You are on page 1of 178

Certified

Information
Systems
Security
CISSP ® Professional

Domain 3
(©) Copyright ThorTeaches 2018 -
1
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Welcome to the third CBK Domain.

 In this chapter we focuses on how we protect our assets.


 Security Architecture and Design:
 Cryptography:
 Physical Security

 CBK 3 makes up 13% of the exam questions, being so broad it contains close to 25%
of the exam materials.

(©) Copyright ThorTeaches 2018 -


2
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Security Models Fundamental Concepts:

https://www.cybrary.it/video/part-05-security-models-and-access-control-models/

(©) Copyright ThorTeaches 2018 -


3
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Security Models Fundamental Concepts:


Security models provide the rules for how we secure our data, while focusing on
different goals and what they provide.
 DAC - (Discretionary Access Control)
 MAC - (Mandatory Access Control)
 RBAC - (Role Based Access Control)
 ABAC - (Attribute Based Access Control)
Attributes could be:
 Subject (user)
 Object (resource)
 Environment
 RUBAC - (Rule Based Access Control)
Shon Harris 8th
(©) Copyright ThorTeaches 2018 - Ed. Page 315 4
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Security Models Fundamental Concepts:


 Bell-LaPadula: (Confidentiality) (Mandatory Access
Control):

 Simple Security Property “No Read UP”

 Security Property: "No Write DOWN”

 Strong Property: "No Read or Write UP and DOWN".

(©) Copyright ThorTeaches 2018 -


5
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Security Models Fundamental Concepts:


 BIBA: Integrity (Mandatory Access Control):

 Simple Integrity Axiom: "No Read DOWW”.

 Integrity Axiom : "No Write UP".

 Invocation Property: "No Read or Write UP".

(©) Copyright ThorTeaches 2018 -


6
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Security Models Fundamental Concepts:


 Lattice Based Access Control (LBAC) (MAC):
 A subject can have multiple access rights.

 A Subject with TopSecret" {crypto, chemical}


 A Subject with Secret" {crypto}
 A subject with "Top Secret" {chemical}

Shon Harris 8th


(©) Copyright ThorTeaches 2018 - Ed. Page 1288 7
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Security Models Fundamental Concepts:


 Graham-Denning Model
 The 8 rules that a specific subject can execute on an object are:
1. Transfer Access.
2. Grant Access.
3. Delete Access.
4. Read Object.
5. Create Object.
6. Destroy Object.
7. Create Subject.
8. Destroy Subject.
Shon Harris 8
th
(©) Copyright ThorTeaches 2018 - Ed. Page 316 8
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Security Models Fundamental Concepts:


 HRU model (Harrison, Ruzzo, Ullman).

 Uses six primitive operations:


 Create object.
 Create subject.
 Destroy subject.
 Destroy object.
 Enter right into access matrix.
 Delete right from access matrix.
Shon Harris 8th
(©) Copyright ThorTeaches 2018 - Ed. Page 315 9
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Security Models Fundamental


Concepts:

 Clark-Wilson – Integrity.

 Separation of duties.

 Well-formed transactions.
Shon Harris 8th
(©) Copyright ThorTeaches 2018 - Ed. Page 315 10
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Security Models Fundamental


Concepts:

 Brewer-Nash (Chinese Wall or Information


Barriers)

 Non-Interference Model

Shon Harris 8th


(©) Copyright ThorTeaches 2018 - Ed. Page 319 11
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Security Models Fundamental


Concepts:
 Take-Grant Protection Model:
 It has 4 rules:
 Take rule
 Grant rule
 Create rule
 Remove rule
Think of MS AD
(©) Copyright ThorTeaches 2018 - security! 12
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Security Models Fundamental Concepts:

 Access Control Matrix:


 One row per subject.
 One column per object.

(©) Copyright ThorTeaches 2018 -


13
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Security Models
Fundamental
Concepts:
 Zachman Framework (for
Enterprise Architecture):
 Provides Six Frameworks

 Mapping those
frameworks to rules.

Shon Harris 8th


(©) Copyright ThorTeaches 2018 - Ed. Page 139 14
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Security Models Fundamental Concepts:


 Security Modes- can be MAC or DAC (Mandatory or
Discretionary Access Control):
 The mode is determined by:
Type of users, type of data, type of levels of users

 Dedicated security mode - All users must have …

(©) Copyright ThorTeaches 2018 -


15
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Security Models Fundamental Concepts:


 Security Modes:

 System high security mode – All users must have …

Shon Harris 8th Ed.


(©) Copyright ThorTeaches 2018 - Page 315 & 804
16
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Security Models Fundamental Concepts:

 Security Modes:
 Compartmented security mode - All users must have:
 Multi level security mode - (Controlled Security Mode)- All
users must have:

(©) Copyright ThorTeaches 2018 -


17
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Evaluation Methods, Certification and


Accreditation:
 Choosing the security systems and products we
implement in our organization can be a daunting task.
 There are many evaluation models in use today.
 The earliest one, which most security models are based
on today is "The Orange Book" - The Trusted
Computer System Evaluation Criteria -(TCSEC).

(©) Copyright ThorTeaches 2018 -


18
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Evaluation Methods, Certification and Accreditation:


 ITSEC (The European Information Technology Security Evaluation
Criteria)

 The International Common Criteria (ISO/IEC 15408).


 Target Of Evaluation (TOE)
 Protection Profile (PP)
 Security Target (ST)

(©) Copyright ThorTeaches 2018 -


19
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Evaluation Methods, Certification and


Accreditation:
 The International Common Criteria (ISO/IEC 15408):
 Evaluation Assurance Level (EAL)

Shon Harris 8th Ed.


(©) Copyright ThorTeaches 2018 - Page 322
20
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Evaluation Methods, Certification and


Accreditation:
 EAL Levels l-7:
 EAL1: Functionally Tested.
 EAL2: Structurally Tested.
 EAL3: Methodically Tested and Checked.
 EAL4: Methodically Designed, Tested and Reviewed
 EALS: Semi-formally Designed and Tested.
 EAL6: Semi-formally Verified Design and Tested.
 EAL7: Formally Verified Design and Tested.
Shon Harris 8th Ed.
(©) Copyright ThorTeaches 2018 - Page 322
21
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Secure System Design Concepts:


 Layering: Separates hardware and software
functionality into layers.
 Abstraction: Hiding unnecessary details from the
user.

(©) Copyright ThorTeaches 2018 -


22
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Secure System Design Concepts:


 Security Domains
 Kernel mode (Supervisor mode)
 User mode (Problem mode)

 Open and closed systems:


 Open systems
 Closed Systems

(©) Copyright ThorTeaches 2018 -


23
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Secure System Design


Concepts:
 Security Domains:
 The Ring Model.

Shon Harris 8th Ed.


(©) Copyright ThorTeaches 2018 - Page 312
24
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Secure Hardware
Architecture:
 System unit.
 Motherboard.
 Peripherals.
 Regular computer bus.

(©) Copyright ThorTeaches 2018 -


25
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Secure Hardware Architecture:


 Northbridge and Southbridge
 This design is more common on newer
computers and replaces the regular
computer bus.

(©) Copyright ThorTeaches 2018 -


26
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Secure Hardware Architecture:

 CPU (Central Processing Unit).


 Arithmetic logic unit (ALU)
 Control unit (CU)

(©) Copyright ThorTeaches 2018 -


27
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

 Computer Architecture CPU video:

https://www.cybrary.it/video/part-03-computer-architecture-cpu/

(©) Copyright ThorTeaches 2018 -


28
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Secure Hardware Architecture:


 CPU (Central Processing Unit)
 Fetch .
 Decode.
 Execute
 Store
 Pipelining

(©) Copyright ThorTeaches 2018 -


29
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Secure Hardware Architecture:


 CPU (Central Processing Unit):
 Interrupt.

 Processes and Threads:


 Process.

(©) Copyright ThorTeaches 2018 -


30
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Secure Hardware Architecture:


 CPU (Central Processing Unit)
 Processes and Threads:
 Thread

(©) Copyright ThorTeaches 2018 -


31
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Secure Hardware Architecture:


 CPU (Central Processing Unit):
 Multithreading, Processing, Tasking and Programming.
 Multithreading.
 Multiprocessing.
 Multitasking.
 Multiprogramming.

(©) Copyright ThorTeaches 2018 -


32
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Secure Hardware Architecture:


 CPU (Central Processing Unit):
 Memory protection
 Process isolation
 Hardware segmentation
 Virtual Memory
 Swapping
 Paging

(©) Copyright ThorTeaches 2018 -


33
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:
 In which order does the CPU process work?
A. Fetch, decode, store, execute.

B. Execute, fetch, decode, store.

C. Fetch, decode, execute, store.

D. Fetch, execute, decode, store.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:
 In which part of the computer are all the calculations
done?
A. ALU.

B. ROM.

C. CU.

D. CPU.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:
 When a computer uses more than one processor at a time
for a task, it is called what?
A. Multithreading.

B. Multiprocessing.

C. Multitasking.

D. Multiprogramming.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Secure Hardware
Architecture:
 BIOS- Basic Input Output System
(Low level OS)
 WORM Media (Write Once Read
Many)

(©) Copyright ThorTeaches 2018 -


33
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:
 When we talk about WORM media, what are we referring to?
A. RAM.

B. R DVD’s

C. Hard disks.

D. EEPROM.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Secure Hardware Architecture:

 TPM (Trusted Platform Module).


 Data Execution Prevention (DEP).
 Address Space Layout Randomization (ASLR).

(©) Copyright ThorTeaches 2018 -


34
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Secure OS and Software Architecture:


 The Kernel
 A monolithic kernel
 Microkernels are modular kernels.
 The reference monitor is a core function of
the kernel.

(©) Copyright ThorTeaches 2018 -


35
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:
 What handles all access between objects and subjects in
the computer kernel?
A. Supervisor mode.

B. Reference monitor.

C. Super user mode.

D. User mode.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Secure OS and Software


Architecture:
 Users and File Permissions
 Linux/UNIX

 Windows NTFS (New Technology File


System)

(©) Copyright ThorTeaches 2018 -


36
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Virtualization and Distributed Computing:


 Virtualization poses a whole new set of standards, best
practices and security concerns.
 Virtualization holds a ton of benefits.

Shon Harris 8th Ed.


(©) Copyright ThorTeaches 2018 - Page 305
37
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Virtualization and
Distributed Computing:
 Virtualization:
 Hypervisor

(©) Copyright ThorTeaches 2018 -


38
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Virtualization and Distributed


Computing:
 Virtualization:
 Virtualization also poses new
vulnerabilities
 VM Escape (Virtualization escape)
 Hypervisor Security
 Resource Exhaustion
(©) Copyright ThorTeaches 2018 -
39
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Virtualization and Distributed Computing:


 Cloud Computing - (There is no 'Cloud' it is just another
computer somewhere else).

 Cloud Computing can be divided into 3 main types:


 Private Cloud Computing
 Public Cloud Computing
 Hybrid Cloud Computing
(©) Copyright ThorTeaches 2018 -
40
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Virtualization and Distributed


Computing:
 Cloud Computing Public Cloud
Computing
 Platforms are normally offered as:
 IaaS - (Infrastructure as a Service).
 SaaS - (Software as a Service).
 PaaS - (Platform as a Service).

(©) Copyright ThorTeaches 2018 -


41
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:
 We are using cloud computing and have chosen to use
IaaS. Who is responsible for the databases?
A. The security team.

B. The customer.

C. The network team.

D. The vendor.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Virtualization and Distributed Computing:


 Grid Computing- can make use of resources not currently in
use from 100 or 100,000's of computers to perform very
complex tasks.

 Peer to Peer (P2P) -Any system can be a client and/or a


server.

(©) Copyright ThorTeaches 2018 -


42
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Virtualization and Distributed Computing:


 Thin Clients (Boot sequence- BIOS> POST> TCP/IP > BOOTP
or DHCP).
 Diskless Workstation (Diskless node).
 Thin Client Applications.

(©) Copyright ThorTeaches 2018 -


43
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Virtualization and Distributed Computing:


 The Internet of Things (IoT).
 It is really anything 'Smart": Smart TVs, Thermostats,
Lightbulbs, Cars, anything that connects to the internet
in some way (that didn't before).

Shon Harris 8th Ed.


(©) Copyright ThorTeaches 2018 - Page 337
44
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

System Vulnerabilities, Threats and


Countermeasures.
 Emanations - Often Electromagnetic Emanations.
 Covert Channels
 Covert Timing Channels: Operations that affect the "real
response time observed" by the receiver.
 Covert Storage Channels: Hidden information through the
modification of a stored object.
Shon Harris 8th Ed.
(©) Copyright ThorTeaches 2018 - Page 829
45
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

System Vulnerabilities, Threats and


Countermeasures.
 Covert Channels.
 Steganography.
 Digital Watermarks.

Shon Harris 8th Ed.


(©) Copyright ThorTeaches 2018 - Page 251
46
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

System Vulnerabilities, Threats and Countermeasures.


 Malware (Malicious Code)
 Viruses
 Macro (document) viruses.
 Boot Sector viruses.
 Stealth Viruses.
 Polymorphic Viruses.
 Multipart (Multipartite) Viruses.

Shon Harris 8th Ed.


(©) Copyright ThorTeaches 2018 - Page 871-873
47
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

System Vulnerabilities, Threats and Countermeasures.


 Malware (Malicious Code):
 Worms.
 Trojans.
 Rootkits.
 Logic Bombs.
 Packers.
 Antivirus Software.
 Signature based.
 Heuristic (Behavioral) based.
(©) Copyright ThorTeaches 2018 -
48
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:
 When would a logic bomb go off?
A. As soon as it is introduced to the system.

B. When it has infected the entire network.

C. A certain event happens or at a certain time.

D. When the system gets internet access.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:
 Which type of malware is embedded in another normal
program?
A. Trojans.

B. Worms.

C. Rootkits..

D. Logic bombs.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

System Vulnerabilities, Threats and


Countermeasures.
 Malware (Malicious Code):
 Server (Service) Side Attacks.

 Client Side Attacks.

(©) Copyright ThorTeaches 2018 -


49
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Web Architecture and Attacks.


The internet is a very complex place. Security is often added on
as an afterthought and not designed in as it should be.

 Applets.
 Java applets.
 ActiveX.

(©) Copyright ThorTeaches 2018 -


50
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Web Architecture and Attacks

 OWASP (Open Web Application Security Project).


 A1- A10.

(©) Copyright ThorTeaches 2018 -


51
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Web Architecture and Attacks.

 XML (Extensible Markup Language).


 SOA (Service-Oriented Architecture).

(©) Copyright ThorTeaches 2018 -


52
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Database Security
 Poly instantiation (Alternative Facts).
 Aggregation.
 Inference.
 Data mining.
 Data Analytics.
 Defense in Depth (again).

(©) Copyright ThorTeaches 2018 -


53
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:
 You hear a colleague talk about polyinstantiation. What does that
mean?
A. Looking at a normal baseline and learning of new factors on the
network from higher traffic.
B. Two or more instances of the same data, depending on who
accesses it.
C. Collecting data to analyze it.
D. Deducing facts from data rather than specific statements.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Mobile Security:
 The more external devices we connect, the more complex
policies, procedures and standards we need.

 Mobile devices.
 Good security policies.
 Cell phones.

Shon Harris 8th Ed.


(©) Copyright ThorTeaches 2018 - Page 228
54
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

 Mobile Security:
 Laptops, Smartphones and
Tablets
 BYOD (Bring Your Own Device)
 On/off boarding

Shon Harris 8th Ed.


(©) Copyright ThorTeaches 2018 - Page 228
55
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Industrial Control System


 ICS- (Industrial Control System).
 SCADA (Supervisory Control And Data Acquisition).
 DCS (Distributed Control Systems).
 PLC (Programmable Logic Controllers).

Shon Harris 8th Ed.


(©) Copyright ThorTeaches 2018 - Page 339
56
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Industrial Control System


 ICS
 SCADA
 DNP3 (Distributed Network
Protocol).

(©) Copyright ThorTeaches 2018 -


57
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography - the science of secure


communication.
 For the exam, what you need to know is that cryptography
helps with:
 Confidentiality
 Integrity
 Authentication

 Modular Math.
Shon Harris 8th Ed.
(©) Copyright ThorTeaches 2018 - Page 348
58
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography - the science of secure


communication.
 Definitions:
 Cryptology.
 Cryptography.
 Cryptanalysis.

 Cipher.
(©) Copyright ThorTeaches 2018 -
59
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography - the science of secure


communication.
 Definitions:
 Plaintext (Clear text).
 Ciphertext.
 Encryption.
 Decryption.

 Book Cipher.
 Running-Key Cipher.
(©) Copyright ThorTeaches 2018 -
60
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
 Mono and Polyalphabetic
Ciphers:
 Monoalphabetic Ciphers.
 Polyalphabetic Ciphers

 Frequency Analysis

(©) Copyright ThorTeaches 2018 -


61
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography.
 Exclusive Or (XOR)
 Confusion.
 Diffusion.
 Substitution.
 Permutation (transposition).

(©) Copyright ThorTeaches 2018 -


62
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

 History of Cryptography video:


https://www.cybrary.it/video/part-08-history-of-crypto/

(©) Copyright ThorTeaches 2018 -


63
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
 The history of Cryptography
 Spartan Scytale (Stick).
 Caesar Cipher
(Substitution).

(©) Copyright ThorTeaches 2018 -


64
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
 The history of Cryptography
 The Vigenère cipher.
 The alphabet.

(©) Copyright ThorTeaches 2018 -


65
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography.
 The history of Cryptography.
 Cipher Disk.
 Enigma - Rotary based.
 Purple (US name).

(©) Copyright ThorTeaches 2018 -


66
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
 The history of Cryptography:
 One-Time Pad.
 Vernam Cipher (The first known use
of a one-time pad).
 Project VENONA.

(©) Copyright ThorTeaches 2018 -


67
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography.
 The History of Cryptography:
 The Jefferson Disk (Bazeries Cylinder)-
is a cipher system using a set of wheels
or disks, each with the 26 letters of the
alphabet arranged around the edge.

(©) Copyright ThorTeaches 2018 -


68
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
 The history of Cryptography
 SIGABA.

(©) Copyright ThorTeaches 2018 -


69
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
With the common use of Cryptography/ many governments
realized how important it was that cryptographic algorithms
were added to export restrictions in the same category as
munitions.
 COCOM (Coordinating Committee of Multilateral Export
Controls).
 Wassenaar Arrangement - 1996 -present.
(©) Copyright ThorTeaches 2018 -
70
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

 Symmetric vs Asymmetric Cryptography video:

https://www.cybrary.it/video/part-14-symmetric-vs-asymmetric-cryptography/

(©) Copyright ThorTeaches 2018 -


71
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
 Asymmetric vs Symmetric Encryption and Hybrid:
 Asymmetric:
Pros & Cons
 Symmetric:
Pros & Cons
 Hybrid Encryption.

Shon Harris 8th Ed.


(©) Copyright ThorTeaches 2018 - Page 359
72
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
Symmetric Encryption:
 DES - Data Encryption Standard (Single DES).
 ECB (Electronic Code Book).
 CBC (Cipher Block Chaining).

(©) Copyright ThorTeaches 2018 -


73
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
Symmetric Encryption
 DES (Continued):
 CFB (Cipher Feedback).
 OFB (Output Feedback).
 CTR (Counter).

(©) Copyright ThorTeaches 2018 -


74
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
Symmetric Encryption:
 3 DES (Triple DES).
 IDEA (International Data Encryption Algorithm).

(©) Copyright ThorTeaches 2018 -


75
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:
 When we are using frequency analysis, what are we looking
at?
A. How often messages are sent.

B. How often pairs of letters are used.

C. How many messages are sent.

D. How often certain letters are used.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:
 We are talking about implementing new encryption in our
organization. Which of these would be TRUE about IDEA?
A. It is a 64 bit block cipher, with 56 bit keys.

B. It is a 128 bit block cipher with 128, 192 or 256 bit keys.

C. It is a 64 bit block cipher with a 112 bit key.

D. It is a 64 bit block cipher with a 128 bit key.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
Symmetric Encryption:
 AES - Advanced Encryption Standard
(Rijndael).
 Initial Round:
 Add Round Key.

(©) Copyright ThorTeaches 2018 -


76
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
Symmetric Encryption:
 AES
 Rounds:
 Sub Bytes
 Shift Rows
 Mix Columns
 Final Round (no Mix Columns).

(©) Copyright ThorTeaches 2018 -


77
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
Symmetric Encryption:
 AES.

(©) Copyright ThorTeaches 2018 -


78
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
Symmetric Encryption:
 Blowfish - publish domain.
 Two fish.

Shon Harris 8th Ed.


(©) Copyright ThorTeaches 2018 - Page 360
79
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
Symmetric Encryption:
 Feistelcipher (Feistel network):
 Feistelor modified Feistel
Algorithms.
 Generalized Feistel Algorithms.

(©) Copyright ThorTeaches 2018 -


80
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
Symmetric Encryption
 RC4.
 RCS.
 RCG - AES3 Finalist.

Shon Harris 8th Ed.


(©) Copyright ThorTeaches 2018 - Page 364
81
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
 Asymmetric Encryption (Public Key Encryption)
 Asymmetric Encryption uses 2 keys: a Public Key and a
Private Key (Key Pair).
 Public Key.
 Private Key.

(©) Copyright ThorTeaches 2018 -


82
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:

 We are looking at implementing a new type of symmetric encryption.


Which of these symmetric encryption types are no longer considered
secure, and should be something we should NOT consider?

A. Twofish.

B. 3DES K1.

C. RC4.

D. AES.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:
 We have 100 users all needing to communicate with each
other. If we are using asymmetric encryption how many
keys would we need?
A. 200
B. 100
C. 2000
D. 4950

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
Asymmetric Encryption
 Prime Number Factorization.
 Discrete logarithms.

(©) Copyright ThorTeaches 2018 -


83
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
Asymmetric Encryption.
 RSA cryptography.
 RSA-704.

(©) Copyright ThorTeaches 2018 -


84
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
Asymmetric Encryption:
 Diffie-Hellman (DH).
 Elliptic Curve Cryptography (ECC).

(©) Copyright ThorTeaches 2018 -


85
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
Asymmetric Encryption:
 EIGamal
 DSA (Digital Signature Algorithm).
 Knapsack (Merkle-Hellman knapsack cryptosystem) is one-
way.

(©) Copyright ThorTeaches 2018 -


86
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

 Cryptography
 Hash Functions (One-Way Hash Functions).
 Collisions.
 MDS (Message Digest 5).
 MD6 (Message Digest 6).

(©) Copyright ThorTeaches 2018 -


87
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

 Cryptography
 Hash Functions.
 Hash#1 is the original.
 Hash#2 is with 1comma
removed.

(©) Copyright ThorTeaches 2018 -


88
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

 Cryptography
 Hash Functions:
 SHA1(Secure Hash Algorithm 1).
 SHA2 (Secure Hash Algorithm 2).
 SHA3 (Secure Hash Algorithm 3).
 HAVAL(Hash of Variable Length).

(©) Copyright ThorTeaches 2018 -


89
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
 Hash Functions:
 RIPEMD.
 RIPEMD160.

(©) Copyright ThorTeaches 2018 -


90
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
 Hash Functions:
 Salt (Salting).
 Nonce: (arbitrary number that
may only be used once).

(©) Copyright ThorTeaches 2018 -


91
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:
 Which of these countermeasures would be effective against
rainbow tables?
A. Key stretching.

B. Salting.

C. Limiting long attempts.

D. Keeping hashes in plaintext.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
 Cryptographic Attacks:
 Steal the Key.
 Brute Force.
 Key stretching.
 Digraph attack.

(©) Copyright ThorTeaches 2018 -


92
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
 Cryptographic Attacks:
 Man-in-the-Middle Attack (MITM).
 Session Hijacking (TCP Session
Hijacking).

(©) Copyright ThorTeaches 2018 -


93
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
 Cryptographic Attacks:
 Social Engineering

FREE ICECREAM!
A very successful social engineering
attack was a Pen-Test company
driving up in front of a company
office with "Free Ice Cream”.

(©) Copyright ThorTeaches 2018 -


94
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
 Cryptographic Attacks:
 Rainbow Tables.
 Known Plaintext.
 Chosen Plaintext.
 Adaptive Chosen Plaintext.
 Meet-in-the-Middle.

(©) Copyright ThorTeaches 2018 -


95
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
 Cryptographic Attacks
 Known Key.
 Differential Cryptanalysis.
 Linear Cryptanalysis.
 Differential Linear Cryptanalysis.

(©) Copyright ThorTeaches 2018 -


96
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
 Cryptographic Attacks:
 Side Channel Attacks.
 Implementation Attacks.
 Key Clustering.

(©) Copyright ThorTeaches 2018 -


97
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
 Implementing Cryptography:
 PKI (Public Key Infrastructure).
 Key Escrow.

(©) Copyright ThorTeaches 2018 -


98
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
 Implementing Cryptography:
 Digital Signatures.

(©) Copyright ThorTeaches 2018 -


99
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:

 When we have our private and public keys in key escrow, what does
that mean?

A. The public key available to everyone.

B. The private key I have on my system.

C. The server we keep our public and private keys on.

D. Someone keeping a copy of our keys. often law enforcement.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
 Implementing Cryptography:
 Digital Signatures.
 CA (Certification Authority).
 ORA (Organizational Registration Authorities).

(©) Copyright ThorTeaches 2018 -


100
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

 Cryptography
 Implementing Cryptography:
 Digital Signatures:
 Digital certificates (continued):
 CRL (Certification Revocation List).
 OCSP (Online Certification Status Protocol).
 The Clipper chip.

(©) Copyright ThorTeaches 2018 -


101
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:
 What can we use digital signatures to provide?
A. Confidentiality.

B. Availability.

C. Authentication.

D. Non-repudiation.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:
 A senior VP stops you in the cafeteria because you are one of those IT
people. She asks you questions about Public Key Infrastructure (PKI).
After you explain it at a high level, they ask for more detail. You could
tell them PKI uses which of these?
A. Asymmetric encryption.
B. Hashes.
C. Symmetric encryption.
D. All of these.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:
 The NSA wanted to embed the clipper chip on all
motherboards. Which encryption algorithm did the chip
use?
A. DSA,
B. RSA.
C. Skipjack.
D. 3DES.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:
 Jane is talking to a friend and is explaining what digital
signatures do. Which of these could be something that she tells
her friend is one of the MAIN reasons we use digital signatures?
A. Authentication.

B. Availability.

C. Integrity.

D. Confidentially.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

 Cryptography
 Implementing Cryptography:
 MAC (Message Authentication Code).
 HMAC (Hashed Message Authentication Code).

(©) Copyright ThorTeaches 2018 -


102
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
 Implementing Cryptography:
 SSL and TLS
 SSL(Secure Socket layer)
 TLS (Transport layer
Security).

(©) Copyright ThorTeaches 2018 -


102
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

 IPSEC videos:
 Part 1: https://www.cybrary.it/video/part-19-ipsec-part-i/
 Part 2: https://www.cybrary.it/video/part-20-ipsec-part-ii/

(©) Copyright ThorTeaches 2018 -


104
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
 Implementing Cryptography:
 IPSEC (Internet Protocol Security).
 AH and ESP.
 AH (Authentication Header).
 ESP (Encapsulation Security Payload).

(©) Copyright ThorTeaches 2018 -


105
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
 Implementing Cryptography:
 IPSEC.
 SA (Security Association).
 ISAKMP (Internet Security And Key Management Protocol).
 Tunnel mode.
 Transport mode.

(©) Copyright ThorTeaches 2018 -


106
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
 Implementing Cryptography.
 IPSEC (continued).
 IKE (Internet Key Exchange).

(©) Copyright ThorTeaches 2018 -


107
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Cryptography
 Implementing Cryptography:
 Pretty Good Privacy (PGP):
 MIME (Multipurpose Internet Mail Extensions).
 S/MIME (Secure/MIME).

(©) Copyright ThorTeaches 2018 -


108
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:

 In which of these protocols, is IPSEC built into and NOT added on


later?

A. IPv4.

B. PGP.

C. IPv6.

D. HMAC.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 As part of physical security we also design "Design-in-Depth" into our
plan.
 Preventative Controls - Prevents action from happening
 Detective Controls - Controls that detect an attack
 Deterrent Controls - Controls that deter an attack
 Compensating Controls - if others too costly
 Administrative Controls - administrative framework
Shon Harris 8th Ed.
(©) Copyright ThorTeaches 2018 - Page 434
109
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

 Physical Security
• Perimeter defense:
•Fences (Deterrence, Preventative).
•Gates (Deterrence, Preventative).
•ATSM Standard:
Class I - IV

(©) Copyright ThorTeaches 2018 -


110
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 Perimeter defense:
 Bollards (Preventative).
 Lights (Detective and Deterrence).

(©) Copyright ThorTeaches 2018 -


111
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:
 What could be a type of physical access control that we
would use, to prevent cars and vans from entering our
perimeter?
A. Motion sensors.
B. Cameras.
C. Bollards.
D. Lights.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 Perimeter defense:
 CCTV (Closed Circuit Television).
 Older cameras.
 Modern cameras.

(©) Copyright ThorTeaches 2018 -


112
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:

 We are implementing passive monitoring in our data center. We have


chosen to use infrared motion detectors. What do they use to detect
movement?

A. Heat.

B. Sound.

C. Light.

D. Pulses.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 Perimeter defense:
 Locks (Preventative).
 Key locks.
 Key Bitting Code (How far the key is
bitten down for that section).
 Pin Tumbler lock (or Yale lock).

(©) Copyright ThorTeaches 2018 -


113
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 Perimeter defense:
 Locks (Preventative).
 Key locks (continued).
 Lock Picking.
 Lock Bumping.

(©) Copyright ThorTeaches 2018 -


114
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 Perimeter defense:
 Locks (Preventative):
 Key locks (continued).
 Master Keys.
 Core Key.

(©) Copyright ThorTeaches 2018 -


115
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 Perimeter defense:
 Locks (Preventative):
 Combination locks.

(©) Copyright ThorTeaches 2018 -


116
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 Perimeter Defense:
 Smart Cards (contact or contactless):
 Contact Cards.
 Contactless Cards.
 Magnetic Stripe Cards.

(©) Copyright ThorTeaches 2018 -


117
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 Perimeter Defense (continued):
 Tailgating/Piggybacking.
 Mantrap.

Shon Harris 8th Ed.


(©) Copyright ThorTeaches 2018 - Page 442
118
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 Perimeter Defense (continued):
 Turnstiles (Preventative, Deterrence).

(©) Copyright ThorTeaches 2018 -


119
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 Perimeter Defense (continued):
 Contraband Checks (Preventative/ Detective/ Deterrent).

(©) Copyright ThorTeaches 2018 -


120
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 Perimeter Defense (continued):
 Motion Detectors (Detective, Deterrence).
 Ultrasound, Microwave, Infrared or Laser.

(©) Copyright ThorTeaches 2018 -


121
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:
 Which type of ASTM standard gate could you have at your
house?
A. Class I.

B. Class IV.

C. Class III.

D. Class IX.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:
 When we are installing motion sensors, we are
implementing which type of control?
A. Administrative and detective.

B. Detective and deterrence.

C. Preventative and detective.

D. Deterrence and preventative.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 Perimeter Defense (continued):
 Perimeter Alarms.
 Door/window sensors.

(©) Copyright ThorTeaches 2018 -


122
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 Perimeter Defense (continued):
 Walls, Floors, and Ceilings.

(©) Copyright ThorTeaches 2018 -


123
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 Perimeter Defense (continued):
 Guards
 Professional Guards.
 Amateur Guards.
 Pseudo Guard.

(©) Copyright ThorTeaches 2018 -


124
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 Perimeter Defense (continued):
 Dogs (Deterrent, Detective,
Compensating).

(©) Copyright ThorTeaches 2018 -


125
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 Perimeter Defense (continued):
 Restricted Work Areas and Escorts.

(©) Copyright ThorTeaches 2018 -


126
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

 Physical Security
 Site Selection, Design and
Configuration:
 Site Selection:
 Greenfield.
 Typography.
 Utilities.
 Crime.
(©) Copyright ThorTeaches 2018 -
127
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 Site Selection, Design and
Configuration:
 Site Design:
 Site Marking.

(©) Copyright ThorTeaches 2018 -


128
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 Site Selection, Design and Configuration:
 Shared Tenancy and Neighbors.

(©) Copyright ThorTeaches 2018 -


129
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 Site Selection, Design and Configuration:
 Wiring Closets.
 Demarc- Point of Demarcation (POD).

Shon Harris 8th Ed.


(©) Copyright ThorTeaches 2018 - Page 446
130
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 Site Selection, Design and Configuration:
 Server Rooms and Data Centers.
 Data Center Build or Expansion.

(©) Copyright ThorTeaches 2018 -


131
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 Site Selection, Design and Configuration:
 Server Rooms and Data Centers.
 Data Center Build or Expansion
(continued):
 Power.
 Fire Suppression.

(©) Copyright ThorTeaches 2018 -


132
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 Media Storage and Locations.

(©) Copyright ThorTeaches 2018 -


133
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Physical Security
 Asset Tracking.
 Hardware Hardening.
 Disabling the USB Ports.

(©) Copyright ThorTeaches 2018 -


134
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Question:

 When, in telecommunications, we talk about the Demarc, what are we


referring to?

A. You ensure all of the other tenants have full access to your
network equipment.

B. The servers are places to ensure faster speeds.

C. You place all your routers and switches.

D. The ISP terminates their line and your network begins.

(©) Copyright ThorTeaches 2018 -


CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Environmental Controls
 Electricity
 Power Fluctuation Terms:
 Blackout
 Fault
 Brownout
 Sag
 Surge
 Spike

(©) Copyright ThorTeaches 2018 -


135
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Environmental Controls
 Electricity:
 Surge Protectors UPSs .
 Surge Protectors.
 UPSs.
 Generator.
 PDU.
(©) Copyright ThorTeaches 2018 -
136
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Environmental Controls
 Electricity:
 EMI (Electromagnetic Interference).

Shon Harris 8th Ed.


(©) Copyright ThorTeaches 2018 - Page 451
137
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Environmental Controls
 HCAC
 Heat.
 Pressure.
 Humidity.

Shon Harris 8th Ed.


(©) Copyright ThorTeaches 2018 - Page 452
138
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Environmental Controls
 HCAC (continued):
 Drains.

(©) Copyright ThorTeaches 2018 -


139
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Environmental Controls
 Static Electricity.

Antistatic Shoes.
Not the prettiest
thing I ever saw,
but effective!
(©) Copyright ThorTeaches 2018 -
140
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Environmental Controls
 Heat, Flame, and Particle/Smoke Detectors.
 Heat Detectors.
 Smoke Detectors: (Ionization or Photoelectric).
 Flame Detectors.

(©) Copyright ThorTeaches 2018 -


141
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Personnel Safety, Training and Awareness


 Personnel safety is always most important.

(©) Copyright ThorTeaches 2018 -


142
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

Personnel Safety, Training and


Awareness
 Personnel Safety:
 Early Warning Systems (Duress Warning
Systems).

(©) Copyright ThorTeaches 2018 -


143
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

ABCD Fires and Suppression


 Fire suppression.
 Removing Oxygen.
 Removing Heat.
 Removing Fuel.

Shon Harris 8th Ed.


(©) Copyright ThorTeaches 2018 - Page 456
144
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

ABCD Fires and


Suppression
 Fire Classes.

Shon Harris 8th Ed.


(©) Copyright ThorTeaches 2018 - Page 456
145
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

ABCD Fires and Suppression


 Automatic Fire Suppression
Systems:
 Water.
 Sprinkler Systems.

(©) Copyright ThorTeaches 2018 -


146
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

ABCD Fires and Suppression


 Automatic Fire Suppression Systems:
 Water:
 Sprinkler Systems (continued):
 Wet Pipe.
 Dry Pipe
 Deluge.
 Pre-Action.
(©) Copyright ThorTeaches 2018 -
147
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

ABCD Fires and Suppression


 Automatic Fire Suppression Systems:
 Gases
 C02.
 Halon 130.

(©) Copyright ThorTeaches 2018 -


148
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

 ABCD Fires and


Suppression.
 Automatic Fire Suppression
Systems:
 Gases (continued).
 Argon.
 FE-13 (Fluoroform).
 FM-200 (HFC-227ea).
 lnergen. Shon Harris 8th Ed.
(©) Copyright ThorTeaches 2018 - Page 456
149
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

ABCD Fires and Suppression


 Fire Suppression:
 Fire Extinguishers:
 Use the PASS method to extinguish a
fire with a portable fire extinguisher:
 Pull.
 Aim.
 Squeeze.
 Sweep.
(©) Copyright ThorTeaches 2018 -
150
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

ABCD Fires and Suppression


 Fire Suppression:
 Fire Extinguishers (continued):
 Soda-Acid Extinguishers.
 Dry Powder Extinguishers.
 Wet Chemical(potassium acetate, potassium carbonate,
potassium citrate).

(©) Copyright ThorTeaches 2018 -


151
CISSP® - Certified Information Systems Security Professional
DOMAIN 3: Software Development Security.

What we covered in the third CBK Domain.


 In this chapter we talked about how we protect our assets.
 How the domain has 3 major knowledge areas (prior to the 2015 exam
update, each had their own domain).
 Security Architecture and Design.
 Cryptography.
 Physical Security

(©) Copyright ThorTeaches 2018 -


152

You might also like