Isc2 CC
Isc2 CC
ISBN: 978-1-26-520394-8
MHID: 1-26-520394-6
TERMS OF USE
Glossary
Index
CONTENTS
Acknowledgments
Introduction
Security Fundamentals
Authentication
Privacy
Information Assurance
1. Conduct Research
2. Identify Targets
3. Exploit Targets
4. Do Bad Things
Risk Management
Security Controls
Professional Ethics
Chapter Review
Quick Review
Questions
Privileged Accounts
Chapter Review
Quick Review
Questions
Questions and Answers
Network Fundamentals
Network Types
System Addresses
Networking in Action
Protocols
Ports
OSI Model
TCP/IP
IP Addressing
Conducting Research
Identifying Targets
Exploiting Targets
Network Defenses
Firewalls
Wireless Security
Network Infrastructure
Cloud Infrastructure
Chapter Review
Quick Review
Questions
Data Security
Data Lifecycle
Cryptography
System Hardening
Patch Management
Configuration Baselines
Configuration Management
Chapter Review
Quick Review
Questions
Incident Response
Disaster Recovery
IT Facility Recovery
Data Recovery
Chapter Review
Quick Review
Questions
System Requirements
Privacy Notice
Technical Support
Glossary
Index
ACKNOWLEDGMENTS
About (ISC)2
(ISC)2 Requirements
Prerequisites
Training Options
Exam Information
Maintaining Certification
Like all McGraw Hill All-in-One Exam Guides, this book uses
repetition as an aid to reinforce the information presented and
to facilitate committing information to long-term memory. The
end of each chapter has a “Chapter Review” section that
presents a review of the essential themes of each section within
the chapter. The chapter review is followed by a “Quick
Review” section, which is a bulleted list of key points from the
chapter that are important to remember. The “Chapter Review”
and “Quick Review” sections combine to reinforce the
information presented in the chapter.
1. Read this book and try to answer the questions at the end of
each chapter to reinforce comprehension of the information.
2. Use TotalTester Online to take practice tests by domain. Write
down the topic of every question that you answer incorrectly or
have difficulty understanding.
• Security fundamentals
• On one side of the coin there are the cyber criminals who
carry out offensive attacks against information systems and the
organizations that own and operate them. Their goal is to steal
assets (money or intellectual property) or disrupt the operation
of information systems for personal, political, or financial gain.
Security Fundamentals
Confidentiality
Authentication
Authenticity
Nonrepudiation
Privacy
Information Assurance
• ISACA Risk IT
1. Conduct research
2. Identify targets
3. Exploit targets
4. Do bad things
1. Conduct Research
• Domain names
• Ingress/egress details
2. Identify Targets
3. Exploit Targets
Once the targets are identified, the attacker can design and
execute the attack. This involves probing and taking advantage
of specific vulnerabilities with the goal of gaining unauthorized
access to the enterprise. Many times, this involves designing
and creating tools to aid in the attack. Here are some common
examples of methods used by attackers—all of these are
explained further later in this book:
4. Do Bad Things
Cyberattack Models
3. Do bad things:
Risk Management
Imagine you are shopping for a new lock to install on the front
door of your home. You consider whether to install a deadbolt,
a chain lock, or one of those fancy digital locks with a built-in
camera. You decide that based on your situation and your
home, a simple doorknob lock is best for you. You may not
realize it, but you just practiced risk management. In the fields
of security and cybersecurity, risk management is the term used
to describe the discipline of how an organization chooses and
implements the right level of security that is appropriate for
them and their situation or business.
Insider Threats
• Asset value
• Threat probability
• Vulnerability
• Impact of loss
AV × EF = SLE
• Asset value (AV) is the cost of the asset or assets that are
subject to the event. The AV can be simply the replacement cost
of the asset, or it can include other costs that may be incurred if
the asset were lost, such as labor and installation costs, costs to
the business due to downtime, or even costs due to loss of
business.
• Effectiveness of controls
• Accept the risk, which means that as long as the risk is within
acceptable levels, the organization can “live with” the risk and
take their chances (risk acceptance). For most organizations
there is usually some amount of risk the organization is simply
willing to accept due to its unlikeliness or the high cost of
mitigation. For instance, an organization with a datacenter
located on a high plateau with no history of flooding may
choose to accept the relatively low risk of a flood.
Compliance
Compliance is the process of ensuring alignment with
applicable laws, regulations, external standards, ethical
conduct, and other organizational goals and objectives.
Compliance is often focused on legal and regulatory compliance
due to the consequences of noncompliance (fines, reputational
damage, and so on). However, compliance with external laws
and regulations is not the only form of compliance. There are
both internal and external requirements, as outlined in Figure
1-5, that drive the organization to implement plans, policies,
internal standards, and procedures to facilitate compliance and
support healthy governance.
Security Controls
Defense-in-Depth
Work Factor
• Documentation
• Training
While the security team may not be tasked with managing these
processes directly, it is essential that there is a partnership
between HR and security to ensure appropriate controls are in
place throughout.
• Lighting
• Bollards
• Alarms
• Security guards or guard dogs
• Door locks
• Stop signs
• Badge reader/badges
• Surveillance cameras
• Preventive controls
• Detective controls
• Deterrent controls
• Corrective controls
• Directive controls
• Compensating controls
Professional Ethics
Ethics are moral standards or principles that govern behavior
with a focus on acting responsibly with integrity and
accountability. It means having a moral compass to determine
right from wrong even when no one is watching. We commonly
face ethical dilemmas in our day-to-day life whether it’s
determining what to do with a lost wallet found on the street or
deciding if the restaurant server should be notified that the bill
is missing an item that was purchased. In some cases, the
ethical or moral option is easily identifiable; however, ethical
standards and everyone’s own individual moral compass are
often subjective and open to interpretation. This is why many
organizations develop a documented code of ethics, ethics
policy, and/or ethics program to set an agreed-upon standard
for expected behavior for the members of the organization
(employees, professional members, executives, the board, and
other stakeholders). This is sometimes referred to as
organizational or professional ethics.
• The safety and welfare of society and the common good, duty
to our principals, and to each other requires that we adhere,
and be seen to adhere, to the highest ethical standards of
behavior.
Chapter Review
Cybersecurity is the practice of protecting information
resources (computers, networks, and data) from unauthorized
use. There are two sides to the cybersecurity coin: cyber
criminals carry out offensive attacks, and cybersecurity
professionals defend, protect, respond, and recover from
attacks. The key elements of cybersecurity are confidentiality,
integrity, availability, authentication and authorization,
message integrity, privacy, and information assurance.
Quick Review
• The basic principles of information security are
confidentiality, availability, and integrity.
Questions
A. Confidentiality
B. Integrity
C. Availability
D. Nonrepudiation
A. Authentication
B. Authorization
C. Authenticity
D. Availability
A. Nonreputation
B. Nonrefutability
C. Nonrepudiation
D. Authenticity
A. Confidentiality
B. Integrity
C. Availability
A. Quality
B. Confidentiality
C. Ethics
D. Measurement
C. Deploy malware.
D. Steal data.
A. Threat agent
B. Threat
C. Vulnerability
D. Risk
A. Qualitative
B. Threat modeling
C. Quantitative
D. Delphi
A. Risk transfer
B. Risk avoidance
C. Risk acceptance
D. Risk mitigation
A. Administrative
B. Technical
C. Physical
D. Logical
A. Policy
B. Procedure
C. Guideline
D. Law
A. Administrative
B. Technical
C. Logical
D. Physical
A. Confidentiality
B. Integrity
C. Availability
D. Nonrepudiation
A. Authentication
B. Authorization
C. Authenticity
D. Availability
A. Nonreputation
B. Nonrefutability
C. Nonrepudiation
D. Authenticity
A. Confidentiality
B. Integrity
C. Availability
D. None of the above
A. Quality
B. Confidentiality
C. Ethics
D. Measurement
C. Deploy malware.
D. Steal data.
A. Threat agent
B. Threat
C. Vulnerability
D. Risk
A. Qualitative
B. Threat modeling
C. Quantitative
D. Delphi
A. Since you have no financial data, a quantitative assessment
is not possible, but since you have information about how each
asset in the system is used and its importance to the business,
you have what you need to do a qualitative analysis.
A. Risk transfer
B. Risk avoidance
C. Risk acceptance
D. Risk mitigation
A. Administrative
B. Technical
C. Physical
D. Logical
A. Policy
B. Procedure
C. Guideline
D. Law
A. Administrative
B. Technical
C. Logical
D. Physical
• Privileged accounts
• Need to know
• Segregation of duties
• Two-person rule
• Memorized secrets
Need to Know
Need to know is the basic premise of access control. Access to a
resource should only be granted to a user who has a legitimate
need to know, which means that the user requires access to the
resource in order to perform a business function. In practice,
when a user’s permissions are set up within an information
system, the user’s access to systems and/or data is established
based on the user’s official duties. For example, if as part of a
user’s official duties they need to be able to edit employee
personnel files, then they have a need to know and should be
allowed access to the files.
Two-Person Rule
Memorized Secrets
Password Rotation
Authentication Factors
Privileged Accounts
• Need to know
• Two-person rule
• Privileged accounts
DAC, MAC, and RBAC are the commonly used access control
models; however, there are other implementations as well. One
example is attribute-based access control (ABAC). ABAC is also
referred to as policy-based access control or claims-based
access control, as it grants permissions based on a variety of
attributes such as who is making the request (subject), what
resource is being requested (object), environmental conditions
(e.g., time of day or location), and what action is being
requested (e.g., read, write). This allows access to be granted
based on a combination of attributes such as date, time,
Internet Protocol (IP) address, and so on.
Identity Management Technologies
• Directories
• Single sign-on
Directories
Single Sign-On
• Facility access
• Environmental design considerations
• Bollards
• Mantrap
Facility Access
• Biometrics technology
• Security guards
• Security cameras
Security Guards
Chapter Review
Quick Review
Questions
A. Principle of authentication
B. Two-person rule
C. Need to know
D. Least privilege
A. Privilege modification
B. Access management
D. Privilege creep
6. The identity and access management lifecycle consists of
which steps?
A. DAC
B. MAC
C. RBAC
B. RBAC
C. Badge system
D. Bollards
A. Bollard
B. Mantrap
C. Fence
D. Biometric lock
A. DAC
B. MAC
C. RBAC
A. Principle of authentication
B. Two-person rule
C. Need to know
D. Least privilege
4. Joe has to log in to many systems on a daily basis and has too
many passwords to remember. What is the best way for Joe to
manage his passwords?
A. Privilege modification
B. Access management
D. Privilege creep
A. DAC
B. MAC
C. RBAC
A. Biometrics
B. RBAC
C. Badge system
D. Bollards
A. Bollard
B. Mantrap
C. Fence
D. Biometric lock
A. DAC
B. MAC
C. RBAC
• Network fundamentals
• Network defenses
• Network infrastructure
Network Fundamentals
• Network types
• System addresses
• Networking in action
• Protocols
• Ports
• OSI model
• TCP/IP
• IP addressing
Network Types
System Addresses
• Switch
• Router
• Network interface
• Security appliance
• Endpoint
• Internet of Things
• Hub
Switch
Router
Network Interface
Security Appliance
Client/Server
Endpoint
Internet of Things
Hub
Networking in Action
Now that we have gone over the different types of networks,
system addresses, and common devices, let’s look at how some
of these devices work together. Figure 3-2 has an example of a
typical home network. You likely have devices such as laptops,
desktops, mobile phones, and potentially other IoT devices (e.g.,
home cameras or security systems). These devices connect to
your home network wirelessly or wired (physically plugged
into the home router/modem). Devices on a home network are
typically dynamically assigned private IP addresses by the
home router using DHCP, often 192.168.x.x (more on DHCP and
private IP addresses later in this chapter). When one of these
computers needs to interact with a computer on the Internet,
the home router routes that traffic and translates that private IP
to a public IP assigned to the home router by the ISP.
Figure 3-2 Home network example
Protocols
Secure Protocols
The term port can have different meanings. There are both
physical and logical ports, similar to how we have both physical
addresses (MAC address) and logical addresses (IP address), as
discussed previously.
Physical Port
Logical Port
OSI Model
Application (Layer 7)
Presentation (Layer 6)
Session (Layer 5)
Transport (Layer 4)
Network (Layer 3)
Physical (Layer 1)
The Physical Layer deals with how bits (binary 1’s and 0’s) are
transmitted and received. The Physical Layer doesn’t really
have protocols, but instead has standards that define the
physical aspects of the data transmission. Network hubs and
repeaters operate at this layer.
TCP/IP
The TCP/IP model consists of four layers, which are (from top to
bottom) the Application Layer, Host-to-Host Layer, Internet
Layer, and Network Access Layer. In this section, we will walk
through each layer of the TCP/IP model, discuss the
functionality of that layer, and provide some key TCP/IP
protocols you should be aware of.
Application Layer
NOTE FTP and FTPS actually each use two ports, one for
commands (such as FTP commands to the client/server) and
another for data transfer. FTP typically uses port 21 for
commands and port 20 for data transfers, while FTPS uses port
990 for commands and 989 for data transfer. SFTP uses port 22
for both command and data transfer.
Host-to-Host Layer
Internet Layer
IP Addressing
IPv4
Network Segmentation
• 10.0.0.0 to 10.255.255.255
• 172.16.0.0 to 172.31.255.255
• 192.168.0.0 to 192.168.255.255
NOTE CC candidates may not be directly tested on public and
private IP addresses on the exam; however, it is an important
concept to understand.
IPv6
1. Conduct research
2. Identify targets
3. Exploit targets
4. Do bad things
Conducting Research
With the goal in mind, cyber criminals, like any criminal, also
each have their own modus operandi (MO), or preferred
method of working. This may also shape the type of
information they gather and what they do with what they find.
Identifying Targets
Exploiting Targets
• Password attacks
• Man-in-the-middle attacks
• Physical attacks
• Viruses
• Ransomware
• Rootkits
EXAM TIP It’s good to know about the various types of viruses,
but you aren’t likely to encounter questions about the different
types on the CC exam.
Ransomware Examples
Password Attacks
• Hackers can setup their own Wi-Fi access points to trick users
into connecting to them thinking they are connecting to
legitimate business, organization, or public Wi-Fi access points.
By doing this, hackers can capture and collect a user’s data or
manipulate it to their liking.
Physical Attacks
• Extortion
• Denial of service
Exfiltration
• Cryptographic keys
Extortion
Denial of Service
Here are a few common types of DoS attacks which can also be
launched as DDoS attacks using botnets:
• Ping attack A ping attack is another attack that uses the ICMP
protocol. It involves using the ICMP ping or echo command,
which is supposed to simply ask a computer, “Are you there?”
by sending one ping and expecting one response back. But if an
attacker floods a system with many ping requests, it can
overwhelm the system and the supporting network resources. A
variant of this attack is the ping of death attack in which the
attacker creates ping requests of extremely large size. Such
large ping messages can disrupt systems that are not designed
to handle them.
• Malware
• Scripting
• Social engineering
• Password attacks
• Man-in-the-middle attacks
• Phishing and spear phishing use e-mails that look like real e-
mails but are actually fraudulent.
Network Defenses
• Firewalls
• Network segmentation
• Demilitarized zones
• Virtual private networks
• Threat intelligence
• IDS/IPS
• Antivirus software
• Wireless security
• IoT security
Firewalls
In the figure, the firewall limits the type of traffic to and from
the corporate network to only that which the corporation
wants, based on the organization’s security policies. For
instance, the corporation may only want to allow connections
from certain locations (IP addresses) or applications to connect
to the corporate network. Likewise, they may want to limit the
type of data that can leave the corporate network. These are
some of the things that can be done with a firewall.
Packet Filter
Packet filters are the most basic and least expensive type of
firewall. A packet filter is a kind of router. It screens all traffic
and makes decisions as to whether to allow or deny traffic to
pass from one of its interfaces to another based on the header
information of each message. The firewall contains an access
control list (ACL) which is configured by the organization. The
ACL contains the rules upon which the firewall allows or denies
what traffic can flow. The ACL contains information including
• Protocol
• Direction of traffic
For example, an ACL may contain a rule that says web traffic
using the HTTP protocol can enter the organization’s LAN only
if it contains the destination IP address of the organization’s
web server.
Proxy
Network Segmentation
Demilitarized Zones
Threat Intelligence
• Threat actors
• Actor’s tactics, techniques, and processes
Whereas IDS and IPS products use the same technology and
methods to detect potentially malicious activity, the difference
lies in what each one does about that activity. An IDS simply
reports the activity so the security staff can see the alert and
perform an investigation to determine if the alert represents
actual malicious activity or a breach and then determine the
appropriate course of action. An IPS goes beyond mere
detection and reporting by automatically taking action to try to
stop the attack or minimize its impact. Some of the actions an
IPS may take include blocking traffic from a particular IP
address, turning off a port on a firewall, resetting a device such
as a router, or even changing data to remove or replace
malicious messages or files.
Antivirus Software
Antivirus software is exactly as its name implies. It protects the
device on which it is installed against attacks from viruses.
Most antivirus products detect and remove many types of
malware and in addition protect computers against other
threats, including spam and phishing attacks.
Wireless Security
Penetration Testing
1. Conduct research
2. Identify targets
3. Exploit targets
4. Do bad things
• Network segmentation
• Demilitarized zones
Network Infrastructure
• Cloud infrastructure
The main difference between an on-premises datacenter
infrastructure and cloud infrastructure lies in how the service
is provisioned, managed, and utilized.
• Staffing models
Staffing Models
Preventative Maintenance
In many cases, the CSC and CSP are different entities, such as an
organization leveraging a CSP (like Azure or AWS) to host their
infrastructure. However, in some cases, the “customer” and
“provider” could even be in the same organization.
For example, an organization’s IT department may develop a
private cloud (discussed later in this section) to allow other
teams in the organization (e.g., engineering, development) to
create and provision their own virtual computing resources as
needed.
When the term “cloud” began to first gain traction, there was
not a standard agreed-upon definition. Organizations like NIST
and ISO/IEC defined essential characteristics for cloud
computing to help clarify the terminology and define a
standard for its usage. The following are the five essential
characteristics of cloud computing as defined in NIST Special
Publication 800-145, The NIST Definition of Cloud Computing:
As a Service Models
• SOC reports
• ISO/IEC certification
• FedRAMP authorization
• Cloud computing
Chapter Review
Network Fundamentals
• Application Layer
• Host-to-Host Layer
• Internet Layer
• Conduct research
• Identify targets
• Exploit targets
• Do bad things
Network Defenses
• Defense-in-depth means that rather than rely on just one
control, a better strategy is to use multiple layers of security
controls.
• On-demand self-service
• Rapid elasticity
• Resource pooling
• Measured service
• Public
• Private
• Community
• Hybrid
Questions
1. Which of the following is referred to as a physical address in
computer networking?
A. IPv4 address
B. IPv6 address
C. MAC address
D. Loopback address
A. 8
B. 7
C. 6
D. 5
A. Client
B. Server
C. Endpoint
D. Router
A. Application
B. Session
C. Presentation
D. Network
B. DDoS attack
D. Backdoor attack
B. It is a type of malware.
C. It is a type of botnet.
B. False
10. Joe is a cyber criminal who has targeted a web server for a
potential cyberattack. Joe wants to know if the server has any
unpatched vulnerabilities he might be able to exploit. Which of
the following actions is Joe most likely to take?
A. Buffer overflow
B. SQL injection
D. Backdoor
A. Passwords
B. Backdoors
C. Laws
D. People
C. Extortion
D. Data exfiltration
C. Extortion attack
B. Packet filter
D. Database filter
A. Google
C. Threat intelligence
A. Data security
A. IaaS
B. PaaS
C. SaaS
D. On-premises
A. IaaS
B. PaaS
C. SaaS
D. On-premises
A. Public
B. Private
C. Community
D. Hybrid
A. Public
B. Private
C. Community
D. Hybrid
A. SaaS
B. PaaS
C. IaaS
D. On-premises
A. IPv4 address
B. IPv6 address
C. MAC address
D. Loopback address
C. Media access control (MAC) addresses are often referred to
as a physical address or hardware address since they are
assigned to the device’s physical hardware. Internet Protocol
(IP) addresses are known as logical addresses. A loopback
address is a special type of IP address.
A. 8
B. 7
C. 6
D. 5
A. Client
B. Server
C. Endpoint
D. Router
A. Application
B. Session
C. Presentation
D. Network
B. DDoS attack
D. Backdoor attack
B. It is a type of malware.
C. It is a type of botnet.
A. True
B. False
10. Joe is a cyber criminal who has targeted a web server for a
potential cyberattack. Joe wants to know if the server has any
unpatched vulnerabilities he might be able to exploit. Which of
the following actions is Joe most likely to take?
B. SQL injection
D. Backdoor
A. Passwords
B. Backdoors
C. Laws
D. People
A. Denial of service
C. Extortion
D. Data exfiltration
C. Extortion attack
A. Proxy
B. Packet filter
D. Database filter
A. Google
C. Threat intelligence
A. Data security
D. Endpoint protection
B. Physical security of the datacenter is always the
responsibility of the cloud service provider.
A. IaaS
B. PaaS
C. SaaS
D. On-premises
B. PaaS
C. SaaS
D. On-premises
A. Public
B. Private
C. Community
D. Hybrid
A. Public
B. Private
C. Community
D. Hybrid
B. PaaS
C. IaaS
D. On-premises
• Data security
• System hardening
Data Security
• Data lifecycle
• Cryptography
• Logging and monitoring
Data Lifecycle
• Create
• Store
• Use
• Share
• Archive
• Destroy
Create
The first phase of the data lifecycle is when the data comes to
exist within the organization. The data could be acquired from
another organization (such as a vendor, customer, or another
party) or created from scratch within the organization itself.
When data comes to exist, the organization must decide how to
appropriately protect the data (e.g., encryption, access controls,
monitoring). In addition, the organization must consider
various privacy requirements around how data may be used
and shared.
Data Classification
Archive
Destroy
Cryptography
Encryption
Hashing
Password Salting
Digital Signature
Algorithm Summary
Cryptography in Action
Logging
Logs are files that store information about various events that
occur on a system. Systems and applications have the capability
to generate these logs based on configuration settings. Examples
of events that may be logged include
• Applications
• Databases
Log Management
Monitoring Techniques
System Hardening
Patch Management
• Asset management You can’t patch what you don’t know you
have. Patch management starts with asset discovery, which is
an understanding of what systems the organization has and
what operating systems, software applications, and versions are
installed on those systems. The information obtained during
asset discovery is stored, sometimes in simple spreadsheets or
in a database. Some organizations keep track of their assets
using asset inventory software that automatically scans the
network looking for devices and then builds and maintains a
database of all asset information.
Configuration Baselines
Configuration Management
• Password policy
• Privacy policy
Password Policy
The password policy defines the requirements for password
size and format, usage, and protection. The policy usually
covers requirements for password creation, changes to
passwords, practices for protecting passwords such as secure
storage and transmission, and use of passwords in applications.
Password creation requirements usually include requirements
for password length to create passwords of the desired
strength.
Privacy Policy
• Password policy
• Acceptable use policy (AUP)
• Privacy policy
Awareness
Training
Tracking
Chapter Review
Quick Review
A. Asymmetric
B. Symmetric
C. Hashing
C. Zeroization
D. Overwriting
C. Hash functions
C. Implement a SIEM
D. Implement a firewall
A. Asymmetric
B. Symmetric
C. Hashing
D. None of the above
C. The endpoints have not been kept up-to-date with the latest
security patches.
D. Data integrity.
A. AUP
B. BYOD policy
A. AUP
B. BYOD
A. Security awareness
B. Security training
C. Security policy
D. Security testing
A. Asymmetric
B. Symmetric
C. Hashing
C. Zeroization
D. Overwriting
C. Hash functions
C. Implement a SIEM
D. Implement a firewall
A. Asymmetric
B. Symmetric
C. Hashing
C. The endpoints have not been kept up-to-date with the latest
security patches.
D. Data integrity.
A. AUP
B. BYOD policy
B. BYOD
A. Security awareness
B. Security training
C. Security policy
D. Security testing
A. The use of posters and reminders in the workplace is an
example of security awareness.
• Incident response
• Business continuity
• Disaster recovery
Incident Response
The boxer Mike Tyson once famously said, “everyone has a plan
until they get punched in the mouth.” While this quote was
specific to boxing, it is an applicable metaphor to cybersecurity
and, in particular, incident response. In boxing it is important
to have proper defense and be able to block the incoming
punch (think preventive controls from Chapter 1). However, if
your training has not conditioned and prepared your body to
take a punch and your strategy is based purely on the
assumption you will never get hit, your chances of recovering
from a punch are not great. The reality of life is that bad things
happen, and oftentimes it is how we prepare, respond, and
recover from these situations that is most meaningful.
Preparation
• Common attacks
• Status of incident
• Summary of incident
• Evidence gathered
• Evidence handling
• Containment strategies
Post-Incident Activity
• Retention of evidence
• Senior management
• IT department
• Security department
• Facilities department
• Public relations or communications department
• Legal department
• Regulatory compliance
• Organizational reputation
• Financial impact
• Facility recovery
• Communications recovery
• Data recovery
All of the results of the BIA and the data that contributed to the
BIA are consolidated into a business continuity plan. Having all
the data in one place allows the plan to be put into action. Once
the plan is developed, supporting procedures can be developed
along with other documentation that aids the plan such as
calling trees, emergency contact lists, etc. No two business
continuity plans look the same, but a typical plan might contain
the following sections:
• BIA results
• Preventive controls
• Employee safety
• Response plans
• Activation criteria
• Communications plans
• Public relations
Over the life of the plan recovery personnel are trained on all
elements of the business continuity plan, especially those areas
that they are responsible for. Also, all employees should be
trained in first aid and cardiopulmonary resuscitation (CPR),
which may be required during a disaster. Training for
personnel with contingency plan responsibilities should be
performed on an annual basis.
Disaster Recovery
IT Facility Recovery
Hot Site
Warm Site
Cold Site
When choosing the location of a backup site, it’s a good idea for
it to be far enough away from the primary site that the
likelihood that a single disaster or incident will impact both
sites is reduced. Some organizations have regional datacenters
to ensure that they can continue to operate nationally if there is
a disaster in one region of the country.
Data Recovery
Chapter Review
Quick Review
• Preparation
• Post-incident activity
Questions
A. Preparation
D. Post-incident activity
C. Preparation
D. Post-incident activity
C. Preparation
D. Post-incident activity
4. In which phase of the incident response process would a
security analyst recover a system from a backup?
A. Preparation
C. Post-incident activity
B. Preparation.
C. Post-incident activity.
A. Hot site
B. Warm site
C. Cold site
D. Tertiary site
A. Preparation
D. Post-incident activity
D. Post-incident activity
C. Preparation
D. Post-incident activity
C. Post-incident activity
B. Preparation.
C. Post-incident activity.
A. Hot site
B. Warm site
C. Cold site
D. Tertiary site
System Requirements
Privacy Notice
5. For new users, click the Register and Claim button to create
your account. For existing users, click the Log in and Claim
button.
You will be taken to the Training Hub and have access to the
content for this book.
TotalTester Online
Technical Support
access control list (ACL) A list that shows an object and all of
the subjects that can access that object as well as their
corresponding permissions (e.g., read, write, no access, full
control, and so on).
mantrap An area that has two locked doors built in such a way
that the first door must be closed before the second door can be
opened and access to a secure area can be granted.
media access control (MAC) address Unique serial numbers
assigned to the network interface of computing devices.
access control
authentication, 6, 59–61
authorization, 59
concepts, 54–55
confidentiality, 4
fundamentals, 53–54
logical, 65–72
physical, 72–78
questions, 81–87
review, 79–81
summary, 65
technical, 33–34
two-person rule, 57
accounts
audits, 70
privileged, 63–65
actors, threat
description, 6
examples, 15–16
system, 91
administration, 28
alarm systems, 78
Application Layer
applications
vulnerabilities, 14
web, 219
audits
account, 70
cloud, 157
authentication
access control, 59
factors, 60–61
authenticity of messages, 7
awareness training
components, 197–199
description, 28
overview, 196
topics, 199
B
backdoors, 121
backups, 241
biometrics, 76–77
bollards, 73
botnets, 117
description, 209
overview, 226
questions, 243–247
review, 241–243
activating, 237
coordinators, 228–229
datacenters, 150
developing, 234–235
maintaining, 236–237
overview, 227–228
testing, 235–236
CAI triad, 3
availability, 5
confidentiality, 4
integrity, 4–5
cameras, 78
certificates, 181–182
ciphertext, 178
client-server model, 93
closed-circuit TV (CCTV), 78
cloud infrastructure
entities, 152–153
overview, 151–152
description, 25
Security Trust Assurance and Risk program, 158
compensating controls
types, 37–38
compliance
assessments, 146–147
laws and regulations, 24
compromise issues
credentials, 219
risk management, 14
administrative, 31–33
defense-in-depth, 30–31
description, 16
functions, 36–38
overview, 28–30
physical, 34–35
summary, 35
technical, 33–34
corrective controls, 37
create phase
data lifecycle, 177
criminal groups, 15
cryptography
confidentiality, 4
encryption, 178–184
overview, 178
description, 25
cyber criminals, 1, 15
cyberattack elements
actions step, 11
steps overview, 9
summary, 11–12
cyberattacks, description, 15
cybersecurity professionals, 1
Cyberseek tool, 27
D
DAC (discretionary access control), 66–67
data in transit
cryptography, 178
secure protocols, 97
data security
classification, 177
cryptography, 178–184
lifecycles, 176–178
logging, 185–186
monitoring, 186–187
overview, 175–176
technical controls, 33
datacenters, 148–151
de-encapsulation, 100
defense-in-depth, 30–31
defenses
filters, 139
firewalls, 134–135
Internet of Things, 143–144
layered, 30–31
overview, 133
review, 162–163
summary, 147
deployment
cloud models, 155–156
deterrent controls, 37
directive controls, 37
disaster recovery
data recovery, 241
description, 209
overview, 237
questions, 243–247
review, 241–243
datacenters, 150
purpose, 237
overview, 105
spoofing, 126
documentation
administrative controls, 32
overview, 105
spoofing, 126
doors, 73–75
datacenters, 150
purpose, 237
dual-factor authentication, 6
dynamic ports, 98
802 standards, 90
emergency accounts, 63
encapsulation, 100
encryption
asymmetric, 179–180
hashing, 182
overview, 178–179
symmetric, 179
endpoints
engineering, security, 28
Ethernet, 90
ethics, 38–40
exfiltration, 128–129
exploits
incident response, 211
zero-day, 142
exposure, 16
extortion, 129–130
fail-safe doors, 75
fail-secure doors, 75
filters
firewalls, 134–135
firewalls
description, 93
overview, 134
proxy, 135–136
guards, 77–78
hackers, 15
hacktivism, 15
hashing
encryption, 182
passwords, 124
hubs, 94
overview, 103
identification
authentication, 6
directories, 69
lifecycles, 62–63
privileged accounts, 63–65
technologies, 68–70
overview, 140–141
description, 25
Ethernet standards, 90
incident response
containment, 222–224
overview, 211
plans, 213
policies, 212–213
procedures, 213
process, 215–226
questions, 243–247
recovery, 222
review, 241–243
teams, 214–215
terminology, 211–212
information assurance, 8
InfraGard, 140
infrastructure
overview, 147–148
Ethernet standards, 90
certification, 157
description, 24
framework, 8
IPv4, 108–111
IPv6, 111
overview, 91
overview, 140–141
overview, 140–141
overview, 140–141
(ISC)2
layers
leadership roles, 27
data, 176–178
examples, 65–66
models, 66–68
monitoring, 70–71
summary, 72
technologies, 68–70
logs
access, 77–78
logical access, 71
ARP, 107
overview, 91–92
macro viruses, 116
malicious software
botnets, 117
common, 117–118
overview, 115
ransomware, 118–119
rootkits, 119
trojans, 116
viruses, 115–116
worms, 117
ARP, 107
overview, 91–92
disk, 241
sites, 239
misconfigurations
avoiding, 189–190
vulnerabilities, 15
modems, 92
monitoring
multiport repeaters, 94
description, 24
passwords, 58
natural disasters, 15
natural surveillance, 77
network security
controls, 34
IP addressing, 108–111
network types, 90
ports, 97–98
protocols, 96–97
questions, 164–174
review, 158–164
system addresses, 90
nonrepudiation, 7
nonsecure ports, 98
nonsecure protocols, 97
layers, 100–102
overview, 99
operational controls, 35
outsourcing
passwords
attacks, 124–125
policies, 194
rotating, 58
salting, 182–183
storing, 58
strength, 57
unique, 60
patch management
process, 187–189
perimeter
protecting, 72–75
phishing, 123–124
photo IDs, 75
examples, 34–38
monitoring, 77–78
summary, 78
physical intrusions, 15
Physical Layer in OSI model, 102
physical ports, 98
physical security
assessments, 146
datacenters, 149
plaintext, 178
plans
security governance, 26
policies
memorized secrets, 58
security governance, 26
ports, 97–98
post-incident activities, 224–225
preventive controls
description, 36
overview, 7
policies, 195
private ports, 98
overview, 179–180
ransomware, 118–119
registered ports, 98
repeaters, 94
resourcing
retention
data, 177
evidence, 225
review stage in identity and access management, 62
risk description, 16
risk management
overview, 13–14
terminology, 14–16
tiers, 18
treatment step, 21
rootkits, 119
routers, 92
scope
secure ports, 98
secure protocols, 97
security appliances, 93
components, 197–199
description, 28
overview, 196
topics, 199
security cameras, 78
overview, 22
plans, 26
policies, 26
procedures, 26
standards, 24–25
security operations
overview, 175
questions, 202–207
review, 200–202
security principles
authentication, 6
information assurance, 8
overview, 1–2
privacy, 7–8
questions, 44–51
review, 40–43
security program elements
areas, 28
ethics, 38–40
overview, 12
segmentation
datacenters, 149
sign-in sheets, 75
signatures, 7, 183
Simple Mail Transfer Protocol (SMTP), 104
description, 15
overview, 122–123
sockets, 98
staffing
datacenters, 148–149
superuser accounts, 63
surveillance, 77
switches, 92
system accounts, 64
system addresses, 91
system hardening
overview, 187
teams
technical controls, 37
termination processes, 33
territorial reinforcement, 77
terrorist groups, 16
testing
theft, 219
threat actors
description, 6
examples, 15–16
threat agents, 15
threat intelligence
overview, 139–140
examples, 15
exfiltration, 128–129
extortion, 129–130
modeling, 18
objectives, 128
overview, 112–113
passwords, 124–125
physical, 126–127
research, 113
review, 161–162
scripts, 120–121
summary, 132–133
zero-day, 142
training
administrative control, 32
improperly trained users, 15
overview, 102
turnstiles, 73–74
two-factor authentication, 6
unique passwords, 60
unpatched systems, 14
vaulting, 241
viruses
overview, 115–116
vulnerabilities
zero-day, 142
description, 15
overview, 146
walls, 73
web applications
filters, 139
Wi-Fi, 90
wired networks, 90
wireless networks
description, 90
security, 142–143
work factor, 31
worms, 117