100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
CISSP samenvatting €5,48   In winkelwagen

Samenvatting

CISSP samenvatting

17 beoordelingen
 2161 keer bekeken  73 keer verkocht

Summary study book CISSP All-in-One Exam Guide, 6th Edition of Shon Harris - ISBN: 9780071781732, Edition: 6, Year of publication: 2012 (samenvatting CISSP)

Voorbeeld 8 van de 103  pagina's

  • Ja
  • 22 januari 2016
  • 103
  • 2015/2016
  • Samenvatting
book image

Titel boek:

Auteur(s):

  • Uitgave:
  • ISBN:
  • Druk:
Alle documenten voor dit vak (1)

17  beoordelingen

review-writer-avatar

Door: D1993F • 1 jaar geleden

review-writer-avatar

Door: fstelte • 5 jaar geleden

review-writer-avatar

Door: fdbnl • 5 jaar geleden

review-writer-avatar

Door: dennieboy96 • 5 jaar geleden

review-writer-avatar

Door: bertstekelenburg • 6 jaar geleden

review-writer-avatar

Door: revodi • 5 jaar geleden

review-writer-avatar

Door: rvnkrish • 6 jaar geleden

This Summary notes a the most encouraging material. I first read entire chapter in the notes and then go to the study guide or other voluminous books for CISSP. I am not getting overwhelmed by seeing a 1000 pages book

Bekijk meer beoordelingen  
avatar-seller
kevintjeuh
Samenvatting CISSP
Inhoud
Hoofdstuk 2: information security Governance and Risk Management ................................................. 2
Hoofdstuk 3: access control .................................................................................................................. 21
Hoofdstuk 4: Security Architecture and Design .................................................................................... 33
Hoofdstuk 5: Physical and Environmental Security ............................................................................... 46
Hoofdstuk 6: Telecommunications and Network Security.................................................................... 50
Hoofdstuk 7: cryptography.................................................................................................................... 66
Hoofdstuk 8: Business Continuity and Disaster Recovery ..................................................................... 77
Hoofdstuk 9: Legal, Regulations, Investigations and Compliance ......................................................... 82
Hoofdstuk 10: Software Development Security .................................................................................... 88
Hoofdstuk 11: Security Operations ..................................................................................................... 100

,Hoofdstuk 2: information security Governance and Risk Management
Fundamental Principles of security:




Availability protection ensures reliability and timely access to data and resources to
authorized individuals.
Integrity is upheld when the assurance of the accuracy and reliability of information
and systems is provided and any unauthorized modification is prevented.
Confidentiality ensures that the necessary level of secrecy is enforced at each junction
of data processing and prevents unauthorized disclosure.

Key Terms
• Availability Reliable and timely access to data and resources is
provided to authorized individuals.
• Integrity Accuracy and reliability of the information and systems are
provided and any unauthorized modification is prevented.
• Confidentiality Necessary level of secrecy is enforced and
unauthorized disclosure is prevented.
• Shoulder surfing Viewing information in an unauthorized manner
by looking over the shoulder of someone else.
• Social engineering Gaining unauthorized access by tricking someone
into divulging sensitive information.

A vulnerability is a lack of a countermeasure or a weakness in a countermeasure that
is in place. It can be a software, hardware, procedural, or human weakness that can be
exploited.
A threat is any potential danger that is associated with the exploitation of a vulnerability. The threat is
that someone, or something, will identify a specific vulnerability and use it against the company or
individual.
threat agent: The entity that takes advantage of a vulnerability
A risk is the likelihood of a threat agent exploiting a vulnerability and the corresponding
business impact.
An exposure is an instance of being exposed to losses.
A control, or countermeasure, is put into place to mitigate (reduce) the potential
risk.




2

,Key Terms
• Vulnerability Weakness or a lack of a countermeasure.
• Threat agent Entity that can exploit a vulnerability.
• Threat The danger of a threat agent exploiting a vulnerability.
• Risk The probability of a threat agent exploiting a vulnerability and
the associated impact.
• Control Safeguard that is put in place to reduce a risk, also called a
countermeasure.
• Exposure Presence of a vulnerability, which exposes the organization
to a threat.




Control types
Administrative controls
are commonly referred to as “soft controls” because they are more management-oriented.
Examples of administrative controls are security documentation, risk management,
personnel security, and training.

Technical controls (also called logical controls) are
software or hardware components, as in firewalls, IDS, encryption, identification and
authentication mechanisms

physical controls are items put into place to protect
facility, personnel, and resources.

These control types need to be put into place to provide defense-in-depth, which is




3

,the coordinated use of multiple security controls in a layered approach,




• Deterrent Intended to discourage a potential attacker
• Preventive Intended to avoid an incident from occurring
• Corrective Fixes components or systems after an incident has occurred
• Recovery Intended to bring the environment back to regular operations
• Detective Helps identify an incident’s activities and potentially an intruder
• Compensating Controls that provide an alternative measure of control




4

,Key Terms Control Types and Functionalities
• Control types Administrative, technical, and physical
• Control functionalities
• Deterrent Discourage a potential attacker
• Preventive Stop an incident from occurring
• Corrective Fix items after an incident has occurred
• Recovery Restore necessary components to return to normal
operations
• Detective Identify an incident’s activities after it took place
• Compensating Alternative control that provides similar protection
as the original control
• Defense-in-depth Implementation of multiple controls so that
successful penetration and compromise is more difficult to attain

Security Frameworks
The concept of security through obscurity is assuming that your enemies are not as smart as you
are and that they cannot figure out something that you feel is very tricky. “There are only two people in
the world I trust: you and me—and I’m not so sure about you.”

ISO/IEC 27000 Series
• Frameworks:
– ISO/IEC 27000 Series
– Enterprise Architecture Development (partly)
– Security Controls Development
– COSO
– Process Management Development

• Security Program Development
• ISO/IEC 27000 series International standards on how to develop
and maintain an ISMS developed by ISO and IEC
• Enterprise Architecture Development
• Zachman framework Model for the development of enterprise
architectures developed by John Zachman
• TOGAF Model and methodology for the development of enterprise
architectures developed by The Open Group
• DoDAF U.S. Department of Defense architecture framework that
ensures interoperability of systems to meet military mission goals
• MODAF Architecture framework used mainly in military support
missions developed by the British Ministry of Defence
• Security Enterprise Architecture Development
• SABSA model Model and methodology for the development of
information security enterprise architectures
• Security Controls Development
• CobiT Set of control objectives for IT management developed by
Information Systems Audit and Control Association (ISACA) and the
IT Governance Institute (ITGI)
• SP 800-53 Set of controls to protect U.S. federal systems developed
by the National Institute of Standards and Technology (NIST)
• Corporate Governance
• COSO Set of internal corporate controls to help reduce the risk
of financial fraud developed by the Committee of Sponsoring
Organizations (COSO) of the Treadway Commission
• Process Management
• ITIL Processes to allow for IT service management developed by the
United Kingdom’s Office of Government Commerce
• Six Sigma Business management strategy that can be used to carry
out process improvement
• Capability Maturity Model Integration (CMMI) Organizational
development for process improvement developed by Carnegie Mellon

5

,Enterprise Architecture development
• Guides modeling of an enterprise
– Stakeholders
– Views: information that is most important to the different stakeholders is illustrated
in the most useful manner
• Alignment of business and technology
• Business and technology view the same organization in ways that make sense to them




Zachman framework




6

,The open group architecture framework(TOGAF)




Security frameworks

• DoDAF: U.S. Department of Defense architecture framework that ensures interoperability of
systems to meet military mission goals

– focus on command, control, communications, computers, intelligence, surveillance,
and reconnaissance systems and processes.

• MODAF: Architecture framework used mainly in military support missions developed by the
British Ministry of Defense

– get data in the right format to the right people as soon as possible.

• SABSA model: Model and methodology for the development of information security
enterprise architectures (Sherwood Applied Business Security Architecture)

– Integrates the requirements outlined in our security program into our existing
business structure




7

, Strategic alignment means the business drivers and the regulatory and legal requirements
are being met by the security enterprise architecture.
When looking at the business enablement requirement of the security enterprise architecture,
we need to remind ourselves that companies are in business to make money.
The process enhancement piece can be quite beneficial to an organization if it takes
advantage of this capability when it is presented to them.
Security effectiveness deals with metrics, meeting service level agreement (SLA) requirements,
achieving return on investment (ROI), meeting set baselines, and providing
management with a dashboard or balanced scorecard system. These are ways to
determine how useful the current security solutions and architecture as a whole are
performing.


• CobiT (Control Objectives for Information and related Technology): Set of control objectives
for IT management developed by Information Systems Audit and Control Association (ISACA)
and the IT Governance Institute (ITGI)
– Defines goals for the controls that should be used to properly manage IT and to
ensure that IT maps to business needs
– “checklist” approach to IT governance by providing a list of things that must be
thought through and accomplished when carrying out different IT functions




8

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper kevintjeuh. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €5,48. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 66579 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€5,48  73x  verkocht
  • (17)
  Kopen