) technologies and Remote Access. Details include:

Common WAN transmission media types:
o Plain Old Telephone Service (POTS)
o T-1
o T-2
o T-3
o T-4
o E-1

WAN service options:
o Public Switched Telephone Network (PSTN)
o Leased lines
o X.25
o Frame relay
o Switch Megabit Data Service (SMDS)
o Asynchronous Transfer Mode (ATM)
o Integrated Services Digital Network (ISDN)
o Cable
o DSL

Multiprotocol Label Switching (MPLS)

Voice over Internet Protocol (VoIP)

Remote access (RAS)
o Protocols used to establish a dial-up connection:

The Serial Line and Interface protocol (SLIP)

Point-to-Point Protocol (PPP)
o Protocols to authenticate users when using dial-up
connections:

Password Authentication Protocol (PAP)

Shiva Password Authentication Protocol (SPAP)
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
94

Challenge Handshake Authentication Protocol
(CHAP)

Microsoft Challenge Handshake Authentication
Protocol version 1 (MS-CHAP v1)

Microsoft Challenge Handshake Authentication
Protocol version 2 (MS-CHAP v2)

Extensible Authentication Protocol (EAP)

Protected Extensible Authentication Protocol
(PEAP)

Light-weight Extensible Authentication Protocol
(LEAP)
o Features to reduce cost and improve performance:


Caller ID

Callback
Centralized remote access
o Protocols for centralized remote access:

Remote Authentication and Dial-In User Service
(RADIUS)

Terminal Access Controller Access Control System
(TACACS)

DIAMETER
CISSP Objectives

2. Telecommunications and Network Security
Lecture Focus Questions:

Which WAN services use analog connectivity?

What is the difference between basic rate and primary rate
ISDN?

What are the functions of a remote access server?

How are SLIP and PPP different?
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
95

What advantages are provided by EAP over other forms of
authentication?

How can caller ID and callback be used to improve remote
access security?

In a RADIUS system, which component provides
authentication for remote access clients?
Video/Demo
7.5.1 WAN Technologies
Time
5:53
7.5.3 Remote Access
Total
11:54
17:47
Number of Exam Questions
7 questions
Time
About 40 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
96
Section 7.6: Transmission Security
Summary
In this section students will learn the basics of security for both
LAN-based and Web-based transmissions. VPN technology is used
for a LAN-based information flow and uses common tunneling
protocols and IPSec for encryption. SSL and TLS are used to
provide security for data in transit for Web-based applications.
Details include:

Virtual Private Network (VPN) tunneling protocols:
o Point-to-Point Tunneling Protocol (PPTP)
o Layer 2 Forwarding (L2F)
o Layer 2 Tunneling Protocol (L2TP)
o Internet Protocol Security (IPSec)

IPSec protocols:
o Authentication Header (AH) provides authentication
o Encapsulating Security Payload (ESP) provides
encryption
o Internet Key Exchange (IKE) negotiates the connection

IPSec modes of operation:
o Transport mode
o Tunnel mode

The role of Secure Socket Layer (SSL)

The role of Transport Layer Security (TLS)
CISSP Objectives

2. Telecommunications and Network Security
Lecture Focus Questions:

Which VPN technologies operate at OSI model layer 2?

What is the difference between AH and ESP?
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
97

What is the function of IKE in IPSec?

What is the difference between IPSec tunnel mode and
transport mode?

How can you tell that a session with a Web server is using
SSL?

Why are server certificates required in SSL and TLS?

What additional benefit is provided by requiring client
certificates in TLS?
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
98
Video/Demo
Time
7.6.1 Virtual Private Network (VPN)
7.6.4 SSL and TLS
Total
17:57
7:26
25:23
Number of Exam Questions
17 questions
Time
About 50 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
99
Section 7.7: Wireless
Summary
This section discusses the major concerns of wireless devices and
wireless architecture. Wireless networks are inherently insecure
and require much attention regarding security. 802.11x
standards are presented as well as the transmissions technologies
they employ. Common security implementations to protect a
wireless network are discussed. Details include:

Transmission technologies used by wireless standards:
o Frequency Hopping Spread Spectrum (FHSS)
o Direct Sequence Spread Spectrum (DSSS)
o Orthogonal Frequency Division Multiplexing (OFDM)
o Infrared

Comparison of specifications of 802.11a, 802.11b, and
802.11g

Components of a wireless network:
o Station (STA)
o Access Point (AP)
o Infrastructure
o Basic Service Set (BSS)
o Independent Basic Service Set (IBSS)
o Distribution System (DS)
o Service Set Identifier (SSID)
o Basic Service Set Identifier (BSSID)

Terms to help understand wireless security mechanisms:
o Initialization Vector (IV)
o Pairwise key
o Groupwise key
o Key rotation
o Message Integrity Check (MIC)
o Ciphersuite
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
100

Implementations of security for wireless networking:
o Wired Equivalent Privacy (WEP)
o Wi-Fi Protected Access (WPA)
o Wi-Fi Protected Access 2 (WPA2)

Methods used for authentication with WEP, WPA, and
WPA2:
o Open
o Shared secret
o 802.1x

Comparison of the following wireless security
implementations:
o WEP
o WPA
o WPA2/RSN/802.11i

Wireless implementations (from least secure to most secure):
o Basic protections
o Static WEP
o Dynamic WEP
o Wi-Fi Protected Access Pre Shared Kay (WPA-PSK)
o Wi-Fi Protected Access (WPA)
o Wi-Fi Protected Access 2 (WPA2)
CISSP Objectives

2. Telecommunications and Network Security
Lecture Focus Questions:

How are FHSS and DSSS different?

What are the different frequency ranges for ISM and
UNIBAND?

Which wireless standards use frequencies in the ISM range?

How does the BSSID differ from the SSID?

How does key rotation improve wireless security?
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
101

How are a groupwise key and a pairwise key different?

What improvements did WPA make to overcome the
weaknesses of WEP?

Why shouldn't you use shared secret authentication with
WEP?

Why is a RADIUS server required when using 802.1x
authentication?

How can you add pairwise key rotation when using WEP?

What is the function of the MIC with WPA and WPA2?

What encryption mechanisms are used by WEP, WPA, and
WPA2?

How do disabling SSID broadcast and using MAC filtering
add security to wireless networks?
Video/Demo
Time
7.7.1 803.11 Wireless
12:50
7.7.4 Wireless Security
19:04
7.7.6 Wireless Security Implementations
Total
5:31
37:25
Number of Exam Questions
6 questions
Time
About 55 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
102
Section 8.1: Cryptosystem Attacks
Summary
This section discusses different types of attacks on cryptosystems.
Topics covered include:

Levels of information used by an attacker (strongest to the
weakest security)
o Cipher text only
o Known plaintext
o Chosen plaintext
o Iterative chosen plaintext
o Chosen cipher text

General methods of classifying attacks:
o Brute force attack
o Dictionary attack
o Weak key attack
o Mathematical attack
o Meet-in-the-middle attack
o Birthday attack
o Analytic attack
o Implementation attack
o Statistical attack

Countermeasures to strengthen the cryptosystem:
o Use strong passwords
o Implement strong cryptosystems with redundant
encipherment
o Implement long key spaces
CISSP Objectives

5. Cryptography
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
103
Lecture Focus Questions:

How does a dictionary attack differ from a brute force
attack?

How is the statistical incidence of two people with the same
birthday in a room relevant for cryptography?

How does having chosen plaintext enhance an attacker's
chances of breaking the code over having known plaintext
only?

How is having strong passwords a countermeasure for a
dictionary attack?

What effect does redundant encipherment have on a
statistical attack?
Video/Demo
Time
8.1.1 Cryptosystem Attacks
3:44
Number of Exam Questions
9 questions
Time
About 15 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
104
Section 8.2: Access Control Attacks
Summary
This section discusses attacks that could be used against network
confidentiality and integrity. Students must understand these to
adequately protect their information systems. Details include:

Attacks on integrity:
o Data diddling
o Salami attack

Countermeasures for integrity attacks

Automated access control attacks that affect confidentiality:
o Hacking of a network
o Man-in-the-middle
o Session hijacking
o DNS poisoning

Attacks that are targeted at gathering information:
o Disclosure
o Inference and traffic analysis
o Aggregation attack
o Targeted data mining

Social engineering attacks:
o Dumpster diving
o Shoulder surfing
o Piggybacking
o Masquerading
o Eavesdropping
o Phishing

Countermeasures for social engineering attacks

Common authentication attacks:
o Brute force
o Dictionary
o Password sniffing
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
105
o Spoofing
o Man-in-the-middle
o Replay
o Hijacking

Countermeasures for attacks on authentication

Suggestions for strengthening passwords
CISSP Objectives

1.
Access Controls
Lecture Focus Questions:

How are inference and aggregation attacks similar?

What is the difference between a cracker and a white-hat
hacker?

For what attacks will disabling backdoors be most effective?

How are spoofing and DNS poisoning similar?

How does a data diddling attack differ from a salami
attack?

What is the best protection against social engineering
attacks?

What is the main purpose of a replay attack?
Video/Demo
Time
8.2.1 Confidentiality and Integrity Attacks
8.2.4 Authentication Attacks
Total
8:11
1:14
9:25
Number of Exam Questions
18 questions
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
106
Time
About 35 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
107
Section 8.3: Availability Attacks
Summary
In this section students learn about Denial of Service (DoS) and
Distributed Denial of Service (DDoS) attacks. Common types of
DoS and DDos attacks are presented, as well the countermeasures
to protect an information system from these forms of attack.
Details include:

DoS attacks:
o Smurf
o Fraggle
o Ping flood
o Ping-of-death
o SYN flood
o Land
o Teardrop
o DNS poisoning
o Banana attack
o Negative Acknowledgment (NACK)
o Deauthentication (Deauth)
o Spam

DDoS attacks:
o Trinoo
o Tribal Flood Network (TFN)
o roBOT NETwork BOTNET

Countermeasures for DoS and DDoS attacks
CISSP Objectives

2. Telecommunications and Network Security

3. Security Management
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
108
Lecture Focus Questions:

How are DoS and DDoS attacks similar?

What is the difference between a DoS and a DDoS attack?

How does a Fraggle attack differ from a Smurf attack?

How are a Land attack and a Teardrop attack similar?

What attacks are reverse DNS lookups a countermeasure for?

How can hashes help prevent data loss from DoS or DDoS
attacks?

What is the role of a zombie?
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
109
Video/Demo
Time
8.3.1 Availability Attacks
12:17
Number of Exam Questions
14 questions
Time
About 30 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
110
Section 8.4: Trusted Computing Base Attacks
Summary
In this section the students will learn about additional attacks,
these include attacks on the trusted computing base, malware
attacks, common exploitation methods, database threats and
vulnerabilities, and attacks on Web servers. Countermeasures for
each are explained. Details include:

Common malware:
o Virus
o Worm
o Trojan horse
o Logic Bomb

Countermeasures for malware

Common exploitation methods:
o Backdoor
o Buffer overflow attack
o Pointer overflow attack
o Directory traversal
o Covert channels

Threats to integrity of the data in a database:
o Asynchronous race condition
o Data contamination
o Deadlocking
o Polyinstantiation
o SQL injection
o Time of check/Time of use (TOC/TOU)

Additional database threat and vulnerabilities to
components of the CIA Triad:
o Aggregation
o Backdoor
o Bypass attacks
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
111
o Compromising database views
o Denial-of-service
o Inference
o Interception of data
o Query attacks
o Physical security
o Storage channel
o Unauthorized Access

Countermeasures to database threats and vulnerabilities
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
112

Web-based applications or scripting programs:
o JavaScript, VBScript, other client-side scripting
o Java
o ActiveX
o Cookies
o CGI scripting, ASP, and other server-side scripting

Countermeasures for Web server-based attacks
CISSP Objectives

4. Applications Security

6. Security Architecture
Lecture Focus Questions:

What type of files do anti-virus software need to be able to
identify known viruses?

What must you do to make anti-virus software effective?

What countermeasures are recommended for Trojan horse
and backdoor attacks?

What is the difference between a buffer overflow attack and
a pointer overflow attack?

What countermeasures do database attacks and Web server
attacks have in common?

Why are cookies a vulnerability?

How are a cover timing channel and a storage channel
similar?
Video/Demo
8.4.1 TCB Attacks
Time
4:20
8.4.2 Application Attacks
Total
6:36
10:56
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
113
Number of Exam Questions
18 questions
Time
About 40 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
114
Section 8.5: Communication Attacks
Summary
This section discusses threats to a Private Branch eXchange (PBX)
system connecting T1 lines to a phone system and the
countermeasures to protect it. Also discussed are the specific
security attacks that can be implemented against wireless
communications and the countermeasures. Details include:

Threats to the PBX system:
o War Dialing
o 2600 Club
o Emulation devices
o Eavesdropping
o Inbound fax exposure
o Toll charge abuse
o Unauthorized access to voicemail

Consideration to protect the PBX system

Protocols to provide security for wireless communication:
o Wired Equivalent Privacy (WEP)

Vulnerabilities
o Wireless Application Protocol (WAP)


Vulnerabilities
Security attacks wireless networks are vulnerable to:
o Eavesdropping
o Site surveys or war driving
o Rogue access point or Man-in-the-middle
o Replay attack

Countermeasures for wireless communications
CISSP Objectives

2. Telecommunications and Network Security
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
115
Lecture Focus Questions:

What are two potential effects or costs to businesses from PBX
vulnerabilities?

What is the difference between war dialing and war
driving?

How are replay attacks and man-in-the-middle attacks
similar?

What vulnerability does The Gap in the WAP expose?

What are effective countermeasures for inbound fax
exposure?

How do strong password policies deter PBX attacks?
Video/Demo
Time
8.5.1 Telcom Attacks
2:57
8.5.2 Wireless Vulnerabilities
7:27
Total
10:24
Number of Exam Questions
9 questions
Time
About 25 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
116
Summary
Summary
The summary is a brief review of the major concepts of the CISSP
objectives:

The security program must be senior management driven
and fully supported.

There must be budget justifications for deploying
countermeasures.

Security objectives for the protection of your information
system must provide confidentiality, integrity and
availability.

User training and penalties for non-compliance to security
policies must be in place.

Adhere to the ethics of a Security Professional.
Time
About 2 minutes
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
117
Appendix A: Approximate Time for the Course
The total time for the LabSim for (ISC) 2 Certified Information
System Security Professional course is approximately 36 hours
and 37 minutes. The time is calculated by adding the
approximate time for each section which is calculated using the
following elements:

Video/demo times

Approximate time to read the text lessons (the length of each
text lesson is taken into consider)

Simulations (5 minutes assigned per simulation)

Questions (1 minute per question)
The breakdown for this course is as follows:
Module
Sections
Time
Minute HR:MM
0.0 Introduction
0.1 Introduction
15
15
:15
20
50
45
115
1:55
30
30
50
25
135
2:15
30
35
10
75
1:15
1.0 Security Management
1.1 Security Management
1.2 Risk Analysis
1.3 Security Planning
2.0 Operational Security
2.1 Operational Security Planning
2.2 Employee Management
2.3 Facility Management
2.4 Auditing and Testing
3.0 Law and Ethics
3.1 Crime and Law
3.2 Incidence Response
3.3 Ethics
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
118
4.0 Cryptography
4.1 Cryptography Concepts
4.2 Hashing
4.3 Symmetric Cryptography
4.4 Asymmetric Cryptography
4.5 Implementations
45
20
45
80
40
230
3:50
10
30
50
30
10
20
150
2:30
40
35
35
45
155
2:35
30
70
70
55
40
50
55
370
6:10
15
35
30
40
25
145
2:25
5.0 Access Control
5.1 Access Controls
5.2 Physical Security
5.3 Authentication
5.4 Authorization
5.5 Auditing
5.6 Academic Models
6.0 Computing Architecure
6.1 Trusted Computing
6.2 Computer Architecture
6.3 Software Development
6.4 Database Management
7.0 Network Security
7.1 Networking Models and Standards
7.2 Network Technology
7.3 Network Devices
7.4 Fault Tolerance
7.5 Internetworking
7.6 Transmission Security
7.7 Wireless
8.0 Attacks
8.1 Cryptosystem Attacks
8.2 Access Control Attacks
8.3 Availability Attacks
8.4 Trusted Computing Base Attacks
8.5 Communication Attacks
Practice Exams
Exam Preparation
1: Access Controls (55 questions)
2: Telecom and Network Security (83 questions)
3: Security Management (82 questions)
6
55
83
82
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
119
4: Applications Security (41 questions)
5: Cryptography (92 questions)
6: Security Architecture (28 questions)
7: Operations Security (42 questions)
8: Business Continuity Planning (30 questions)
9: Law and Ethics (27 questions)
10: Physical Security (71 questions)
Certification Practice Exam (250 questions)
41
92
28
42
30
27
71
250
Total
Time
807
13:27
2197
36:37
©2006 TestOut Corporation (Rev 01/2012)
Certified Information Systems Security Professional Ver. 2
120
Download