Professional Documents
Culture Documents
Robin Abernathy
Darren Hayes
CISSP Cert Guide, Fourth Edition
Copyright © 2023 by Pearson Education, Inc.
All rights reserved. No part of this book shall be reproduced, stored
in a retrieval system, or transmitted by any means, electronic,
mechanical, photocopying, recording, or otherwise, without written
permission from the publisher. No patent liability is assumed with
respect to the use of the information contained herein. Although
every precaution has been taken in the preparation of this book, the
publisher and author assume no responsibility for errors or
omissions. Nor is any liability assumed for damages resulting from
the use of the information contained herein.
ISBN-13: 978-0-13-750747-4
ISBN-10: 0-13-750747-X
Library of Congress Cataloging-in-Publication Data:
ScoutAutomatedPrintCode
Trademarks
All terms mentioned in this book that are known to be trademarks or
service marks have been appropriately capitalized. Pearson IT
Certification cannot attest to the accuracy of this information. Use of
a term in this book should not be regarded as affecting the validity
of any trademark or service mark.
Editor-in-Chief
Mark Taub
Brett Bartow
Executive Editor
James Manly
Development Editor
Ellie C. Bru
Managing Editor
Sandra Schroeder
Tonya Simpson
Copy Editor
Chuck Hutchinson
Indexer
Proofreader
Technical Editors
R. Sarma Danturthi
Ben Mayo
Publishing Coordinator
Cindy Teeters
Cover Designer
Chuti Prasertsith
Compositor
Pearson’s Commitment to Diversity,
Equity, and Inclusion
Introduction
Chapter 1. Security and Risk Management
Chapter 2. Asset Security
Chapter 3. Security Architecture and Engineering
Chapter 4. Communication and Network Security
Chapter 5. Identity and Access Management (IAM)
Chapter 6. Security Assessment and Testing
Chapter 7. Security Operations
Chapter 8. Software Development Security
Chapter 9. Final Preparation
Appendix A. Memory Tables
Appendix B. Memory Tables Answer Key
Glossary
Table of Contents
Introduction
The Goals of the CISSP Certification
The Value of the CISSP Certification
The Common Body of Knowledge
Steps to Becoming a CISSP
Facts About the CISSP Exam
About the CISSP Cert Guide, Fourth Edition
Companion Website
Pearson Test Prep Practice Test Software
Chapter 1. Security and Risk Management
Foundation Topics
Security Terms
Security Governance Principles
Compliance
Legal and Regulatory Issues
Investigation Types
Professional Ethics
Security Documentation
Business Continuity
Personnel Security Policies and Procedures
Risk Management Concepts
Geographical Threats
Threat Modeling
Security Risks in the Supply Chain
Security Education, Training, and Awareness
Exam Preparation Tasks
Review All Key Topics
Complete the Tables and Lists from Memory
Define Key Terms
Answer Review Questions
Answers and Explanations
Chapter 2. Asset Security
Foundation Topics
Asset Security Concepts
Identify and Classify Information and Assets
Information and Asset Handling Requirements
Provision Resources Securely
Data Lifecycle
Asset Retention
Data Security Controls
Exam Preparation Tasks
Review All Key Topics
Define Key Terms
Answer Review Questions
Answers and Explanations
Chapter 3. Security Architecture and Engineering
Foundation Topics
Engineering Processes Using Secure Design Principles
Security Model Concepts
System Security Evaluation Models
Certification and Accreditation
Control Selection Based on Systems Security
Requirements
Security Capabilities of Information Systems
Security Architecture Maintenance
Vulnerabilities of Security Architectures, Designs, and
Solution Elements
Vulnerabilities in Web-Based Systems
Vulnerabilities in Mobile Systems
Vulnerabilities in Embedded Systems
Cryptographic Solutions
Cryptographic Types
Symmetric Algorithms
Asymmetric Algorithms
Public Key Infrastructure and Digital Certificates
Key Management Practices
Message Integrity
Digital Signatures and Non-repudiation
Applied Cryptography
Cryptanalytic Attacks
Digital Rights Management
Site and Facility Design
Site and Facility Security Controls
Exam Preparation Tasks
Complete the Tables and Lists from Memory
Answer Review Questions
Answers and Explanations
Chapter 4. Communication and Network Security
Foundation Topics
Secure Network Design Principles
IP Networking
Protocols and Services
Converged Protocols
Wireless Networks
Communications Cryptography
Secure Network Components
Secure Communication Channels
Network Attacks
Exam Preparation Tasks
Review All Key Topics
Define Key Terms
Answer Review Questions
Answers and Explanations
Chapter 5. Identity and Access Management (IAM)
Foundation Topics
Access Control Process
Physical and Logical Access to Assets
Identification and Authentication Concepts
Identification and Authentication Implementation
Identity as a Service (IDaaS) Implementation
Third-Party Identity Services Integration
Authorization Mechanisms
Provisioning Lifecycle
Access Control Threats
Prevent or Mitigate Access Control Threats
Exam Preparation Tasks
Review All Key Topics
Define Key Terms
Answer Review Questions
Answers and Explanations
Chapter 6. Security Assessment and Testing
Foundation Topics
Design and Validate Assessment and Testing Strategies
Conduct Security Control Testing
Collect Security Process Data
Analyze Test Outputs and Generate a Report
Conduct or Facilitate Security Audits
Exam Preparation Tasks
Review All Key Topics
Define Key Terms
Answer Review Questions
Answers and Explanations
Chapter 7. Security Operations
Foundation Topics
Investigations
Logging and Monitoring Activities
Configuration and Change Management
Security Operations Concepts
Resource Protection
Incident Management
Detective and Preventive Measures
Patch and Vulnerability Management
Recovery Strategies
Disaster Recovery
Testing Disaster Recovery Plans
Business Continuity Planning and Exercises
Physical Security
Personnel Safety and Security
Exam Preparation Tasks
Review All Key Topics
Define Key Terms
Answer Review Questions
Answers and Explanations
Chapter 8. Software Development Security
Foundation Topics
Software Development Concepts
Security in the System and Software Development Life
Cycle
Security Controls in Development
Assess Software Security Effectiveness
Security Impact of Acquired Software
Secure Coding Guidelines and Standards
Exam Preparation Tasks
Review All Key Topics
Define Key Terms
Answer Review Questions
Answers and Explanations
Chapter 9. Final Preparation
Tools for Final Preparation
Suggested Plan for Final Review/Study
Summary
Appendix A. Memory Tables
Appendix B. Memory Tables Answer Key
Glossary
About the Authors
—Robin
To all our cyber warriors who protect our businesses and our
national security. Your careers are so demanding and your goal to
gain certifications is to be commended.
—Darren
Acknowledgments
My first thanks goes to God for blessing me with the ability to learn
and grow in any field I choose. With Him, all things are possible!
For me, it is hard to believe that I am on the fourth edition of this
book. I appreciate my family and my friends, who have supported
me in my publishing journey through three titles and multiple
editions.
It is my hope that you, the reader, succeed in your IT certification
goals!
—Robin
To my beautiful wife, Nalini, and my children, Aine, Fiona, Nicolai,
and Shay, I cannot thank you enough for your support and love over
the years. Also, to my parents, Ted and Annette, who inspired me to
be an eternal learner and try to help others to gain knowledge. I
would like to acknowledge my fellow teachers who make
immeasurable sacrifices to see their students succeed. My sincere
thanks to all of the tremendous reviewers, editors, and other staff at
Pearson who I have had the honor of working with for many years.
—Darren
About the Technical Reviewers
Dr. Danturthi published 70 Tips and Tricks for Mastering the CISSP
Exam (Apress) in 2020. He can be contacted at
danturthi@gmail.com.
Ben Mayo, CCIE No. 24861, CISSP, is the head of security and
lead engineer for Montana’s largest independent network and data
center provider. He has more than 19 years of experience in the
network and security fields. Ben’s experience spans multiple
industries, including electrical power generation, education, and
telecommunications. Ben takes a "purple team" approach to security,
applying both offensive and defensive security practices to enhance
his organization’s security posture. Though security is his passion, he
most enjoys spending time with his three awesome kids and his
amazing wife. You can follow Ben on Twitter at @ping_18024.
We Want to Hear from You!
As the reader of this book, you are our most important critic and
commentator. We value your opinion and want to know what we’re
doing right, what we could do better, what areas you’d like to see us
publish in, and any other words of wisdom you’re willing to pass our
way.
Please note that we cannot help you with technical problems related
to the topic of this book.
When you write, please be sure to include this book’s title and
author as well as your name and email address. We will carefully
review your comments and share them with the author and editors
who worked on the book.
Email: community@informit.com
Reader Services
(ISC)2 derives some of its prestige from the fact that it was the first
security certification body to meet the requirements set forth by
ANSI/ISO/IEC Standard 17024, a global benchmark for personnel
certification. This ensures that certifications offered by this
organization are both highly respected and sought after.
Stated Goals
The goal of (ISC)2, operating through its administration of the CISSP
and other certifications, is to provide a reliable instrument to
measure an individual’s knowledge of security. This knowledge is not
limited to technology issues alone but extends to all aspects of
security that face an organization.
In that regard, the topics are technically more shallow than those
tested by some other security certifications, while also covering a
much wider range of issues than those other certifications. Later, we
cover the topics that comprise the eight domains of knowledge in
detail, but it is a wide range of topics. This vast breadth of
knowledge and the experience needed to pass the exam are what
set the CISSP certification apart.
• To increase salary
In short, this certification demonstrates that the holder not only has
the knowledge and skills tested in the exam but also has the
wherewithal to plan and implement a study plan that addresses an
unusually broad range of security topics.
To the Enterprise
For an organization, the CISSP certification offers a reliable
benchmark to which job candidates can be measured by validating
knowledge and experience. Candidates who successfully pass the
rigorous exam are required to submit documentation verifying
experience in the security field. Individuals holding this certification
will stand out from the rest, not only making the hiring process
easier but also adding a level of confidence in the final hire.
• Compliance requirements
• Legal and regulatory issues
• Investigation types
Asset Security
The Asset Security domain, covered in Chapter 2, focuses on the
collection, handling, and protection of information throughout its life
cycle and is 10 percent of the exam. Topics include
• Resource provisioning
• Data lifecycle
• Asset retention
• Data security controls and compliance requirements
• Cryptography
• Cryptanalytic attacks
• Security principles of site and facility design
• Authorization mechanisms
• Authentication systems
Security Operations
The Security Operations domain, covered in Chapter 7, surveys the
execution of security measures and maintenance of proper security
posture and is 13 percent of the exam. Topics include
• Investigations compliance
• Logging and monitoring activities
• Configuration management
• Incident management
• Recovery strategies
When you are notified that you have successfully passed the
examination, you will be required to subscribe to the (ISC)2 Code of
Ethics and have your application endorsed before the credential can
be awarded. An endorsement form for this purpose must be
completed and signed by an (ISC)2 certified professional who is an
active member and who is able to attest to your professional
experience.
Book Features
To help you customize your study time using this book, the core
chapters have several features that help you make the best use of
your time:
If you are unable to locate the files for this title by following these
steps, please visit www.pearsonITcertification.com/contact and
select the Site Problems/Comments option. Our customer service
representatives will assist you.
There are several other customizations you can make to your exam
from the exam settings screen, such as the time of the exam, the
number of questions served up, whether to randomize questions and
answers, whether to show the number of correct answers for
multiple-answer questions, and whether to serve up only specific
types of questions. You can also create custom test banks by
selecting only questions that you have marked or questions on which
you have added notes.
Fig. 148.—Aplustrum
aplustre L. Mauritius,
showing the partly
internal shell (S); F,
foot; LL, cephalic
lappets; TT, double
set of tentacles. (After
Quoy and Gaimard.)
Fig. 149.—Sigaretus
laevigatus Lam.,
showing shell partially
immersed in the foot;
F, anterior
prolongation of the
foot. (After Souleyet.)
(3) Internal; e.g. Philine, Gastropteron, Pleurobranchus, Aplysia,
Limax, Arion, Hyalimax, Parmacella, Lamellaria, Cryptochiton, and,
among bivalves, Chlamydoconcha.
(4) Absent; e.g. all Nudibranchiata and Aplacophora, many
Cephalopoda, a few land Mollusca, e.g. all Onchidiidae, Philomycus,
and Vaginula.
The Univalve Shell.—In univalve Mollusca the normal form of the
shell is an elongated cone twisted into a spiral form round an axis,
the spiral ascending to the left. Probably the original form of the shell
was a simple cone, which covered the vital parts like a tent. As these
parts tended to increase in size, their position on the dorsal side of
the animal caused them gradually to fall over, drawing the shell with
them. The result of these two forces combined, the increasing size of
the visceral hump, and its tendency to pull the shell over with it,
probably resulted in the conversion of the conical into the spiral shell,
which gradually came to envelop the whole animal. Where the
visceral hump, instead of increasing in size, became flattened, the
conical shape of the shell may have been modified into a simple
elliptical plate (e.g. Limax), the nucleus representing the apex of the
cone. In extreme cases even this plate dwindles to a few calcareous
granules, or disappears altogether (Arion, Vaginula).
Varieties of the Spiral.—Almost every conceivable modification
of the spiral occurs, from the type represented by Gena, Haliotis,
Sigaretus, and Lamellaria, in which the spire is practically confined to
the few apical whorls, with the body-whorl inordinately large in
proportion, to a multispiral form like Terebra, with about twenty
whorls, very gradually increasing in size.
Fig. 151.—Examples of
shells with
disconnected whorls;
A, Cyathopoma cornu
Mf., Philippines; B,
Cylindrella hystrix
Wright, Cuba. (Both ×
4.)
Fig. 152.—Example of a
shell whose apical
whorls alone are
coiled, and the
remainder produced in
a regular curve.
(Cyclosurus Mariei
Morel., Mayotte.)
In some cases the regularly spiral form is kept, but the whorls are
completely disconnected; e.g. some Scalaria, Spirula; among fossil
Cephalopoda, Gyroceras, Crioceras, and Ancyloceras; and, among
recent land Mollusca, Cylindrella hystrix and Cyathopoma cornu (Fig.
151). Sometimes only the last whorl becomes disconnected from the
others, as in Rhiostoma (see Fig. 180, p. 266), Teinostoma, and in
the fossil Ophidioceras and Macroscaphites. Sometimes, again, not
more than one or two whorls at the apex are spirally coiled, and the
rest of the shell is simply produced or coiled in an exceedingly
irregular manner, e.g. Cyclosurus, Lituites, Orygoceras, Siliquaria
(Fig. 153), Vermetus. In Coecum (Fig. 170, p. 260) the spiral part is
entirely lost, and the shell becomes simply a cylinder. In a few cases
the last whorl is coiled irregularly backwards, and is brought up to
the apex, so that the animal in crawling must carry the shell with the
spire downwards, as in Anostoma (Fig. 154), Opisthostoma (Fig.
208, p. 309), Strophostoma, and Hypselostoma (Fig. 202 A, p. 302).
Fig. 153.—Siliquaria anguina Lam.,
showing scalariform coil of upper
whorls and irregular extension of
the lower.
Fig. 156.—Fulgur
perversum L., Florida. ½.
Fig. 161.—Cornucopia-
shaped monstrosity of
Helix aspersa, from
Ilfracombe. (British
Museum.)
Composition of the Shell.—The shell is mainly composed of
pure carbonate of lime, with a very slight proportion of phosphate of
lime, and an organic base allied to chitin, known as conchiolin. The
proportion of carbonate of lime is known to vary from about 99 p.c. in
Strombus to about 89 p.c. in Turritella. Nearly 1 p.c. of phosphate of
lime has been obtained from the shell of Helix nemoralis, and nearly
2 p.c. from that of Ostrea virginica. The conchiolin forms a sort of
membranous framework for the shell; it soon disappears in dead
specimens, leaving the shell much more brittle than it was when
alive. Carbonate of magnesia has also been detected, to the extent
of ·12 p.c. in Telescopium and ·48 p.c. in Neptunea antiqua. A trace
of silica has also occasionally been found.
When the shell exhibits a crystalline formation, the carbonate of
lime may take the form either of calcite or aragonite. The calcite
crystals are rhombohedral, optically uniaxal, and cleave easily, while
the aragonite cleave badly, belong to the rhombic system, and are
harder and denser, and optically biaxal. Both classes of crystal may
occur in the same shell.
Two main views have been held with regard to the formation and
structure of the shell—(1) that of Bowerbank and Carpenter, that the
shell is an organic formation, growing by interstitial deposit, in the
same manner as the teeth and bones of the higher animals; (2) that
of Réaumur, Eisig, and most modern writers, that the shell is of the
nature of an excretion, deposited like a cuticle on the outside of the
skin, being formed simply of a number of calcareous particles held
together by a kind of ‘animal glue.’ Leydig’s view is that the shell of
the Monotocardia is a secretion of the epithelium, but that in the
Pulmonata it originates within the skin itself, and afterwards
becomes free.[335]
According to Carpenter, when a fragment of any recent shell is
decalcified by being placed in dilute acid, a definite animal basis
remains, often so fine as to be no more than a membranous film, but
sometimes consisting of an aggregation of ‘cells’ with perfectly
definite forms. He accordingly divides all shell structure into cellular
and membranous, according to the characteristics of the animal
basis. Cellular structure is comparatively rare; it occurs most notably
in Pinna, where the shell is composed of a vast multitude of tolerably
regular hexagonal prisms (Fig. 162 B). Membranous structure
comprises all forms of shell which do not present a cellular tissue.
Carpenter held that the membrane itself was at one time a
constituent part of the mantle of the mollusc, the carbonate of lime
being secreted in minute ‘cells’ on its surface, and afterwards
spreading over the subjacent membrane through the bursting of the
cells.
The iridescence of nacreous shells is due to a peculiar lineation of
their surface, which can be readily detected by a lens. According to
Brewster, the iridescence is due to the alternation of layers of
granular carbonate of lime and of a very thin organic membrane, the
layers very slightly undulating. Carpenter, on the other hand, holds
that it depends upon the disposition of a single membranous layer in
folds or plaits, which lie more or less obliquely to the general surface,
so that their edges show as lines. The nacreous type of shell occurs
largely among those Mollusca which, from other details in their
organisation, are known to represent very ancient forms (e.g.
Nucula, Avicula, Trigonia, Nautilus). It is also the least permanent,
and thus in some strata we find that only casts of the nacreous shells
remain, while those of different constitution are preserved entire.
Porcellanous shells (of which the great majority of Gasteropoda
are instances) usually consist of three layers, each of which is
composed of a number of adjacent plates, like cards on edge. The
inclination of the plates in the different layers varies, but that of the
plates in the inner and outer layer is frequently the same, thus if the
plates are transverse in the middle stratum, they are longitudinal in
the inner and outer strata, and, if longitudinal in the middle, they are
transverse in the other two. Not uncommonly (Fig. 163 B) other
layers occur. In bivalves the disposition and nature of the layers is
much more varied.
Fig. 162.—A, Section of shell of Unio: a, periostracal layer; b, prismatic layer; c,
nacreous layer. B, Horizontal section of shell of Pinna, showing the hexagonal
prisms.
Fig. 165.—Neritina
longispina Récl., Mauritius.
(Operculum removed.)
The various details of sculpture on the exterior surface of the
shell, the striae, ribs, nodules, imbrications, spines, and other forms
of ornamentation are all the product of similar and corresponding
irregularities in the mantle margin, and have all been originally
situated at the edge of the lip. Spines, e.g. those of Murex and
Pteroceras, are first formed as a hollow thorn, cleft down its lower
side, and are afterwards filled in with solid matter as the mantle edge
withdraws. What purpose is served by the extreme elaboration of
these spiny processes in some cases, can hardly be considered as
satisfactorily ascertained. Possibly they are a form of sculptural
development which is, in the main, protective, and secures to its
owners immunity from the attacks of predatory fishes.
‘Attached’ genera (e.g. Chama, Spondylus) when living on smooth
surfaces have a flat shell, but when affixed to coral and other uneven
surfaces they become very irregular in shape. The sculpture of the
base on which they rest is often reproduced in these ‘attached’
shells, not only on the lower, but also on the upper valve, the
growing edge of which rests on the uneven surface of the base.
Oysters attached to the branches of the mangrove frequently display
a central convex rib, modelled on the shape of the branch, from
which the plaits of sculpture radiate, while specimens fixed to the
smooth trunk have no such rib. Crepidula, a genus which is in the
habit of attaching itself to other shells, varies in sculpture according
to that of its host. Sometimes the fact may be detected that a
specimen has lived on a ribbed shell when young, and on a smooth
one when old, or vice versâ. A new genus was actually founded by
Brown for a Capulus which had acquired ribs through adhesion to a
Pecten. A specimen of Hinnites giganteus in the British Museum
must at one period of its growth have adhered to a surface on which
was a Serpula, the impression of which is plainly reproduced on the
upper valve of the Hinnites.[339]
Fig. 166.—A specimen of Anomia
ephippium L., Weymouth,
taken upon Pecten maximus,
the sculpture of which is
reproduced on the upper
valve of the Anomia, and
even on a young Anomia
attached to the larger
specimen.
Growth of the Shell.—Nothing very definite is known with regard
to the rate of growth of the shell in marine Mollusca. Under
favourable conditions, however, certain species are known to
increase very rapidly, especially if the food supply be abundant, and
if there is no inconvenient crowding of individuals. Petit de la
Saussaye mentions[340] the case of a ship which sailed from
Marseilles for the west coast of Africa, after being fitted with an
entirely new bottom. On arriving at its destination, the vessel spent
68 days in the Gambia River, and took 86 days on its homeward
voyage. On being cleaned immediately on its return to Marseilles, an
Avicula 78 mm. and an Ostrea 95 mm. long (both being species
peculiar to W. Africa) were taken from its keel. These specimens had
therefore attained this growth in at most 154 days, for at the period
of their first attachment they are known to be exceedingly minute. P.
Fischer relates[341] that in 1862 a buoy, newly cleaned and painted,
was placed in the basin at Arcachon. In less than a year after, it was
found to be covered with thousands of very large Mytilus edulis, 100