Cissp 2022 Update Dom1 Handout
Cissp 2022 Update Dom1 Handout
Cissp 2022 Update Dom1 Handout
This series gets right to the point and eliminates the fluff!
Focuses on key characteristics of each concept to help you
identify right (and wrong) answers on exam day.
Content utilizes several proven learning methods to
accelerate your learning.
I will share techniques you can apply in your study
Table of contents in
the video description
so you can skip ahead to topic of your choice!
A pdf copy of the presentation is
available in the video description!
Subscribed
SUBSCRIBE
CISSP
EXAM STUDY GUIDE
9th edition, electronic version
THINK LIKE A
MANAGER short version
DUE DILIGENCE VS DUE CARE
Research Implementation
Planning Operation (upkeep)
Evaluation Reasonable measures
Do Detect Do Correct
EXAMPLES EXAMPLES
Knowledge and research of: Delivery or execution including:
✓ Laws and Regulations ✓ Reporting security incidents
✓ Industry standards ✓ Security awareness training
✓ Best practices ✓ Disabling access in a timely way
implement and
IT Engineer Operational operate
short term
advise!
During the exam, think of yourself
as an outside security consultant
advising an organization
You are advising on strategy,
DON’T TOUCH, priorities, and safety, not doing!
advise! Brings focus to process, role,
due diligence and due care
CISSP
EXAM the full story
STRATEGY
There is no
AWARD
for the longest
STUDY TIME!
How long does it take to memorize anything?
1st repetition Right after learning
2nd repetition After 15-20 min
3rd repetition After 6-8 hours
4th repetition After 24 hours
5th repetition After 48 hours
20 min
THE POWER OF
REPETITION
spaced repetition
100 Spaced Repetition
Forgetting curve
device
A common technique is the
expression mnemonic aka
MNEMONIC an acronym
device
The best mnemonic devices are
simple, relevant, and visual
MNEMONIC
device
We’ll start with an example
using a first letter mnemonic
MNEMONIC
device
THE OSI MODEL
Away 7 Application All
Throw 4 Transport To
|
Not 3 Network Need
Toss 4 Transport To
|
Not 3 Network Need
3 Mitigation
4 Reporting
|
5 Recovery
6 Remediation
7 Lessons Learned
INCIDENT MANAGEMENT framework
1 Detection
DRMRRRL
2 Response
3 Mitigation
4 Reporting
|
5 Recovery
6 Remediation
7 Lessons Learned
Chunking is a technique of
breaking info into smaller
MNEMONIC pieces that make sense
device
chunking
cryptography
Asymmetric Hashes
Block ciphers
Symmetric
PRACTICE POWERPOINT
EXAM REVIEW
CISSP EXAM CRAM
THE COMPLETE COURSE
This is a non-event.
For more cybersecurity exam prep tutorials, follow us on Youtube at Inside Cloud and Security
D O M A I N 1 : SECURITY & RISK MANAGEMENT
KNOW
BY HEART!
D O M A I N 1 : SECURITY & RISK MANAGEMENT
onfidentiality
ntegrity
vailability
D O M A I N 1 : SECURITY & RISK MANAGEMENT
1
onfidentiality
2 3
ntegrity vailability
D O M A I N 1 : SECURITY & RISK MANAGEMENT
onfidentiality
Access controls help ensure that only
authorized subjects can access objects
D O M A I N 1 : SECURITY & RISK MANAGEMENT
ntegrity
Ensures that data or system configurations
are not modified without authorization
D O M A I N 1 : SECURITY & RISK MANAGEMENT
vailability
Authorized requests for objects must
be granted to subjects within a
reasonable amount of time
D O M A I N 1 : ISC 2 CODE OF ETHICS
Security procedures
Detailed step-by-step
Security guidelines
Offer recommendations
Security baselines
define “minimum levels”
Acceptable use policy
Assign roles and responsibilities
FOR THE When developing new safeguards,
EXAM you are establishing a new baseline
FOR THE
EXAM
…so, compliance with existing baselines
is not a valid consideration point.
D O M A I N 1 : RISK CATEGORIES
REMEMBER:
Handling risk is not a one-time process!
D O M A I N 1 : RISK MANAGEMENT FRAMEWORK
OCTAVE
operationally critical threat, asset, and
vulnerability evaluation
FAIR
Factor Analysis of Information Risk
TARA
Threat Agent Risk Assessment
D O M A I N 1 : RISK MANAGEMENT FRAMEWORK
| and
Assigns a dollar value to evaluate
effectiveness of countermeasures
|
D O M A I N 1 : RISK ANALYSIS
Assigns a to evaluate
effectiveness of countermeasures
| OBJECTIVE
D O M A I N 1 : RISK ANALYSIS
D O M A I N 1 : RISK ANALYSIS STEPS
SUBJECTIVE
D O M A I N 1 : RISK ANALYSIS
An feedback-and-response
process used to arrive at a consensus.
D O M A I N 1 : RISK ANALYSIS
Loss potential
What would be lost if the threat agent is
successful in exploiting a vulnerability.
Delayed loss
This is the amount of loss that can occur
over time.
are what cause the threats by
exploiting vulnerabilities.
D O M A I N 1 : RISK ANALYSIS
are what cause the threats by
D O M A I N 1 : RISK ANALYSIS
D O M A I N 1 : CALCULATING RISK
AV EF SLE
$100,000 X .3 (30%) = $30,000
D O M A I N 1 : CALCULATING RISK
CISSP
EXAM
Availableon CRAM
D O M A I N 1 : SUPPLY CHAIN
Spoofing
Tampering
Repudiation
Information disclosure
developed by
Microsoft Denial of service
Elevation of privilege
D O M A I N 1 : THREAT MODELING
Visual
Agile
based on Agile
Simple
PM principles Threat
Damage potential
Reproducibility
Exploitability
based on answer Affected users
to 5 questions
Discoverability
D O M A I N 1 : THREAT MODELING
users
1
SQL
Brute force, dictionary
are proactive
are reactive
D O M A I N 1 : SECURITY CONTROLS
Deterrent. Deployed to of
security policies.
Preventative. Deployed to thwart or
from occurring.
Detective. Deployed to
unwanted or unauthorized activity.
Compensating. Provides
to aid in enforcement of security policies.
D O M A I N 1 : SECURITY CONTROLS
issues that
pertain to information security in
1. Strategy development
2. Provisions and processes
3. Plan approval
4. Plan implementation
5. Training and education
D O M A I N 1 : BUSINESS CONTINUITY
issues that
pertain to information security in
1. Strategy
2. Provisions and
3. Plan
4. Plan
5. Training and
D O M A I N 1 : USER EDUCATION