CISSPCert Guide 4 e
CISSPCert Guide 4 e
Fourth Edition
Robin Abernathy
Darren Hayes
CISSP Cert Guide Editor-in-Chief
Copyright © 2023 by Pearson Education, Inc. Mark Taub
All rights reserved. No part of this book shall be reproduced, stored in Product Line Manager
a retrieval system, or transmitted by any means, electronic, mechanical, Brett Bartow
photocopying, recording, or otherwise, without written permission from
the publisher. No patent liability is assumed with respect to the use of the Executive Editor
information contained herein. Although every precaution has been taken in James Manly
the preparation of this book, the publisher and authors assume no
Development Editor
responsibility for errors or omissions. Nor is any liability assumed for
Ellie C. Bru
damages resulting from the use of the information contained herein.
ISBN-13: 978-0-13-750747-4 Managing Editor
ISBN-10: 0-13-750747-X Sandra Schroeder
Pearson is dedicated to creating bias-free content that reflects the diversity of all
learners. We embrace the many dimensions of diversity, including but not limited
to race, ethnicity, gender, socioeconomic status, ability, age, sexual orientation, and
religious or political beliefs.
Education is a powerful force for equity and change in our world. It has the poten-
tial to deliver opportunities that improve lives and enable economic mobility. As we
work with authors to create content for every product and service, we acknowledge
our responsibility to demonstrate inclusivity and incorporate diverse scholarship so
that everyone can achieve their potential through learning. As the world’s leading
learning company, we have a duty to help drive change and live up to our purpose to
help more people create a better life for themselves and to create a better world.
Our ambition is to purposefully contribute to a world where
■ Everyone has an equitable and lifelong opportunity to succeed through
learning
■ Our educational products and services are inclusive and represent the rich
diversity of learners
■ Our educational content accurately reflects the histories and experiences of the
learners we serve
■ Our educational content prompts deeper discussions with learners and
motivates them to expand their own learning (and worldview)
While we work hard to present unbiased content, we want to hear from you about
any concerns or needs with this Pearson product so that we can investigate and
address them.
Please contact us with concerns about any potential bias at
https://www.pearson.com/report-bias.html.
iv
Contents at a Glance
Introduction xlvii
CHAPTER 1 Security and Risk Management 5
CHAPTER 2 Asset Security 165
CHAPTER 3 Security Architecture and Engineering 213
CHAPTER 4 Communication and Network Security 377
CHAPTER 5 Identity and Access Management (IAM) 535
CHAPTER 6 Security Assessment and Testing 601
CHAPTER 7 Security Operations 637
CHAPTER 8 Software Development Security 733
CHAPTER 9 Final Preparation 791
Index 797
Online Elements
APPENDIX A Memory Tables
APPENDIX B Memory Tables Answer Key
Glossary
Table of Contents
Introduction xlvii
Security Analyst 19
Application Owner 19
Supervisor 20
User 20
Auditor 20
Security Control Frameworks 20
ISO/IEC 27000 Series 21
Zachman Framework 25
The Open Group Architecture Framework (TOGAF) 25
Department of Defense Architecture Framework (DoDAF) 25
British Ministry of Defence Architecture Framework (MODAF) 25
Sherwood Applied Business Security Architecture (SABSA) 25
Control Objectives for Information and Related Technology (COBIT) 27
National Institute of Standards and Technology (NIST) Special Publication
(SP) 800 Series 27
HITRUST CSF 30
CIS Critical Security Controls 31
Committee of Sponsoring Organizations (COSO) of the Treadway Commission
Framework 32
Operationally Critical Threat, Asset, and Vulnerability Evaluation
(OCTAVE) 32
Information Technology Infrastructure Library (ITIL) 33
Six Sigma 34
Capability Maturity Model Integration (CMMI) 35
CCTA Risk Analysis and Management Method (CRAMM) 36
Top-Down Versus Bottom-Up Approach 36
Security Program Life Cycle 37
Due Care and Due Diligence 38
Compliance 38
Contractual, Legal, Industry Standards, and
Regulatory Compliance 40
Privacy Requirements Compliance 40
Legal and Regulatory Issues 41
Computer Crime Concepts 41
Computer-Assisted Crime 41
Contents vii
Computer-Targeted Crime 41
Incidental Computer Crime 42
Computer Prevalence Crime 42
Hackers Versus Crackers 42
Computer Crime Examples 42
Major Legal Systems 43
Civil Law 44
Common Law 44
Criminal Law 44
Civil/Tort Law 45
Administrative/Regulatory Law 45
Customary Law 45
Religious Law 45
Mixed Law 45
Licensing and Intellectual Property 46
Patent 46
Trade Secret 47
Trademark 47
Copyright 48
Software Piracy and Licensing Issues 49
Internal Protection 49
Digital Rights Managements (DRM) 50
Cyber Crimes and Data Breaches 50
Import/Export Controls 51
Trans-Border Data Flow 51
Privacy 52
Personally Identifiable Information (PII) 52
Laws and Regulations 53
Investigation Types 62
Operations/Administrative 63
Criminal 63
Civil 64
Regulatory 64
viii CISSP Cert Guide
Industry Standards 64
eDiscovery 67
Professional Ethics 67
2
(ISC) Code of Ethics 67
Computer Ethics Institute 68
Internet Architecture Board 68
Organizational Code of Ethics 69
Security Documentation 69
Policies 70
Organizational Security Policy 71
System-Specific Security Policy 72
Issue-Specific Security Policy 72
Policy Categories 72
Processes 72
Procedures 72
Standards 73
Guidelines 73
Baselines 73
Business Continuity 73
Business Continuity and Disaster Recovery Concepts 73
Disruptions 74
Disasters 74
Disaster Recovery and the Disaster Recovery Plan (DRP) 75
Continuity Planning and the Business Continuity Plan (BCP) 76
Business Impact Analysis (BIA) 76
Contingency Plan 76
Availability 77
Reliability 77
Scope and Plan 77
Personnel Components 77
Scope 78
Business Contingency Planning 78
BIA Development 81
Identify Critical Processes and Resources 82
Contents ix
Implementation 100
Control Categories 100
Compensative 101
Corrective 101
Detective 101
Deterrent 102
Directive 102
Preventive 102
Recovery 102
Control Types 102
Administrative (Management) 103
Logical (Technical) 105
Physical 105
Controls Assessment, Monitoring, and Measurement 108
Reporting and Continuous Improvement 108
Risk Frameworks 109
NIST 109
ISO/IEC 27005:2018 126
Open Source Security Testing Methodology Manual (OSSTMM) 127
COSO’s Enterprise Risk Management (ERM) Integrated Framework 127
A Risk Management Standard by the Federation of European Risk
Management Associations (FERMA) 128
Geographical Threats 129
Internal Versus External Threats 129
Natural Threats 130
Hurricanes/Tropical Storms 130
Tornadoes 130
Earthquakes 130
Floods 131
Volcanoes 131
System Threats 131
Electrical 131
Communications 132
Utilities 133
Contents xi
Firmware 242
Operating Systems 243
Memory Management 244
System Security Evaluation Models 244
TCSEC 245
Rainbow Series 245
ITSEC 248
Common Criteria 250
Security Implementation Standards 252
ISO/IEC 27001 253
ISO/IEC 27002 254
Payment Card Industry Data Security Standard (PCI DSS) 255
Controls and Countermeasures 255
Certification and Accreditation 256
Control Selection Based on Systems Security Requirements 256
Security Capabilities of Information Systems 257
Memory Protection 257
Trusted Platform Module 258
Interfaces 259
Fault Tolerance 259
Policy Mechanisms 260
Separation of Privilege 260
Accountability 260
Encryption/Decryption 260
Security Architecture Maintenance 261
Vulnerabilities of Security Architectures, Designs, and Solution
Elements 261
Client-Based Systems 262
Server-Based Systems 263
Data Flow Control 263
Database Systems 264
Inference 264
Aggregation 264
Contamination 264
Contents xvii
Hashing 333
One-Way Hash 333
MD2/MD4/MD5/MD6 335
SHA/SHA-2/SHA-3 336
HAVAL 337
RIPEMD-160 337
Tiger 337
Message Authentication Code 337
HMAC 337
CBC-MAC 338
CMAC 338
Salting 339
Digital Signatures and Non-repudiation 339
DSS 340
Non-repudiation 340
Applied Cryptography 340
Link Encryption Versus End-to-End Encryption 340
Email Security 340
Internet Security 341
Cryptanalytic Attacks 341
Ciphertext-Only Attack 342
Known Plaintext Attack 342
Chosen Plaintext Attack 342
Chosen Ciphertext Attack 342
Social Engineering 342
Brute Force 343
Differential Cryptanalysis 343
Linear Cryptanalysis 343
Algebraic Attack 343
Frequency Analysis 343
Birthday Attack 344
Dictionary Attack 344
Replay Attack 344
Contents xxi
VoIP 431
iSCSI 431
Wireless Networks 431
FHSS, DSSS, OFDM, VOFDM, FDMA, TDMA, CDMA, OFDMA, and
GSM 432
802.11 Techniques 432
Cellular or Mobile Wireless Techniques 433
5G 434
Satellites 435
WLAN Structure 435
Access Point 435
Service Set Identifier (SSID) 436
Infrastructure Mode Versus Ad Hoc Mode 436
WLAN Standards 436
802.11 436
802.11a 436
802.11b 437
802.11g 437
802.11n (Wi-Fi 4) 437
802.11ac (Wi-Fi 5) 437
802.11ax (Wi-Fi 6) 438
802.11be (Wi-Fi 7) 438
Bluetooth 438
Infrared 439
Near Field Communication (NFC) 439
Zigbee 439
WLAN Security 439
Open System Authentication 440
Shared Key Authentication 440
WEP 440
WPA 440
WPA2 441
Personal Versus Enterprise 441
WPA3 441
802.1X 442
xxvi CISSP Cert Guide
Online Elements
Appendix A Memory Tables
Appendix B Memory Tables Answer Key
Glossary
xlii CISSP Cert Guide
Dedications
To all our cyber warriors who protect our businesses and our national security. Your careers are so
demanding and your ambition to gain certifications is to be commended.
—Darren
xliv CISSP Cert Guide
Acknowledgments
My first thanks goes to God for blessing me with the ability to learn and grow in
any field I choose. With Him, all things are possible!
For me, it is hard to believe that I am on the fourth edition of this book. I appreci-
ate my family and my friends, who have supported me in my publishing journey
through three titles and multiple editions.
It is my hope that you, the reader, succeed in your IT certification goals!
—Robin
To my beautiful wife, Nalini, and my children, Aine, Fiona, Nicolai, and Shay,
I cannot thank you enough for your support and love over the years. Also, to my
parents, Ted and Annette, who inspired me to be an eternal learner and try to help
others to gain knowledge. I would like to acknowledge my fellow teachers who make
immeasurable sacrifices to see their students succeed. My sincere thanks to all of the
tremendous reviewers, editors, and other staff at Pearson who I have had the honor
of working with for many years.
—Darren
About the Technical Reviewers xlv
Reader Services
Register your copy of CISSP Cert Guide at www.pearsonitcertification.com for con-
venient access to downloads, updates, and corrections as they become available. To
start the registration process, go to www.pearsonitcertification.com/register and log
in or create an account*. Enter the product ISBN 9780137507474 and click Submit.
When the process is complete, you will find any available bonus content under
Registered Products.
*Be sure to check the box that you would like to hear from us to receive exclusive
discounts on future editions of this product.
Introduction xlvii
Introduction
Sponsoring Bodies
The CISSP is created and maintained by the International Information System
Security Certification Consortium (ISC)2. The (ISC)2 is a global not-for-profit
organization that provides both a vendor-neutral certification process and support-
ing educational materials.
The CISSP is one of a number of security-related certifications offered by (ISC)2.
Other certifications offered by this organization include the following:
■ Systems Security Certified Practitioner (SSCP)
■ Certified Cloud Security Professional (CCSP)
■ Certified Authorization Professional (CAP)
■ Certified Secure Software Life Cycle Professional (CSSLP)
■ HealthCare Information Security and Privacy Practitioner (HCISPP)
xlviii CISSP Cert Guide
Several additional versions of the CISSP are offered that focus in particular areas:
■ CISSP-Information Systems Security Architecture Professional
(CISSP-ISSAP)
■ CISSP-Information Systems Security Engineering Professional
(CISSP-ISSEP)
■ CISSP-Information Systems Security Management Professional
(CISSP-ISSMP)
(ISC)2 derives some of its prestige from the fact that it was the first security certifi-
cation body to meet the requirements set forth by ANSI/ISO/IEC Standard 17024,
a global benchmark for personnel certification. This ensures that certifications
offered by this organization are both highly respected and sought after.
Stated Goals
The goal of (ISC)2, operating through its administration of the CISSP and
other certifications, is to provide a reliable instrument to measure an individual’s
knowledge of security. This knowledge is not limited to technology issues alone but
extends to all aspects of security that face an organization.
In that regard, the topics are technically more shallow than those tested by some
other security certifications, while also covering a much wider range of issues than
those other certifications. Later, we cover the topics that comprise the eight
domains of knowledge in detail, but it is a wide range of topics. This vast breadth
of knowledge and the experience needed to pass the exam are what set the CISSP
certification apart.
In short, this certification demonstrates that the holder not only has the knowledge
and skills tested in the exam but also has the wherewithal to plan and implement a
study plan that addresses an unusually broad range of security topics.
To the Enterprise
For an organization, the CISSP certification offers a reliable benchmark to which
job candidates can be measured by validating knowledge and experience. Candidates
who successfully pass the rigorous exam are required to submit documentation
verifying experience in the security field. Individuals holding this certification will
stand out from the rest, not only making the hiring process easier but also adding a
level of confidence in the final hire.
Asset Security
The Asset Security domain, covered in Chapter 2, focuses on the collection, han-
dling, and protection of information throughout its life cycle and is 10 percent of
the exam. Topics include
■ Information and asset identification and classification
■ Information and asset handling requirements
■ Resource provisioning
■ Data life cycle
■ Asset retention
■ Data security controls and compliance requirements
Security Operations
The Security Operations domain, covered in Chapter 7, surveys the execution of
security measures and maintenance of proper security posture and is 13 percent of
the exam. Topics include
■ Investigations compliance
■ Logging and monitoring activities
■ Configuration management
■ Security operations concepts
■ Resource protection
■ Incident management
■ Detective and preventive measures
■ Patch and vulnerability management
■ Change management processes
■ Recovery strategies
■ Disaster recovery (DR) processes
■ Disaster recovery plan (DRP) testing
■ Business continuity (BC) planning and exercises
■ Physical security implementation and management
■ Personnel safety and security concerns
When you are notified that you have successfully passed the examination, you will
be required to subscribe to the (ISC)2 Code of Ethics and have your application en-
dorsed before the credential can be awarded. An endorsement form for this purpose
must be completed and signed by an (ISC)2 certified professional who is an active
member and who is able to attest to your professional experience.
The CAT test consists of a maximum 175 questions, while the linear format consists
of 250 questions. As of May 2022, the CISSP exam will be in a computerized adap-
tive testing (CAT) format for those who take the English-language version, whereas
all other languages have only the linear format. With the CAT format, the computer
evaluates the certification candidate’s ability to get the next question right based on
the candidate’s previous answers and the difficulty of those questions. The questions
get harder as the certification candidate answers questions correctly, and the ques-
tions get easier as the certification candidate answers questions incorrectly. Each an-
swer affects the questions that follow. Therefore, unlike the linear test format where
the certification candidate can go back and forth in the question pool and change
answers, a CAT format exam does not allow the certification candidate to change
the answer or even view a previously answered question. The certification candidate
may receive a pass or fail score without seeing 175 questions. To find out more about
the CAT format, please go to www.isc2.org/Certifications/CISSP/CISSP-CAT#.
Although the majority of the questions will be multiple-choice questions with four
options, test candidates may also encounter drag-and-drop and hotspot questions.
The passing grade is 700 out of a possible 1,000 points. Candidates will receive the
unofficial results at the test center from the test administrator. (ISC)2 will then
follow up with an official result via email.
Book Features
To help you customize your study time using this book, the core chapters have
several features that help you make the best use of your time:
■ Foundation Topics: These are the core sections of each chapter. They explain
the concepts for the topics in that chapter.
■ Exam Preparation Tasks: After the “Foundation Topics” section of each
chapter, the “Exam Preparation Tasks” section lists a series of study activities
that you should do at the end of the chapter:
■ Review All Key Topics: The Key Topic icon appears next to the most
important items in the “Foundation Topics” section of the chapter. The
Review All Key Topics activity lists the key topics from the chapter, along
with their page numbers. Although the contents of the entire chapter
could be on the exam, you should definitely know the information listed
in each key topic, so you should review these.
■ Define Key Terms: Although the CISSP exam may be unlikely to ask a
question such as “Define this term,” the exam does require that you learn
and know a lot of information systems security terminology. This section
lists the most important terms from the chapter, asking you to write a
short definition and compare your answer to the glossary at the end of
the book.
■ Review Questions: Confirm that you understand the content that
you just covered by answering these questions and reading the answer
explanations.
Companion Website
Register this book to get access to the Pearson IT Certification test engine and
other study materials plus additional bonus content. Check this site regularly for
new and updated postings written by the authors that provide further insight into
the more troublesome topics on the exam. Be sure to check the box that you would
like to hear from us to receive updates and exclusive discounts on future editions of
this product or related products.
To access this companion website, follow these steps:
Step 1. Go to www.pearsonitcertification.com/register and log in or create a new
account.
Step 2. Enter the ISBN: 9780137507474.
Step 3. Answer the challenge question as proof of purchase.
Step 4. Click the Access Bonus Content link in the Registered Products section
of your account page, to be taken to the page where your downloadable
content is available.
Please note that many of the companion content files can be very large, especially
image and video files.
If you are unable to locate the files for this title by following these steps, please visit
www.pearsonITcertification.com/contact and select the Site Problems/Comments
option. Our customer service representatives will assist you.
Step 3. Enter your email/password for your account. If you don’t have an account
on PearsonITCertification.com or CiscoPress.com, you will need to
establish one by going to PearsonITCertification.com/join.
Step 4. In the My Products tab, click the Activate New Product button.
Step 5. Enter the access code printed on the insert card in the back of your book
to activate your product.
Step 6. The product will now be listed in your My Products page. Click the
Exams button to launch the exam settings screen and start your exam.
www.pearsonitcertification.com/content/downloads/pcpt/engine.zip
To access the book’s companion website and the software, simply follow these steps:
Step 1. Register your book by going to PearsonITCertification.com/register and
entering the ISBN: 9780137507474.
Step 2. Answer the challenge questions.
Step 3. Go to your account page and click the Registered Products tab.
Step 4. Click the Access Bonus Content link under the product listing.
Step 5. Click the Install Pearson Test Prep Desktop Version link under the
Practice Exams section of the page to download the software.
Step 6. After the software finishes downloading, unzip all the files on your
computer.
Step 7. Double-click the application file to start the installation, and follow the
onscreen instructions to complete the registration.
Step 8. After the installation is complete, launch the application and click the
Activate Exam button on the My Products tab.
Step 9. Click the Activate a Product button in the Activate Product Wizard.
Step 10. Enter the unique access code found on the card in the sleeve in the back
of your book and click the Activate button.
lviii CISSP Cert Guide
Step 11. Click Next and then click Finish to download the exam data to your
application.
Step 12. Start using the practice exams by selecting the product and clicking the
Open Exam button to open the exam settings screen.
Note that the offline and online versions will sync together, so saved exams and
grade results recorded on one version will be available to you on the other as well.
In addition to these three modes, you will be able to select the source of your ques-
tions. You can choose to take exams that cover all of the chapters, or you can narrow
your selection to just a single chapter or the chapters that make up specific parts in
the book. All chapters are selected by default. If you want to narrow your focus to
individual chapters, simply deselect all the chapters; then select only those on which
you wish to focus in the Objectives area.
You can also select the exam banks on which to focus. Each exam bank comes com-
plete with a full exam of questions that cover topics in every chapter. You can have
the test engine serve up exams from all banks or just from one individual bank by
selecting the desired banks in the exam bank area.
There are several other customizations you can make to your exam from the exam
settings screen, such as the time of the exam, the number of questions served up,
Introduction lix
Figure Credits
Chapter Opener: Charlie Edwards/Getty Images
Figure 1.1: Joseph Steinberg, CloudMask Inc.
Figure 1.27: The Committee of Sponsoring Organizations (COSO)
Figure 3.25: EnggCyclopedia.com
Figure 4.46: Cisco Systems
Figure 8.7: The National Aeronautics and Space Administration (NASA)
This chapter covers the following topics:
The Security and Risk Management domain addresses a broad array of topics, includ-
ing the fundamental information security principles of confidentiality, integrity, and
availability; governance; legal systems; privacy; the regulatory environment; person-
nel security; risk management; threat modeling; business continuity; supply chain risk;
and professional ethics. Out of 100 percent of the exam, this domain carries an average
weight of 15 percent, which is the highest weight of all the eight domains. So, pay close
attention to the many details in this chapter!
This page intentionally left blank
CHAPTER 1
Foundation Topics
Security Terms
When implementing security and managing risk, you must keep in mind several
important security principles and terms, including confidentiality, integrity, and
availability; auditing and accounting; non-repudiation; default security posture;
defense in depth; abstraction; data hiding; and encryption.
CIA
The three fundamentals of security are confidentiality, integrity, and availability
(CIA), often referred to as the CIA triad. Although the CIA triad is being intro-
duced here, each principle of the triad should be considered in every aspect of
security design. The CIA triad could easily be discussed in any domain of the
CISSP exam.
Most security issues result in a violation of at least one facet of the CIA triad.
Understanding these three security principles will help security professionals ensure
that the security controls and mechanisms implemented protect at least one of these
principles.
Every security control that an organization puts into place fulfills at least one of the
security principles of the CIA triad. Understanding how to circumvent these secu-
rity principles is just as important as understanding how to provide them.
A balanced security approach should be implemented to ensure that all three fac-
ets are considered when security controls are implemented. When implementing
any control, you should identify the facet that the control addresses. For example,
Redundant Array of Inexpensive Disks (RAID) addresses data availability, file hashes
address data integrity, and encryption addresses data confidentiality. A balanced
approach ensures that no facet of the CIA triad is ignored.
Confidentiality
To ensure confidentiality, you must prevent the disclosure of data or information
to unauthorized entities. As part of confidentiality, the sensitivity level of data must
be determined before putting any access controls in place. Data with a higher sen-
sitivity level will have more access controls in place than data at a lower sensitivity
level. Identification, authentication, and authorization can be used to maintain data
confidentiality.
The opposite of confidentiality is open access. Encryption is probably the most
popular example of a control that provides confidentiality.
Chapter 1: Security and Risk Management 7
Integrity
Integrity, the second part of the CIA triad, ensures that data and systems are
protected from unauthorized modification or data corruption. The goal of integrity
is to preserve consistency, specifically:
■ Data integrity: Implies that the data can be trusted, is complete, consistent,
and accurate.
■ System integrity: Implies that a system will work as intended—that is, store,
process, and display data correctly.
The opposite of integrity is corruption. Hashing can be used to prove (or disprove)
data integrity.
Availability
Availability means ensuring that information, systems, and supporting infrastruc-
ture are operating and accessible when needed. The two main instances in which
availability is affected are (1) when attacks are carried out that disable or cripple
a system and (2) when service loss occurs during and after disasters. Each system
should be assessed in terms of its criticality to organizational operations. Controls
should be implemented based on each system’s criticality level.
Availability is the opposite of destruction or inoperability. Fault-tolerant technolo-
gies, such as RAID or alternate sites, are examples of controls that help improve
availability.
Non-repudiation
Non-repudiation is the assurance that a sender cannot deny an action, and often
involves the sender being sent proof of delivery, while the receiver is provided
with proof of the sender’s identity. This behavior is usually seen in electronic
communications where one party denies sending a contract, document, or email.
Non-repudiation means putting measures in place that will prevent the sender from
denying that it sent a message.
A valid digital signature gives a recipient reason to believe that the message was
created by a known sender (authentication), that the sender cannot deny having
sent the message (non-repudiation), and when encrypted with a signature, that the
message was not altered in transit (integrity).
Defense in Depth
A defense-in-depth strategy refers to the practice of using multiple layers of security
between data and the resources on which it resides and securing that data from pos-
sible attackers (see Figure 1-1). It is derived from a military strategy, whereby multi-
ple layers of defense are used rather than one line of defense, thereby slowing down
the advancement of an attacker.
Layer 3
Operating system hardening
- Security configuration
- Anti-malware
- General ADDS security
- File system
- Print system
- .NET Framework security
Layer 2 - Internet Information Services
Physical protection - System redundancy
- Physical environment
- Physical controls
- Communications
- Surveillance
Layer 4
Information access
Pe
ople Layer 5
External access
Policies,
Procedures, Internal
Physical Perimeter Host Application Data
and network
Awareness
Abstraction
Abstraction is the process of taking away or removing characteristics from some-
thing to reduce it to a set of essential characteristics. Abstraction usually results in
named entities with a set of characteristics that help in their identification. However,
unnecessary characteristics are hidden. Abstraction is related to both encapsulation
and data hiding.
Data Hiding
Data hiding is the principle whereby information about a known entity is not
accessible to certain processes or users. For example, a database may collect
information about its users, including their name, job title, email address, and
phone number, that an organization wants all users to be able to access. However,
it might not want the public, or certain internal employees, to be able to access
their Social Security numbers, birthdate, or other protected personally identifiable
information (PII). Encapsulation is similar to data hiding; data hiding is related to
data security, whereas encapsulation is focused on hiding the complexity of a system
or its data.
Encryption
Encryption is the process of converting information or data into a scrambled text or
an unreadable format to prevent unauthorized access. Data can be encrypted while
at rest, in transit, and in use. Encryption is covered in more detail in Chapter 3,
“Security Architecture and Engineering.”
Organizations should use security governance principles to ensure that all organi-
zational assets are protected. Organizations often use best practices that are estab-
lished by organizations, such as the National Institute of Standards and Technology
(NIST), Information Technology Infrastructure Library (ITIL), or the ISO/IEC
27000 family of standards. Because information technology is an operational neces-
sity, management must take an active role in any security governance initiative. In
fact, more and more privacy regulations provide guidance on the responsibilities of
management in information security.
Security governance assigns rights and uses an accountability framework to ensure
appropriate decision-making. It must ensure that the framework used is aligned with
the business strategy. Security governance gives directions, establishes standards and
principles, and prioritizes investments. It is the responsibility of the organization’s
board of directors and executive management.
The IT Governance Institute (ITGI) issued the Board Briefing on IT Governance, 2nd
Edition, which is available from the Information Systems Audit and Control Asso-
ciation’s (ISACA’s) website. It provides the following definition for IT governance:
IT governance is the responsibility of the board of directors and executive management.
It is an integral part of enterprise governance and consists of the leadership and orga-
nizational structures and processes that ensure that the organization’s IT sustains and
extends the organization’s strategies and objectives.
According to this publication, IT governance covers strategic alignment, value
delivery, risk management, resource management, and performance measurement. It
includes checklists and tools to help an organization’s board of directors and execu-
tive management ensure IT governance.
Security governance principles include security function alignment, organizational
processes, organizational roles and responsibilities, security control frameworks, and
due care and due diligence.
12 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 13
Business Case
A business case is a formal document that gives the reasons behind an organizational
project or initiative and usually includes financial justification for a project or an
initiative. The security management team should develop a formal business case for
the overall security assessment of an organization. After the organization’s security
assessment is complete and its business case has been created, management will
decide how to proceed.
At that point, other business cases for individual security projects will need to be
developed. For example, if management wants the security management team to
ensure that the organization’s internal network is protected from attacks, the secu-
rity management team may draft a business case that explains the devices that need
to be implemented to meet this goal. This business case may include firewalls,
intrusion detection systems (IDSs), endpoint detection and response (EDR), access
control lists (ACLs), and other devices, and it should detail how these systems will
provide protection.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
14 CISSP Cert Guide
determine the daily workload. When the metrics are compared over a longer period
of time, the trends that occur can help to shape future security projects and budgets.
Procedures should state who will collect the metrics, which metrics will be collected,
when the metrics will be collected, and what the thresholds are that will trigger cor-
rective actions. Security professionals should consult with the information security
governance frameworks listed later in this chapter, particularly ISO/IEC 27004:2016
and NIST 800-55 Rev. 2, for help in establishing metrics guidelines and procedures.
Although the security team should analyze metrics on a daily basis, periodic analysis
of the metrics by a third party can ensure the integrity and efficacy of the security
metrics by verifying the results of the internal team. Data from the third party
should be used to improve the security program and security metrics process.
Resources
If the appropriate resources are not allocated to an organization’s security func-
tion, even the best-laid security plans tend to fail. These resources include, but are
not limited to, security personnel, devices, and controls. As discussed in the “Secu-
rity Budget, Metrics, and Efficacy” section, resource allocation is limited based on
the security budget. Risk analysis helps an organization determine which security
resources are most important and which are not necessary. But keep in mind that
as the security function of the organization is constantly changing, so should the
resource allocation to the security function change as needed. What may have been
cost-prohibitive last year may become a necessity this year, and what may have been
a necessity a few years ago may now be considered outdated and may not provide
the level of protection needed. For this reason, security professionals should contin-
uously revisit the risk analysis process to determine what improvements can be made
in the security function of an organization.
Security professionals should also understand what personnel resources are needed
to support any security function. Resources may include, but are not limited to, data
owners, system administrators, network administrators, IT technicians, software
developers, law enforcement, and accounting officers. The size of the organization
will often influence the availability of resources to any organizational security func-
tion. Security professionals should work to build relationships with all personnel
resources to ensure a successful security program.
Organizational Processes
To understand organizational processes, organizations must determine the work
needed to accomplish a goal, assign those tasks to individuals, and arrange those
individuals into a decision-making organizational structure. The end result of docu-
menting the processes is an organization that consists of unified parts acting in
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 15
harmony to execute tasks to achieve goals. But all organizations go through periods
of growth and decline. Often during these periods, organizations will go through
acquisitions, mergers, and divestitures. In addition, governance committees will be
formed to help improve the organization and its processes.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
16 CISSP Cert Guide
Governance Committees
A governance committee recruits and recommends members of an organization’s
governing board (e.g., board of directors or trustees). The governance committee
should be encouraged to include select board members or individuals who under-
stand information security and risks among the board members.
A board committee (generally the audit or enterprise risk management committee)
is generally tasked with the oversight of information security. Management-level
security professionals should make themselves available for briefings and establish a
direct line of communication with the designated committee.
Board of Directors
An organization’s board of directors includes individuals who are nominated by a
governance committee and elected by shareholders to ensure that the organization
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 17
is run properly. The loyalty of the board of directors should be to the shareholders,
not high-level management. Members of the board of directors should maintain
their independence from all organizational personnel, especially if the Sarbanes-
Oxley (SOX) Act or Gramm-Leach-Bliley Act (GLBA) applies to the organization.
NOTE Regulations that are pertinent to the CISSP exam are discussed later in this
chapter. Keep in mind that for testing purposes, security professionals need to under-
stand only the types of organizations and data that these laws affect.
Senior officials, including the board of directors and senior management, must
perform their duties with the care that ordinary, prudent people would exercise in
similar circumstances. This is known as the prudent-man rule. Due care and due
diligence, discussed later in this chapter, also affect members of the board of
directors and high-level management.
Management
High-level management has the ultimate responsibility for preserving and protect-
ing organizational data. High-level management includes the CEO, CFO, CIO,
CPO, and CSO. Other management levels, including business unit managers and
business operations managers, also have security responsibilities.
The chief executive officer (CEO) is the highest managing officer in any organiza-
tion and reports directly to the shareholders. The CEO must ensure that an organi-
zation grows and prospers.
The chief financial officer (CFO) is the officer responsible for all financial aspects of
an organization. Although structurally the CFO might report directly to the CEO,
the CFO must also provide financial data for the shareholders and government enti-
ties. Financial data must conform to the CIA triad.
The chief information officer (CIO) is the officer responsible for all information
systems and technology used in the organization and reports directly to the CEO
or CFO. The CIO usually drives the effort to protect company assets, including any
organizational security program.
The chief privacy officer (CPO) is the officer responsible for private information
and usually reports directly to the CIO. As a newer position, this role is still consid-
ered optional but is becoming increasingly important, especially in organizations
that handle lots of private information, including healthcare companies, insurance
companies, and financial institutions. The title and position of data protection
officer (DPO), which is equivalent to CPO, has become more important, especially
with the introduction of privacy legislation, such as the General Data Protection
Regulation (GDPR).
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
18 CISSP Cert Guide
The chief security officer (CSO) is the officer who leads any security effort and
reports directly to the CEO. Although this role is considered optional, this role must
solely be focused on security matters. Its independence from all other roles must be
maintained to ensure that the organization’s security is always the focus of the CSO.
This role implements and manages all aspects of security, including risk analysis,
security policies and procedures, incident handling, security awareness training, and
emerging technologies.
Security professionals should ensure that all risks are communicated to executive
management and the board of directors, if necessary. Executive management should
maintain a balance between acceptable risk and business operations. Although exec-
utive management is not concerned with the details of any security implementations,
the costs or benefits of any security implementation and any residual risk after such
implementation will be vital in ensuring their buy-in to the implementation.
Business unit managers provide departmental information to ensure that appropriate
controls are in place for departmental data. Often business unit managers are classi-
fied as the data owner for all departmental data. Some business unit managers have
security duties. For example, the business operations department manager would be
best suited to oversee the security policy development.
Audit Committee
An audit committee evaluates an organization’s financial reporting mechanism
to ensure that financial data is accurate. It may also be tasked with cybersecurity
risk. This committee performs an internal audit and engages independent auditors
as needed. Members of this committee must participate in continuing education
on a regular basis to ensure that they can oversee financial reporting and enforce
accountability in the financial processes.
Data Owner
The main responsibility of the data or information owners is to determine the clas-
sification level of the information they own and to protect the data for which they
are responsible. This role approves or denies access rights to the data. However, data
owners usually do not handle the implementation of the data access controls. Ulti-
mately, the CEO of an organization is the data owner for the organization.
The data owner role is usually filled by an individual who understands the data best
through membership in a particular business unit. Each business unit should have
a data owner. For example, a human resources department employee better under-
stands human resources data than an accounting department employee.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 19
Data Custodian
The data custodian implements the information classification and controls after they
are determined by the data owner. Although the data owner is usually an individual
who understands the data, the data custodian does not need any knowledge of the
data beyond its classification levels. Although a human resources manager should be
the data owner for the human resources data, an IT department member could act
as the data custodian for the data.
System Owner
A system owner owns one or more systems and must ensure that the appropriate
controls are in place on those systems. Although a system has a single system owner,
multiple data owners can be responsible for the information on the system. There-
fore, system owners must be able to manage the needs of multiple data owners and
implement the appropriate procedures to ensure that the data is secured.
System Administrator
A system administrator performs the day-to-day administration of one or more
systems. These day-to-day duties include adding and removing system users and
installing system software and creating baselines.
Security Administrator
A security administrator maintains security devices and software, including firewalls,
antivirus software, and so on. The main focus of the security administrator is secu-
rity, whereas the main focus of a system administrator is the system availability and
the main focus of the network administrator is network availability. The security
administrator reviews all security audit data and implements appropriate and recom-
mended countermeasures if any.
Security Analyst
A security analyst analyzes the security needs of the organization and develops the
internal information security governance documents, including policies, standards,
and guidelines. The role focuses on the design of security, not its implementation.
Application Owner
An application owner determines the personnel who can access an application.
Because most applications are owned by a single department, business department
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
20 CISSP Cert Guide
managers usually fill this role. However, the application owner does not necessarily
perform the day-to-day administration of the application. This responsibility can be
delegated to a member of the IT staff, depending on the technical skills needed.
Supervisor
A supervisor manages a group of users and any assets owned by this group. Supervi-
sors must immediately communicate any personnel role changes that affect security
to the security administrator.
User
A user is any person who accesses data to perform their job duties. Users should
understand any security procedures and policies for the data to which they have
access. Supervisors are responsible for ensuring that users have the appropriate
access rights before they are given access to the system or data.
Auditor
An auditor monitors user activities to ensure that the appropriate controls are in
place. Auditors also make sure that the controls that are in place are functioning as
intended. Auditors need access to all audit and event logs to verify compliance with
security policies. Both internal and external auditors can be used.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 21
■ TOGAF
■ DoDAF
■ MODAF
■ SABSA
■ COBIT
■ NIST 800 Series
■ HITRUST CSF
■ CIS Critical Security Controls
■ COSO
■ OCTAVE
■ ITIL
■ Six Sigma
■ CMMI
■ CRAMM
■ Top-down versus bottom-up approach
■ Security program life cycle
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
22 CISSP Cert Guide
The following standards are included as part of the ISO/IEC 27000 Series at the
time of this writing:
■ 27000:2018: Published overview of ISMSs and vocabulary
■ 27001:2013: Published ISMS requirements
■ 27002:2013: Published code of practice for information security controls
■ 27003:2017: Published guidance on the requirements for an ISMS
■ 27004:2016: Published ISMS monitoring, measurement, analysis, and evalua-
tion guidelines
■ 27005:2018: Published information security risk management guidelines
■ 27006:2015: Published requirements for bodies providing audit and certifica-
tion of ISMS
■ 27007:2020: Published ISMS auditing guidelines
■ 27008:2019: Published guidelines for the assessment of information security
controls
■ 27009:2020: Published sector-specific application of ISO/IEC 27001
guidelines
■ 27010:2015: Published information security management for inter-sector and
inter-organizational communications guidelines
■ 27011:2016: Published telecommunications organizations’ information
security management guidelines
■ 27013:2015: Published integrated implementation of ISO/IEC 27001 and
ISO/IEC 20000-1 guidance
■ 27014:2020: Published information security governance guidelines
■ 27016:2014: Published ISMS organizational economics guidelines
■ 27017:2015: Published code of practice for information security controls
based on ISO/IEC 27002 for cloud services
■ 27018:2019: Published code of practice for protection of personally identifi-
able information (PII) in public clouds acting as PII processors
■ 27019:2017: Published information security controls for the energy utility
industry guidelines
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 23
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
24 CISSP Cert Guide
These standards are developed by the ISO/IEC bodies, but certification or confor-
mity assessment is provided by third parties.
NOTE The numbers after the colon for each standard stand for the year that the
standard was published. You can find more information regarding ISO standards at
www.iso.org. All ISO standards are copyrighted and must be purchased to obtain
detailed information in the standards.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 25
Zachman Framework
The Zachman Framework, an enterprise architecture framework, is a two-
dimensional classification system based on six communication questions (What,
Where, When, Why, Who, and How) that intersect with different perspectives
(Executive, Business Management, Architect, Engineer, Technician, and Enterprise).
This system allows analysis of an organization to be presented to different groups
in the organization in ways that relate to the groups’ responsibilities. Although this
framework is not security oriented, using this framework helps you relay informa-
tion for personnel in a language and format that are most useful to them.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
26
Viewpoint Layer Assets (What) Motivation Process (How) People (Who) Location Time (When)
CISSP Cert Guide
(Why) (Where)
Business Contextual Business Risk model Process model Organizations Geography Time
and dependencies
relationships
Architect Conceptual Business Control Security Security entity Security domain Security-
attributes profile objectives strategies and model and trust model related
architectural framework lifetimes and
layering deadlines
Designer Logical Business Security policies Security Entity schema Security domain Security
information services and privilege definitions and processing
model profiles associations cycle
Builder Physical Business data Security rules, Security Users, Platform Control
model practices, and mechanism applications, and and network structure
procedures interfaces infrastructure execution
Tradesman Component Detailed data Security Security tools Identities, Processes, Security step
structures standards and products functions, nodes, addresses, timing and
actions, and and protocols sequencing
ACLs
Facilities Operational Operational Operation risk Security service Application Site, network, Security
Manager continuity management management and user and platform operations
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
assurance and support management security schedule
and support
Chapter 1: Security and Risk Management 27
These five principles drive control objectives categorized into seven enablers:
■ Principles, policies, and frameworks
■ Processes
■ Organizational structures
■ Culture, ethics, and behavior
■ Information
■ Services, infrastructure, and applications
■ People, skills, and competencies
It also covers the 37 governance and management processes that are needed for
enterprise IT.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
28 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 29
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
30 CISSP Cert Guide
NOTE For many of the SPs in the preceding list, you simply need to know that the
SP exists. For others, you need to understand details about the SP. Some NIST SPs
are covered in more detail later in this chapter or in other chapters. Refer to the index
in this book to determine which SPs are covered in more detail.
HITRUST CSF
HITRUST is a privately held U.S. company that works with healthcare, technol-
ogy, and information security leaders to establish the HITRUST Common Security
Framework (CSF) that can be used by all organizations that create, access, store, or
exchange sensitive and/or regulated data. It was written to address the requirements
of multiple regulations and standards. Version 9.4.2 was released in December 2020.
It is primarily used in the healthcare industry.
This framework has 14 control categories:
0.0: Information Security Management Program
1.0: Access Control
2.0: Human Resources Security
3.0: Risk Management
4.0: Security Policy
5.0: Organization of Information Security
6.0: Compliance
7.0: Asset Management
8.0: Physical and Environmental Security
9.0: Communications and Operations Management
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 31
Within each control category, objectives are defined and assigned levels based on
their compliance with documented control standards.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
32 CISSP Cert Guide
The CIS Critical Security Controls provide a mapping of these controls to known
standards, frameworks, laws, and regulations.
Process 8
Select mitigation
approach.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 33
ITIL Service ITIL Service Design ITIL Service ITIL Service ITIL Continual
Strategy Transition Operation Service
Improvement
Strategy Design Coordination Transition Planning Event Continual Service
Management and Support Management Improvement
Service Portfolio Service Catalogue Change Incident
Management Management Management
Financial Service Level Service Asset and Request
Management for Management Configuration Fulfillment
IT Services Management
Demand Availability Release and Problem
Management Management Deployment Management
Management
Business Capacity Management Service Validation Access
Relationship and Testing Management
Management
IT Service Continuity Change Evaluation
Management
Information Security Knowledge
Management System Management
Supplier Management
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
34 CISSP Cert Guide
Six Sigma
Six Sigma is a process improvement standard that includes two project methodolo-
gies that were inspired by Deming’s Plan–Do–Check–Act cycle. The DMAIC meth-
odology includes Define, Measure, Analyze, Improve, and Control. The DMADV
methodology includes Define, Measure, Analyze, Design, and Verify. Six Sigma was
designed to identify and remove defects in the manufacturing process but can be
applied to many business functions, including security.
NOTE The Deming cycle is discussed in more detail later in this chapter.
Figures 1-4 and 1-5 show both of the Six Sigma methodologies.
Define
Control Measure
Improve Analyze
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 35
Define
Verify Measure
Design Analyze
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
36 CISSP Cert Guide
Organizational
Effectiveness
Maturity Level 5–
Optimizing
Maturity Level 4–
Quantitatively
Managed
Maturity Level 3–
Defined
Maturity Level 2–
Managed
Maturity Level 1–
Initial
Process Sustainability
Project Repeatability
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 37
Plan and
Organize
Operate and
Maintain
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
38 CISSP Cert Guide
Compliance
Compliance involves being in alignment with standards, guidelines, regulations,
and/or legislation. An organization must comply with governmental, industrial,
and related laws and regulations. However, compliance with standards bodies and
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 39
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
40 CISSP Cert Guide
NOTE Specific laws and regulations are discussed later, in the “Privacy” subsection
of the “Legal and Regulatory Issues” section of this chapter.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 41
Computer-Assisted Crime
A computer-assisted crime occurs when a computer is used as a tool to help commit
a crime. Criminals can steal confidential organizational data in many different ways.
This crime is possible without a computer. But when criminals use computers to
help them steal confidential organizational data, then a computer-assisted crime has
occurred.
Computer-Targeted Crime
A computer-targeted crime occurs when a computer is the victim of an attack that’s
sole purpose is to harm the computer and its owner. This type of crime could not
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
42 CISSP Cert Guide
be carried out without a computer being used. Computer crimes that fit into this
category include denial-of-service (DoS) and buffer overflow attacks.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 43
this type of mechanism has the drawback of sometimes preventing required pop-ups.
Pop-ups should be disabled by default and exceptions made later when a pop-up is
necessary.
Ransomware is a special category of malware that attempts to extort money out of
possible victims. Ransomware generally encrypts the users’ data until a payment is
made to the attacker. One type of ransomware informs users that their computer
or smartphone has been used for illegal activities and that a fine must be paid to
prevent prosecution. In this case, the “fine” is paid to the attacker, posing as a gov-
ernment official or law enforcement agency. In many cases, malware continues to
operate in the background even after the ransomware has been removed. The more
prevalent type of malware simply encrypts all files on an organization’s network and
demands that a ransom be paid—usually in cryptocurrency, such as Bitcoin. After the
ransom has been paid, a key is sent to the organization to decrypt files on the com-
puters. Ransomware has become so sophisticated that it can check for backups on a
network and may also encrypt backed-up files.
Scareware is a category of software that attempts to scare users. Generally, this type
of attack uses a banner on a website that warns users that their computer has been
infected with malware. A false report showing that a scan has detected malware run-
ning on a computer may display, and the users are instructed to download a malware
removal tool. The download can contain malware and subsequently lock the users’
files or computer.
These are only a few examples of computer attacks, and attackers are coming up
with new methods every day. It is a security professional’s responsibility to stay
aware of the newest trends in this area. If a new method of attack is discovered, secu-
rity professionals should take measures to make end users aware of the new attack
as soon as possible. In addition, security professionals should ensure that security
awareness training is updated to include any new attack methods. End-user educa-
tion is one of the best ways to mitigate these attacks.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
44 CISSP Cert Guide
■ Civil/tort law
■ Administrative/regulatory law
■ Customary law
■ Religious law
■ Mixed law
Civil Law
Civil law, also sometimes known as civil code law, developed in Europe, is based on
written laws. It is a rule-based law and does not rely on precedence in any way. The
most common legal system in the world, civil code law does not require lower courts
to follow higher court decisions.
NOTE Do not confuse the civil code law of Europe with the United States civil/
tort laws.
Common Law
Common law, developed in England, is based on customs and precedent because no
written laws were available. Common law reflects on the morals of the people and
relies heavily on precedence. In this system, the lower court must follow any prec-
edents that exist due to higher court decisions. This type of law is still in use today
in the United Kingdom, the United States, Ireland, India, New Zealand, Australia,
Canada, and the West Indies.
Today, common law uses a jury-based system, which can be waived so that the case
is decided by a judge. Common law is divided into three systems: criminal law, civil/
tort law, and administrative/regulatory law.
Criminal Law
Criminal law covers any actions that are considered harmful to others. It deals with
conduct that violates public protection laws. But the prosecution must prove guilt
beyond a reasonable doubt. The plaintiff is usually the civil body, such as the state or
federal government, that establishes the law that is violated. In criminal law, guilty
parties might be imprisoned and/or fined. Criminal law is based on common law
and statutory law. Statutory law is handed down by federal, state, or local legislative
bodies.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 45
Civil/Tort Law
Civil/tort law deals with wrongs that have been committed against an individual or
organization. A defendant is liable for damages to the victim (plaintiff) if the defen-
dant had a duty of care to the victim, breached that duty (was negligent), and was
the actual cause of harm to the victim. Under civil law, the victim is entitled to seek
compensatory, punitive, and statutory damages. Compensatory damages are those
that compensate the victim for losses. Punitive damages are those that are handed
down by juries to punish the liable party. Statutory damages are those that are based
on damages established by laws.
In civil law, the liable party has caused injury to the victim. Civil laws include
economic damages, liability, negligence, intentional damage, property damage,
personal damage, nuisance, and dignitary torts.
In the United States, civil law allows senior officials of an organization to be held
liable for any civil wrongdoing by the organization. So if an organization is negli-
gent, the senior officials can be pursued by any parties that were wronged.
Administrative/Regulatory Law
In administrative law, standards of performance or conduct are set by government
agencies for organizations and industries to follow. Common sectors that are cov-
ered by administrative or regulatory law include public utilities, communications,
banking, safety and environmental protection regulations, and healthcare.
Customary Law
Customary law is based on the customs of a country or region. Customary law is
not used in most systems in isolation, but rather incorporated into many mixed legal
systems, such as those used in many African countries, China, and Japan. Monetary
fines or public service is the most common form of restitution in this legal system.
Religious Law
Religious law is based on religious beliefs. Although most religious law will be based
on a particular religion and its primary written rules, cultural differences can vary
from country to country and will affect the laws that are enforced.
Mixed Law
Mixed law combines two or more of the other law types. The most often mixed law
uses civil law and common law.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
46 CISSP Cert Guide
The following sections explain these types of intellectual properties and the internal
protection of these properties.
Patent
A patent is granted to an individual or company to cover an invention that is
described in the patent’s application. When the patent is granted, only the patent
owner can make, use, or sell the invention for a period of time, usually 20 years.
Although the patent is considered one of the strongest intellectual property
protections available, the invention becomes public domain after the patent expires,
thereby allowing any entity to manufacture and sell the product.
Patent litigation is common in today’s world. Technology companies, such as Apple,
Microsoft, HP, and Google, commonly file lawsuits regarding infringement on pat-
ents (often against each other). For this reason, many companies involve a legal team
in patent research before developing new technologies. Being the first to be issued a
patent is crucial in today’s highly competitive market.
Any product that is produced that is currently undergoing the patent application
process will usually be identified with the Patent Pending seal, shown in Figure 1-9.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 47
Trade Secret
A trade secret ensures that proprietary technical or business information remains
confidential. A trade secret gives an organization a competitive edge. Trade secrets
include recipes, formulas, ingredient listings, and so on that must be protected
against disclosure. After the trade secret is obtained by or disclosed to a competitor
or the general public, it is no longer considered a trade secret.
Most organizations that have trade secrets attempt to protect these secrets using
nondisclosure agreements (NDAs). These NDAs must be signed by any entity that
has access to information that is part of the trade secret. Anyone who signs an NDA
will suffer legal consequences if the organization is able to prove that the signer
violated it.
Trademark
A trademark ensures that a symbol, sound, or expression that identifies a product or
an organization is protected from being used by another organization. This trade-
mark allows the product or organization to be recognized by the general public.
Most trademarks are marked with one of the designations shown in Figure 1-10.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
48 CISSP Cert Guide
If the trademark is not registered, an organization should use a capital TM. If the
trademark is registered, an organization should use a capital R that is encircled.
Copyright
A copyright ensures that a work that is authored is protected for any form of repro-
duction or use without the consent of the copyright holder, usually the author
or artist who created the original work. A copyright lasts longer than a patent.
Although the U.S. Copyright Office has several guidelines to determine the amount
of time a copyright lasts, the general rule for works created after January 1, 1978, is
the life of the author plus 70 years.
In 1996, the World Intellectual Property Organization (WIPO) standardized the
treatment of digital copyrights. Copyright management information (CMI) is licens-
ing and ownership information that is added to any digital work. In this standardiza-
tion, WIPO stipulated that CMI included in copyrighted material cannot be altered.
The symbol shown in Figure 1-11 denotes a work that is copyrighted.
Internal Protection
As mentioned earlier in this chapter, employees are the greatest threat for any orga-
nization. For this reason, organizations should take measures to protect confidential
resources from unauthorized internal access. Any information that is part of a pat-
ent, trade secret, trademark, or copyright should be marked and given the appropri-
ate classification. Access controls should be customized for this information, and
audit controls should be implemented that alert personnel should any access occur.
Due care procedures and policies must be in place to ensure that any laws that pro-
tect these assets can be used to prosecute offenders.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
50 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 51
NOTE Going dark means that those charged with protecting people are not always
able to access the evidence needed to prosecute crime and prevent terrorism even
with lawful authority. Although they have the legal authority to intercept and access
communications and information pursuant to court order, law enforcement officials
often lack the technical ability to do so.
Import/Export Controls
Many organizations today develop trade relationships with organizations that are
located in other countries. Organizations must be aware of the export and import
laws of the countries of both the source and destination countries. Encryption tech-
nologies are some of the most restricted technologies in regard to import and export
laws. Although the United States does limit the export of encryption technologies
for national security reasons, other countries, such as China and Russia, limit the
import of these same technologies because the countries do not want their citizens
to have access to them. Publicly available technology and software are exempt from
most export laws, except for encryption technologies.
Any organization that engages in export and import activities with entities based in
other countries should ensure that legal counsel is involved in the process so that all
laws and regulations are followed. In addition, the organization should implement
the appropriate controls to ensure that personnel do not inadvertently violate any
import and export laws, regulations, or internal corporate policies.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
52 CISSP Cert Guide
Cloud computing presents its own risks because often it is hard to determine exactly
where the data is stored. Organizations that store data in the cloud should work
with their cloud service providers to ensure that all application laws and regulations
regarding the security and privacy of data are followed.
Privacy
Privacy is the right of individuals to control the use of their personal information.
When considering technology and its use today, privacy is a major concern for users.
This privacy concern usually covers three areas: what personal information can be
shared with whom, whether messages can be exchanged confidentially, and whether
and how messages can be sent anonymously. Privacy is an integral part of any secu-
rity measures that an organization takes.
As part of the security measures that organizations must take to protect privacy, PII
must be understood, identified, and protected. Organizations must also understand
the privacy laws that governments have adopted. Finally, organizations must ensure
that they comply with all laws and regulations regarding privacy.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 53
NOTE As a CISSP candidate, you should ensure that you understand privacy laws
and import/export/trans-border data flow regulations.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
54 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 55
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
56 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 57
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
58 CISSP Cert Guide
3. Consumer Access and Editing: Individuals have the right to access personal
information being collected about them and can dispute any erroneous data.
4. Transfer of Personal Data: Consent from customers must be obtained before
sensitive information is transferred to another party, and the organization must
ensure that recipients have similar standards for data privacy.
5. Security: An organization must maintain best practices in terms of security.
However, the guidelines on what exemplifies best practices are not clearly
outlined.
Basel II
Basel II affects financial institutions. It addresses minimum capital requirements,
supervisory review, and market discipline. Its main purpose is to protect against risks
that banks and other financial institutions face. It is an international accord, and
compliance is not mandatory.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 59
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
60 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 61
NOTE Do not confuse the term safe harbor with data haven. According to the EU, a
safe harbor is an entity that conforms to all the requirements of the EU Principles on
Privacy. A data haven is a country that fails to legally protect personal data with the
main aim being to attract companies engaged in the collection of the data.
The Safe Harbor Privacy Principles were replaced by the EU-U.S. Privacy Shield. It
provided a framework for transatlantic personal data exchanges for commercial pur-
poses between the European Union and the United States.
The EU Electronic Security Directive defines electronic signature principles. In this
directive, a signature must be uniquely linked to the signer and to the data to which
it relates so that any subsequent data change is detectable. The signature must be
capable of identifying the signer.
Beginning on May 25, 2018, the members of the EU began applying the General
Data Protection Regulation (GDPR). The GDPR applies to EU-based organiza-
tions that collect or process the personal data of EU residents and to organizations
outside the EU that monitor behavior or offer goods and services to EU residents.
It gives a wider definition of personal and sensitive data to include online identifiers
and genetic and biometrics data, such as cookies, IP address, health information,
biometric data, and genetic information. The GDPR affects service providers that
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
62 CISSP Cert Guide
Investigation Types
Security professionals are called on to investigate any incidents that occur. As a
result of the different assets that are affected, security professionals must be able
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 63
Operations/Administrative
Administrative investigations are investigations that do not result in any criminal,
civil, or regulatory issue. Administrative investigations can also be referred to as
operations investigations. In most cases, this type of investigation is completed to
determine the root cause of an incident so that steps can be taken to prevent this
incident from occurring again in the future. This process is referred to as root-cause
analysis (RCA). Because no criminal, civil, or regulatory law has been violated, it is
not as important to document the evidence. However, security professionals should
still take measures to document the lessons learned.
As an example of this type of investigation, a user is assigned permissions that were
not based on the job role. If this was the result of criminal misconduct, then a crimi-
nal investigation should occur. However, this assignment of permissions could have
occurred simply through mistakes made by personnel. Because a security profes-
sional would not know the cause of these unjustified permissions, they would need
to conduct the investigation using community-accepted forensic protocols in case
this evidence would need to be admissible in court one day. If determined that
an incident was the result of an accident, forensic protocols would not need to be
adhered to. Any individual who carries out this type of investigation must ensure
that the appropriate changes are made to prevent such an incident from occurring
again, including putting in place security controls. In the case of the inappropri-
ate permissions example, the security professional might find that the user account
template that was used to create the user account was assigned to an inappropriate
group and must therefore ensure that the user account template is revised.
Criminal
Criminal investigations are investigations that are carried out because a federal,
state, or local law has been violated. In this type of investigation, an organization
should ensure that law enforcement is involved in the investigation as early as pos-
sible to ensure that the crime can be properly documented, investigated, and pros-
ecuted. Criminal investigations result in a criminal trial. In a criminal trial, a jury
must unanimously decide, beyond a reasonable doubt, whether the defendant is
guilty. The judge will determine sentencing if a jury’s verdict is guilty.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
64 CISSP Cert Guide
Civil
In a civil trial, a case is brought by an individual or organization (including corpo-
rations and the government), referred to as the plaintiff, against an individual or
organization.
Civil trials generally involve disputes over money. If successful, the plaintiff is
awarded money by the jury. A civil trial identifies whether an entity failed to act rea-
sonably and prudently under a certain set of circumstances. The standard that needs
to be met to win a civil trial is referred to as preponderance of the evidence. This
means that most of the evidence presented indicates which party was in the right
and which party was in the wrong. In a criminal trial, the burden of proof is on the
prosecution to prove that the defendant is guilty. In a civil trial, the burden of proof
begins with the plaintiff.
Regulatory
A regulatory investigation occurs when a regulatory body investigates an organi-
zation for a regulatory infraction. In recent history, the Securities and Exchange
Commission (SEC) has carried out many regulatory investigations regarding organi-
zations and their financial dealings. No matter which regulatory body is performing
the investigation, the organization being investigated will be notified that an investi-
gation is being carried out. The organization should have policies and guidelines in
place to ensure full compliance with the investigation. Failure to comply with such
an investigation can result in charges being filed against the organization and any
personnel involved.
Industry Standards
As defined earlier, standards provide criteria within an industry relating to the stan-
dard functioning and carrying out of operations in their respective fields of produc-
tion. In digital forensics, standards provide the generally accepted requirements
followed by digital investigators.
Organizations should investigate the digital forensics standards available, including
those from NIST and ISO/IEC. NIST SP 800-86 provides guidelines to integrating
forensic techniques into incident response.
To establish an organizational forensic capability, NIST SP 800-86 provides the
following guidelines:
■ Organizations should have a capability to perform computer and network
forensics.
■ Organizations should determine which parties should handle each aspect of
forensics.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 65
According to NIST SP 800-86, the basic phases of the forensic process are collec-
tion, examination, analysis, and reporting. This process differs slightly from the one
reported earlier. In some cases, the first two steps presented earlier (identification
and preservation) are considered part of incident response but not part of the foren-
sic process itself. However, the four phases in NIST SP 800-86 correspond to steps
3 to 7 of the earlier process. Figure 1-13 shows the forensic process as it transforms
media into evidence, whether evidence is needed for law enforcement or for an
organization’s internal usage.
During collection, data related to a specific event is identified, labeled, recorded, and
collected, and its integrity is preserved. In the second phase, examination, forensic
tools and techniques appropriate to the types of data that were collected are exe-
cuted to identify and extract the relevant information from the collected data while
protecting its integrity. Examination may use a combination of automated tools and
manual processes. The next phase, analysis, involves analyzing the results of the
examination to derive useful information that addresses the questions that were the
impetus for performing the collection and examination. The final phase involves
reporting the results of the analysis, which may include describing the actions per-
formed, determining what other actions need to be performed, and recommending
improvements to policies, guidelines, procedures, tools, and other aspects of the
forensic process.
The key recommendations for the forensic process are as follows:
■ Organizations should perform forensics using a consistent process.
■ Analysts should be aware of the range of possible data sources.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
66 CISSP Cert Guide
NIST SP 800-86 provides guidelines for using data from data files, operating
systems, network traffic, and applications. The key recommendations presented for
using data from data files are as follows:
■ Analysts should examine copies of files, not the original files.
■ Analysts should preserve and verify file integrity.
■ Analysts should rely on file headers, not file extensions, to identify file content
types.
■ Analysts should have a forensic toolkit for data examination and analysis.
The key recommendations presented for using data from OSs are as follows:
■ Analysts should act appropriately to preserve volatile OS data.
■ Analysts should use a forensic toolkit for collecting volatile OS data.
■ Analysts should choose the appropriate shutdown method for each system.
The key recommendations presented for using data from network traffic are as
follows:
■ Organizations should have policies regarding privacy and sensitive
information.
■ Organizations should provide adequate storage for network activity-related
logs.
■ Organizations should configure data sources to improve the collection of
information.
■ Analysts should have reasonably comprehensive technical knowledge.
■ Analysts should consider the fidelity and value of each data source.
■ Analysts should generally focus on the characteristics and impact of the event.
The key recommendations presented for using data from applications are as follows:
■ Analysts should consider all possible application data sources.
■ Analysts should bring together application data from various sources.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 67
The key recommendations presented for using data from multiple sources are as
follows:
■ Analysts can handle many situations most effectively by analyzing several
individual data sources and then correlating events among them.
■ Organizations should be aware of the technical and logistical complexity of
analysis.
eDiscovery
Electronic discovery (eDiscovery) refers to civil litigation or government investiga-
tions that deal with the exchange of information in electronic format as part of the
discovery process. It involves electronically stored information (ESI) and includes
emails, documents, presentations, databases, voicemail, audio and video files, social
media, and websites. Security professionals should ensure that the original content
and metadata of ESI are preserved to prevent claims of spoliation or tampering with
evidence later in the litigation. After the appropriate ESI is collected, it must be held
in a secure environment for review.
Professional Ethics
Ethics for any profession are the right and wrong actions that are the moral princi-
ple of that occupation. Security professionals, particularly those who hold the CISSP
certification, should understand the ethics that are published by the International
Information Systems Security Certification Consortium (ISC)2, the Computer Eth-
ics Institute, the Internet Architecture Board (IAB), and the organization they are
employed by.
An organization and its employees must understand, adhere to and promote
professional ethics. The following sections provide ethics guidance for security
professionals.
CISSP certificate holders are required to report any actions by other certificate
holders that they feel are in violation of the Code. If a certificate holder is reported,
a peer review committee will investigate the actions and make a decision as to the
certificate holder’s standing.
Certification is a privilege that must be earned and maintained. Certificate holders
are expected to complete certain educational requirements to prove their continued
competence in all aspects of security. They are also expected to promote the under-
standing and acceptance of prudent information security measures.
6. Do not install and use licensed software unless you have paid for it.
7. Do not use another person’s computer unless you have permission or have paid
the appropriate compensation for said usage.
8. Do not appropriate another person’s intellectual output.
9. Consider the consequences of the program you are writing or the system you
are designing.
10. Always use a computer in ways that ensure consideration and respect of other
people and their property.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 69
Ethics statements issued by the IAB usually detail any acts that they deem irrespon-
sible. These actions include wasting resources, destroying data integrity, compromis-
ing privacy, and accessing resources that users are not authorized to access.
Request for Comments (RFC) 1087, called “Ethics and the Internet”, is the
specific IAB document that outlines unethical Internet behavior. Refer to
https://datatracker.ietf.org/doc/html/rfc1087 for more information.
Security Documentation
Within an organization, information security governance consists of several
documents that are used to provide comprehensive security management. Data and
other assets should be protected mainly based on their value and sensitivity. Strate-
gic plans guide the long-term security activities (3–5 years or more). Tactical plans
achieve the goals of the strategic plan and are shorter in length (6–18 months).
Because management is the most critical link in the computer security chain, man-
agement approval must be obtained as part of the first step in forming and adopting
an information security policy. Senior management must complete the following
steps prior to the development of any organizational security policy:
1. Define the scope of the security program.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
70 CISSP Cert Guide
After senior management approval has been obtained, the first step in establishing
an information security program is to adopt an organizational information security
statement. The organization’s security policy comes from this organizational infor-
mation security statement. The security planning process must define how security
will be managed, who will be responsible for setting up and monitoring compliance,
how security measures will be tested for effectiveness, who is involved in establishing
the security policy, and where the security policy is defined.
Security professionals must understand how information security documents work
together to form a comprehensive security plan. Information security governance
documents include
■ Policies
■ Processes
■ Procedures
■ Standards
■ Guidelines
■ Baselines
Policies
A security policy dictates the role of security as provided by senior management and
is strategic in nature, meaning that it provides the end result of security. Policies are
defined in two ways: the level in the organization at which they are enforced and the
category to which they are applied. Policies must be general in nature, meaning they
are independent of a specific technology or security solution. Policies outline goals
but do not give any specific ways to accomplish the stated goals. All policies must
contain an exception area to ensure that management will be able to deal with situa-
tions that might require exceptions.
Policies are broad and provide the foundation for development of processes, stan-
dards, baselines, guidelines, and procedures, all of which provide the security struc-
ture. Administrative, technical, and physical access controls fill in the security and
structure needed to complete the security program.
The policy levels used in information security are organizational security policies,
system-specific security policies, and issue-specific security policies. The policy cat-
egories used in information security are regulatory security policies, advisory secu-
rity policies, and informative security policies. The policies are divided as shown in
Figure 1-14.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 71
Policies
Levels of Categories of
Policies Policies
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
72 CISSP Cert Guide
Policy Categories
Regulatory security policies address specific industry regulations, including
mandatory standards. Examples of industries that must consider regulatory security
policies include healthcare facilities, public utilities, and financial institutions.
Advisory security policies provide instruction on acceptable and unacceptable
activities. In most cases, this policy is considered to be strongly suggested, not
compulsory. This type of policy usually gives examples of possible consequences if
users engage in unacceptable activities.
Informative security policies provide information on certain topics and act as an
educational tool. Nevertheless, policies are only as good as their implementation.
Processes
A process is a series of actions or steps taken in order to achieve a particular end.
Organizations will define individual processes and their relationship to one another.
For example, an organization may define a process for how customers enter an
online order, how the payment is processed, and how the order is fulfilled after the
payment is processed. Although each of these processes is separate and includes a
list of unique tasks that must be completed, the processes all rely on each other for
completion. The process lays out how the goal or task is completed. Processes then
lead to procedures.
Procedures
Procedures embody all the detailed actions that personnel are required to follow and
encompass the use of computers and other devices. Procedures often include step-
by-step lists on how processes, policies, standards, and guidelines are implemented.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 73
Standards
Standards describe how policies will be implemented within an organization. They
are mandatory actions or rules that are tactical in nature, meaning they provide the
steps necessary to achieve security. Just like policies, standards should be regularly
reviewed and revised.
Guidelines
Guidelines are recommended actions that are much more flexible than standards,
thereby providing allowance for circumstances that can occur. Guidelines provide
guidance when standards do not apply.
Baselines
A baseline is a reference point that is defined and captured to be used as a future
reference. Although capturing baselines is important, using those baselines to assess
the security state is just as important. Even the most comprehensive baselines are
useless if they are never used.
Capturing a baseline at the appropriate point in time is also important. Baselines
should be captured when a system is properly configured and fully updated. When
updates occur, new baselines should be captured and compared to the previous
baselines. At that time, adopting new baselines based on the most recent data might
be necessary.
Business Continuity
Business continuity is an organization’s capability to continue delivery of products
or services at acceptable predefined levels following a disruptive incident. As part
of risk management, security professionals should ensure that the organization pre-
pares appropriate business continuity plans. The following sections cover business
continuity and disaster recovery concepts, business continuity scope and plan, and
business impact analysis.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
74 CISSP Cert Guide
Disruptions
A disruption is typically any unplanned event that results in the temporary interrup-
tion of any organizational asset, including processes, functions, and devices. Disrup-
tions are grouped into three main categories: nondisaster, disaster, and catastrophe.
Nondisasters are temporary interruptions that occur due to malfunction or failure.
Nondisasters might or might not require public notification and are much easier to
recover from than disasters or catastrophes.
A disaster is a suddenly occurring event that has a long-term negative impact on life.
Disasters require that the organization publicly acknowledge the event and provide
the public with information on how the organization will recover. Disasters require
more effort for recovery than nondisasters but less than catastrophes.
A catastrophe is a disaster that has a much wider and much longer impact. In most
cases, a disaster is considered a catastrophe if facilities are destroyed, thereby result-
ing in the need for the rebuilding of the facilities and the use of a temporary offsite
facility.
Disasters
A disaster is an emergency that goes beyond the normal response of resources. A
disaster usually affects a wide geographical area and results in severe damage, injury,
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 75
loss of life, and loss of property. Any disaster has negative financial and reputational
effects on the organization. The severity of the financial and reputational damage
is also affected by the amount of time the organization takes to recover from the
disaster.
The causes of disasters are categorized into three main areas according to origin:
technological disasters, man-made disasters, and natural disasters. A disaster is
officially over when all business elements have returned to normal function at the
original site. The primary concern during any disaster is personnel safety.
Technological Disasters
Technological disasters occur when a device fails. This failure can be the result of
device defects, incorrect implementation, incorrect monitoring, or human error.
Technological disasters are not always intentional. If a technological disaster is not
recovered from in a timely manner, an organization might suffer a financial collapse.
If a disaster occurs because of a deliberate attack against an organization’s infra-
structure, the disaster is considered a man-made disaster even if the attack is against
a specific device or technology. In the past, all technological disasters were actually
considered man-made disasters because technological disasters are usually due to
human error or negligence. However, in recent years, experts have started categoriz-
ing technological disasters separately from man-made disasters, although the two are
closely related.
Man-Made Disasters
Man-made disasters occur through human intent or error. Man-made disasters
include enemy attacks, bombings, sabotage, arson, terrorism, strikes or other job
actions, infrastructure failures, personnel unavailability due to emergency evacua-
tion, and mass hysteria. In most cases, man-made disasters are intentional.
Natural Disasters
Natural disasters occur because of a natural hazard. Natural disasters include flood,
tsunami, earthquake, hurricane, tornado, and other such natural events. A fire that is
not the result of arson is also considered a natural disaster.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
76 CISSP Cert Guide
Contingency Plan
A contingency plan is sometimes referred to as “Plan B” because it can be also used
as an alternative for action if expected results fail to materialize. Contingency plan-
ning is a component of business continuity, disaster recovery, and risk management.
Contingency planning is covered in more detail in the “Business Contingency Plan-
ning” section later in this chapter.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 77
Availability
Availability is one of the key principles of the confidentiality, integrity, and
availability (CIA) triad and will be discussed in almost every defined CISSP
domain. Availability is a main component of business continuity planning. The
organization must determine the acceptable level of availability for each function
or system. If the availability of a resource falls below this defined level, then specific
actions must be followed to ensure that availability is restored.
With regard to availability, most of the unplanned downtime of functions and sys-
tems is attributed to hardware failure. Availability places emphasis on technology.
Reliability
Reliability is the ability of a function or system to consistently perform according to
specifications. It is vital in business continuity to ensure that the organization’s pro-
cesses can continue to operate. Reliability places emphasis on processes.
Personnel Components
The most important personnel in the development of the BCP is senior manage-
ment. Senior management support of business continuity and disaster recovery
drives the overall organizational view of the process. Without senior management
support, this process will fail.
Senior management sets the overall goals of business continuity and disaster recov-
ery. A business continuity coordinator should be named by senior management and
lead the BCP committee. The committee develops, implements, and tests the BCP
and DRP. The BCP committee should contain a representative from each business
unit. At least one member of senior management should be part of this committee.
In addition, the organization should ensure that the IT, legal, security, and com-
munications departments are represented because of the vital role that these depart-
ments play during and after a disaster.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
78 CISSP Cert Guide
With management direction, the BCP committee must work with business units to
ultimately determine the business continuity and disaster recovery priorities. Senior
business unit managers are responsible for identifying and prioritizing time-critical
systems. After all aspects of the plans have been determined, the BCP committee
should be tasked with regularly reviewing the plans to ensure they remain current
and viable. Senior management should closely monitor and control all business con-
tinuity efforts and publicly praise any successes.
After an organization gets into disaster recovery planning, other teams are involved.
Personal safety is always the priority.
Scope
To ensure that the development of the BCP is successful, senior management must
define the BCP scope. A business continuity project with an unlimited scope can
often become too large for the BCP committee to handle correctly. For this reason,
senior management might need to split the business continuity project into smaller,
more manageable pieces.
When considering splitting the BCP into pieces, an organization might want to split
the pieces based on geographic location or facility. However, an enterprisewide BCP
should be developed that ensures compatibility of the individual plans.
Figure 1-15 shows a more detailed listing of the tasks included in SP 800-34 R1.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 79
Conduct
Develop Identify Create Develop Plan Testing,
Business Plan
Contingency Preventive Contingency Contingency Training, and
Impact Maintenance
Planning Policy Controls Strategies Plan* Exercises
Analysis
• Identify • Determine • Identify • Backup and • Document • Plan Testing • Review and
Statutory or Business Controls Recovery Recovery Update Plan
• Train
Regulatory Processes Strategy
• Implement • Consider Personnel • Coordinate
Requirements and Recovery Controls FIPS 199 with Internal/
Criticality • Plan
• Develop IT External
• Maintain • Identify Roles Exercises
Contingency • Identify Outage Organizations
Controls and
Planning Impacts and • TT&E
Responsibilities • Control
Policy Estimated Activities
Distribution
Statement Downtime • Address
Alternate Site • Document
• Reflect FIPS • Identify Changes
199 Resource • Identify
Requirements Equipment
• Publish Policy
and Cost
• Identify Considerations
Recovery
Priorities for • Integrate into
System System
Architecture
NIST 800-34 Rev. 1 includes the following types of plans that should be included
during contingency planning:
■ Business continuity plan (BCP): Focuses on sustaining an organization’s mis-
sion/business processes during and after a disruption.
■ Continuity of operations plan (COOP): Focuses on restoring an organization’s
mission-essential functions (MEFs) at an alternate site and performing those
functions for up to 30 days before returning to normal operations.
■ Crisis communications plan: Documents standard procedures for internal and
external communications in the event of a disruption using a crisis communi-
cations plan. It also provides various formats for communications appropriate
to the incident.
■ Critical infrastructure protection (CIP) plan: Provides a set of policies and
procedures that serve to protect and recover these assets and mitigate risks and
vulnerabilities.
■ Cyber incident response plan: Establishes procedures to address cyberattacks
against an organization’s information system(s).
■ Disaster recovery plan (DRP): Documents an information system–focused
plan designed to restore operability of the target system, application, or
computer facility infrastructure at an alternate site after an emergency.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
80 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 81
Where feasible and cost effective, preventive methods are preferable to actions that
may be necessary to recover the system after a disruption.
BIA Development
The BCP development depends most on the development of the BIA. The BIA
helps the organization to understand what impact a disruptive event would have on
the organization. This management-level analysis identifies the impact of losing an
organization’s resources.
The four main steps of the BIA are as follows:
1. Identify critical processes and resources.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
82 CISSP Cert Guide
The BIA relies heavily on any vulnerability analysis and risk assessment that is com-
pleted. The vulnerability analysis and risk assessment may be performed by the BCP
committee or by a separately appointed risk assessment team. The risk assessment
process is discussed later in the NIST “SP 800-30 Rev. 1” section.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 83
■ Recovery time objective (RTO): The time period after a disaster or disruptive
event within which a resource or function must be restored to avoid unaccept-
able consequences. RTO assumes that an acceptable period of downtime exists.
RTO should be smaller than MTD.
■ Work recovery time (WRT): The amount of time that is needed to verify
system and/or data integrity.
■ Recovery point objective (RPO): The maximum targeted period in which data
might be lost from an IT service due to a major incident.
Figure 1-16 provides a graphical representation of RPO and RTO. A data center
can be impacted by a bad server upgrade, a cyberattack, a power outage, or another
disaster. The organization is then reliant on a data backup. How quickly an orga-
nization can get back up and running depends on two factors: (1) recovery point
objective (RPO), which is the amount of data loss since the last backup, and (2)
recovery time objective (RTO), which is the amount of time required to recover the
data since the last backup. To summarize, RTO is the amount of data that an organi-
zation can lose, whereas RPO is the length of time that a business can be inoperable.
RPO RTO
Lost Data Downtime
(Min, Hours) (Min, Hours)
Time
Figure 1-16 Recovery Point Objective (RPO) and Recovery Time Objective (RTO)
Each organization must develop its own documented criticality levels. A good exam-
ple of organizational resource and function criticality levels includes critical, urgent,
important, normal, and nonessential. Critical resources are those resources that are
most vital to the organization’s operation and should be restored within minutes
or hours of the disaster or disruptive event. Urgent resources should be restored
within 24 hours but are not considered as important as critical resources. Important
resources should be restored within 72 hours but are not considered as important as
critical or urgent resources. Normal resources should be restored within 7 days but
are not considered as important as critical, urgent, or important resources. Nones-
sential resources should be restored within 30 days.
Each process, function, and resource must have its criticality level defined to act as
an input into the DRP. If critical priority levels are not defined, a DRP might not be
operational within the timeframe the organization needs to recover.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
84 CISSP Cert Guide
NOTE Keep in mind that the priority for any CISSP should be the safety of human
life. Consider and protect all other organizational resources only after personnel
are safe.
The organization must document the resource requirements for every resource that
would need to be restored when the disruptive event occurs. These requirements
include device name, operating system or platform version, hardware requirements,
and device interrelationships.
Recoverability
Recoverability is the ability of a function or system to be recovered in the event of a
disaster or disruptive event. As part of recoverability, downtime must be minimized.
Recoverability places an emphasis on the personnel and resources used for recovery.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 85
Fault Tolerance
Fault tolerance is provided when a backup component begins operation when the
primary component fails. One of the key aspects of fault tolerance is the lack of
service interruption.
Varying levels of fault tolerance can be achieved at most levels of the organization
based on how much an organization is willing to spend. However, the backup com-
ponent often does not provide the same level of service as the primary component.
For example, an organization might implement a high-speed gigabit connection
to the Internet. However, the backup connection to the Internet that is used in the
event of the failure of the gigabit line might be much slower but at a much lower
cost of implementation than the primary connection.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
86 CISSP Cert Guide
are no time restrictions on criminal history. Employers need to search state and
county criminal records, sex and violent offender records, and prison records. Many
companies provide such services for a fee.
Work history should be verified. Former employers should be contacted to confirm
dates employed, positions, performance, and reason for leaving. However, security
professionals should keep in mind that some companies will verify only the employ-
ment term.
A background investigation should research any claim made on applicants’ applica-
tions or resumes. Verification of the applicants’ claims serves to protect the hiring
organization by ensuring that the applicants hold the skills and experience that they
claim to have. Employees should also be reinvestigated based on their employment
level. For example, employees with access to financial data and transactions should
undergo periodic credit checks.
Credit history ensures that personnel who are involved in financial transactions
for the organization will not be risks for financial fraud. The FCRA and Equal
Employment Opportunity Commission (EEOC) provide guidelines that can help
human resources personnel in this area. In addition, it is a good idea to involve legal
counsel.
Driving records are necessary if the applicant will be operating a motor vehicle as
part of their job. Often this type of check for other applicants can help reveal life-
style issues, such as driving under the influence or license suspension, that can cause
employment problems later.
Substance-abuse testing will reveal to the employer any drug use. Because a history
of drug use can cause productivity issues and absenteeism, it is always best to
perform such testing before offering employment. However, security professionals
should ensure that any substance testing is clearly stated as part of the job posting.
Two types of reference checks are performed: work and personal. Work reference
checks verify employment history. Personal reference checks contact individuals
supplied by the applicants and ask questions regarding the applicants’ capabilities,
skills, and personality.
Education and licensing verification is usually fairly easy to complete. Employers
can request transcripts from educational institutions. For any licensing or certifica-
tion, the licensing or certification body can verify the license or certification held.
Social Security number verification and validation can be achieved by contacting the
Social Security Administration. Such a check ensures that the Social Security infor-
mation is accurate. The Social Security Administration will alert the organization if
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 87
the Social Security number has been misused, including if the number belongs to a
deceased person or a person in a detention facility.
Just as there are companies that can provide criminal history checks, companies
have recently started providing services to search federal and international lists of
suspected terrorists. Organizations involved in defense, aviation, technology, and
biotechnology fields should consider performing such a check for all applicants.
As any security professional knows, the sensitivity of the information that applicants
will have access to should be the biggest determining factor as to which checks to
perform. Organizations should never get lax in their pre-employment applicant
screening processes.
Organizations usually have a personnel handbook and other hiring information that
must be communicated to the employee. The hiring process should include a formal
verification that the employee has completed all the training. Employee IDs and
passwords may be issued at this time.
Code of conduct, conflict of interest, and ethics agreements should also be signed
at this time and will often be requested periodically while employed. Also, any non-
compete agreements should be verified to ensure that employees do not leave the
organization for a competitor. Employees should be given guidelines for periodic
performance reviews, compensation, and recognition of achievements.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
88 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 89
Job Rotation
Job rotation ensures that more than one person fulfills the job tasks of a single posi-
tion within an organization. This job rotation ensures that more than one person is
capable of performing those tasks, providing redundancy. It is also an important tool
in helping an organization to recognize when fraudulent activities have occurred.
Separation of Duties
Separation of duties ensures that one person is not capable of compromising orga-
nizational security. Any activities that are identified as high risk should be divided
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
90 CISSP Cert Guide
into individual tasks, which can then be allocated to different personnel or depart-
ments. When an organization implements adequate separation of duties, collusion
between two or more personnel would be required to carry out fraud against the
organization. Split knowledge, a variation of separation of duties, ensures that no
single employee knows all the details to perform a task. An example would be two
individuals knowing parts of a safe combination. Another variation is dual control,
which requires that two employees must be available to complete a specific task to
complete the job. An example is two managers being required to turn keys simulta-
neously in separate locations to launch a missile.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 91
Vulnerability
A vulnerability is a weakness. Vulnerabilities can occur in software, hardware, facili-
ties, or personnel. An example of a vulnerability is unrestricted access to a folder on
a computer. Most organizations implement a vulnerability assessment to identify
vulnerabilities.
Threat
A threat is the next logical progression in risk management. A threat occurs when a
vulnerability is identified or exploited and is a potential danger. A threat would occur
when an attacker identifies the folder on the computer that has an inappropriate or
absent ACL.
Threat Agent
A threat is carried out by a threat agent. Continuing with the example, the attacker
who takes advantage of the inappropriate or absent ACL is the threat agent. Keep in
mind, though, that threat agents can discover and/or exploit vulnerabilities. Not all
threat agents will actually exploit an identified vulnerability.
Exploit
An exploit occurs when a threat agent successfully takes advantage of a vulnerability.
Risk
A risk is the probability that a threat agent will exploit a vulnerability and the impact
if the threat is carried out. Risk is expressed in terms of the likelihood and impact
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
92 CISSP Cert Guide
of a threat event. The risk in the vulnerability example would be fairly high if the
data residing in the folder is confidential. However, if the folder contains only pub-
lic data, then the risk would be low. Identifying the potential impact of a risk often
requires security professionals to enlist the help of subject matter experts.
Exposure
An exposure occurs when an organizational asset is exposed to losses. If the folder
with the inappropriate or absent ACL is compromised by a threat agent, the organi-
zation is exposed to the possibility of data exposure and loss.
Countermeasure
A control (sometimes called a countermeasure or safeguard) is a tactic, mechanism,
or strategy that accomplishes one or more of the following:
■ Reduces or eliminates a vulnerability
■ Reduces or eliminates the likelihood that a threat agent will be able to exploit
a vulnerability
■ Reduces or eliminates the impact of an exploit
Risk Appetite
Risk appetite is the level of risk an organization is prepared to accept. The risk appe-
tite for an organization can only be defined based on the organization’s needs, and
risk appetites will vary from organization to organization.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 93
Threat
agent Dis
ts cov
ec ers
Aff
Safeguard Threat
Explo
Needs
its
Exposure Vulnerability
ps
lo
Ca
ve
us
De
es
Assets Risks
Damages
Attack
An attack is any event that violates an organization’s security or privacy policies.
Another word for an attack is an incident. It is important that all attacks are docu-
mented and fully analyzed so that the organization can take measures to prevent
the attack from happening again. The measures that are taken can also prevent the
attack from becoming a breach in the future.
Breach
A breach is an attack that has been successful in reaching its goal. Often, a breach of
an organization’s data constitutes a security incident that the organization is legally
required to report to affected individuals, regulatory agencies, and sometimes credit
reporting agencies and media. It is vital that an organization quickly and effectively
responds when an incident does escalate into a data breach. When a data breach has
occurred, security professionals should, at minimum, quantify the damage and deter-
mine the response.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
94 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 95
Risk Assessment
A risk assessment is a tool used in risk management to identify vulnerabilities and
threats, assess the impact of those vulnerabilities and threats, and determine which
controls to implement. Risk assessment or analysis has four main goals:
■ Identify assets and asset value.
■ Identify vulnerabilities and threats.
■ Calculate threat probability and business impact.
■ Balance threat impact with countermeasure cost.
Prior to starting the risk assessment, management and the risk assessment team must
determine which assets and threats to consider. This process determines the size of
the project. The risk assessment team must then provide a report to management
on the value of the assets considered. Management can then review and finalize the
asset list, adding and removing assets as it sees fit, and then determine the budget of
the risk assessment project.
If a risk assessment is not supported and directed by senior management, it will not
be successful. Management must define the risk assessment’s purpose and scope and
allocate the personnel, time, and monetary resources for the project.
As you will later learn, the NIST Special Publication 800-30 Rev. 1 provides
guidelines for conducting a risk assessment on federal information systems and
organizations.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
96 CISSP Cert Guide
After determining the value of the assets, you should determine the vulnerabilities
and threats to each asset.
When the vulnerabilities and threats have been identified, the loss potential for each
must be determined. This loss potential is determined by using the likelihood of
the event combined with the impact that such an event would cause. An event with
a high likelihood and a high impact would be given more importance than an event
with a low likelihood and a low impact. Different types of risk analysis, including
quantitative risk analysis and qualitative risk analysis, should be used to ensure that
the data that is obtained is maximized.
Risk Assessment/Analysis
After the risk analysis team is formed, it is time to actually start the risk analysis or
assessment process. This process includes two different types of risk analysis: quanti-
tative risk analysis and qualitative risk analysis.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 97
impact, safeguard costs, and so on. Equations are used to determine total and
residual risks. The most common equations are for single loss expectancy (SLE) and
annual loss expectancy (ALE).
The SLE is the monetary impact of each threat occurrence. To determine the SLE,
you must know the asset value (AV) and the exposure factor (EF). The EF is the
percent value or functionality of an asset that will be lost when a threat event occurs.
The calculation for obtaining the SLE is as follows:
SLE = AV × EF
For example, an organization has a web server farm with an AV of $20,000. If the
risk assessment has determined that a power failure is a threat agent for the web
server farm and the exposure factor for a power failure is 25 percent, the SLE for
this event equals $20,000 × 0.25 = $5,000.
The ALE is the expected risk factor of an annual threat event. To determine the
ALE, you must know the SLE and the annualized rate of occurrence (ARO). The
ARO is the estimate of how often a given threat might occur annually. The calcula-
tion for obtaining the ALE is as follows:
Using the previously mentioned example, if the risk assessment has determined that
the ARO for the power failure of the web server farm is 50 percent, the ALE for this
event equals $5,000 × 0.5 = $2,500. Security professionals should keep in mind that
this calculation can be adjusted for different geographical locations. For example,
a DNS server located in a small town may have a higher risk of power outage than
one in a large city.
Using the ALE, the organization can decide whether to implement controls or not.
If the annual cost of the control to protect the web server farm is more than the
ALE, the organization could easily choose to accept the risk by not implementing
the control. If the annual cost of the control to protect the web server farm is less
than the ALE, the organization should consider implementing the control.
Keep in mind that even though quantitative risk analysis uses numeric value, a
purely quantitative analysis cannot be achieved because some level of subjectivity is
always part of the data. In this example, how does the organization know that dam-
age from the power failure will be 25 percent of the asset? This type of estimate
should be based on historical data, industry experience, current and future condi-
tions, and expert opinion.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
98 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 99
To complete this equation, you must know the revised ALE after the safeguard is
implemented. Implementing a safeguard can improve the ARO but will not com-
pletely do away with it. In the example mentioned earlier in the “Quantitative Risk
Analysis” section, the ALE for the event is $2,500. Let’s assume that implementing
the safeguard reduces the ARO to 10 percent, so the ALE after the safeguard is cal-
culated as $5,000 × 10% or $500. You could then calculate the safeguard value for a
control that costs $1,000 as follows:
Knowing the corrected ARO after the safeguard is implemented is necessary for
determining the safeguard value. A legal liability exists if the cost of the safeguard is
less than the estimated loss that would occur if the threat is exploited.
Maintenance costs of safeguards are not often fully considered during this process.
Organizations should fully research the costs of maintaining safeguards. New staff
or extensive staff training often must occur to properly maintain a new safeguard.
In addition, the cost of the labor involved must be determined. So the cost of a
safeguard must include the actual cost to implement plus any training costs, testing
costs, labor costs, and so on. Some of these costs might be hard to identify, but a
thorough risk analysis will account for these costs.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
100 CISSP Cert Guide
Organizations should document all the identified risks and the possible risk
responses in a risk register. When an identified risk occurs, security professionals
should consult the risk register to determine the steps that should be taken as
documented in the risk register.
Implementation
Before implementing any controls that have been chosen as part of the risk analysis
process, security professionals must consider the frameworks used for reference,
tools deployed, and metrics for managing the controls. These three facets ensure
the success of the security architecture. The goal of any risk countermeasure imple-
mentation is to improve the organization’s security without negatively impacting
performance.
All organizational personnel should be involved in the deployment of countermea-
sures and controls for risk management. Each individual involved in the imple-
mentation will have a unique perspective on the risks of that individual’s position.
Documentation and communication across all areas will ensure that each individual
business unit’s risk management implementation is as complete as possible.
Control Categories
You implement access controls as a countermeasure to identified vulnerabilities.
Access control mechanisms that can be used are divided into seven main categories:
■ Compensative
■ Corrective
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 101
■ Detective
■ Deterrent
■ Directive
■ Preventive
■ Recovery
Any access control that is implemented will fit into one or more access control
category.
NOTE Access controls are also defined by the type of protection they provide. Access
control types are discussed later in the chapter.
Compensative
Compensative controls, also known as compensating controls, are in place to substi-
tute for a primary access control and mainly act as a mitigation to risks. Using com-
pensative controls, you can reduce the risk to a more manageable level. Examples of
compensative controls include requiring two authorized signatures to release sensi-
tive or confidential information and requiring two keys owned by different person-
nel to open a safety deposit box.
Corrective
Corrective controls, also known as correcting controls, are in place to reduce the
effect of an attack or other undesirable event. Using corrective controls fixes or
restores the entity that is attacked. Examples of corrective controls include installing
fire extinguishers, isolating or terminating a connection, implementing new firewall
rules, and using server images to restore to a previous state.
Detective
Detective controls, also known as detecting controls, are in place to detect an attack
while it is occurring to alert appropriate personnel. Examples of detective controls
include motion detectors, intrusion detection systems (IDSs), logs, guards, investiga-
tions, and job rotation.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
102 CISSP Cert Guide
Deterrent
Deterrent controls, also known as deterring controls, deter or discourage an attacker.
Via deterrent controls, attacks can be discovered early in the process. Deterrent con-
trols often trigger preventive and corrective controls. Examples of deterrent controls
include user identification and authentication, fences, lighting, and organizational
security policies, such as an NDA.
Directive
Directive controls, also known as directing controls, specify acceptable practice
within an organization. They are in place to formalize an organization’s security
directive mainly to its employees. The most popular directive control is an accept-
able use policy (AUP) that lists proper (and often examples of improper) procedures
and behaviors that personnel must follow. Any organizational security policies or
procedures usually fall into this access control category. Directive controls are
efficient only if there is a stated consequence for not following the organization’s
directions.
Preventive
Preventive controls, also known as preventing controls, prevent an attack from
occurring. Examples of preventive controls include locks, badges, biometric systems,
encryption, intrusion prevention systems (IPSs), antivirus software, personnel secu-
rity, security guards, passwords, and security awareness training.
Recovery
Recovery controls, also known as recovering controls, recover a system or device
after an attack or incident has occurred. The primary goal of recovery controls is
restoring resources. Examples of recovery controls include disaster recovery plans,
data backups, and offsite facilities.
Control Types
Whereas the access control categories classify the access controls based on where
they fit in time, access control types divide access controls on their method of imple-
mentation. The three types of access controls are
■ Administrative (management) controls
■ Logical (technical) controls
■ Physical controls
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 103
In any organization where defense in depth is a priority, access control requires the
use of all three types of access controls. Even if you implement the strictest physical
and administrative controls, you cannot fully protect the environment without logi-
cal controls.
Administrative (Management)
Administrative controls or management controls are implemented to administer the
organization’s assets and personnel and include security policies, procedures, stan-
dards, baselines, and guidelines that are established by management. These controls
are commonly referred to as soft controls. Specific examples are personnel controls,
data classification, data labeling, security awareness training, and supervision.
Security awareness training is a very important administrative control. Its purpose
is to improve the organization’s attitude about safeguarding data. The benefits of
security awareness training include a reduction in the number and severity of errors
and omissions, a better understanding of information value, and improved adminis-
trator recognition of unauthorized intrusion attempts. A cost-effective way to ensure
that employees take security awareness seriously is to create an award or recognition
program.
Table 1-3 lists many administrative controls and includes in which access control
categories the controls fit.
Security professionals should help develop organization policies and procedures to
ensure that personnel understand what is expected and how to properly carry out
their duties. Applicant evaluation, prior to employment, is also important to protect
the organization. Personnel security, evaluation, and clearances ensure that person-
nel are given access only to those resources or areas required by their specific roles
within the organization. Monitoring and logs ensure that security professionals have
a way to analyze behavior. User access should be managed, including user access
approval, unique user IDs, periodic reviews of user access, user password processes,
and access modification and revocation procedures.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
104
Personnel X
procedures
Security policies X X X
Monitoring X
Separation of X
duties
Job rotation X X
Information X
classification
Security awareness X
training
Investigations X
Disaster recovery X X
plan
Security reviews X
Background X
checks
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Termination X
Supervision X
Chapter 1: Security and Risk Management 105
Logical (Technical)
Logical controls or technical controls are software or hardware components used
to restrict access. Specific examples of logical controls include firewalls, IDSs, IPSs,
encryption, authentication systems, protocols, auditing and monitoring, biometrics,
smart cards, and passwords.
Although auditing and monitoring are logical controls and are often listed together,
they are actually two different controls. Auditing is a one-time or periodic event to
evaluate security. Monitoring is an ongoing activity that examines either the system
or users.
Table 1-4 lists many logical controls and includes in which access control categories
the controls fit.
Network access, remote access, application access, and computer or device access all
fit into this category.
Physical
Physical controls are implemented to protect an organization’s facilities and per-
sonnel. Personnel concerns should take priority over all other concerns. Specific
examples of physical controls include perimeter security, badges, swipe cards, guards,
dogs, man traps, biometrics, and cabling.
Table 1-5 lists many physical controls and includes in which access control
categories the controls fit.
When controlling physical entry into a building, security professionals should
ensure that the appropriate policies are in place for visitor control, including visitor
logs, visitor escort, and limitations on visitor access to sensitive areas.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
106
Biometrics X
Smart cards X
Encryption X
Protocols X
Firewalls X
IDS X
IPS X
Access control lists X
Routers X
Auditing X
Monitoring X
Data backups X
Antivirus software X
Configuration standards X
Warning banners X
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Connection isolation X
and termination
Table 1-5 Physical Controls
Physical (Technical) Compensative Corrective Detective Deterrent Directive Preventive Recovery
Controls
Fencing X X
Locks X
Guards X X
Fire extinguisher X
Badges X
Swipe cards X
Dogs X X
Man traps X
Biometrics X
Lighting X
Motion detectors X
CCTV X X X
Data backups X
Antivirus software X
Configuration standards X
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Warning banner X
Hot, warm, and cold X
sites
Chapter 1: Security and Risk Management
107
108 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 109
Other similar guidelines include Six Sigma, Lean, and Total Quality Management.
No matter which of these an organization uses, the result should be a continuous
cycle of improvement organizationwide.
Risk Frameworks
Risk frameworks can serve as guidelines to any organization that is involved in the
risk analysis and management process. Organizations should use these frameworks
as guides but should also feel free to customize any plans and procedures they
implement to fit their needs.
NIST
To comply with the federal standard, organizations first determine the security cat-
egory of their information system in accordance with Federal Information Process-
ing Standard (FIPS) Publication 199, Standards for Security Categorization of Federal
Information and Information Systems, derive the information system impact level from
the security category in accordance with FIPS Publication 200, and then apply the
appropriately tailored set of baseline security controls in NIST Special Publication
800-53 Rev. 5.
The NIST risk management framework includes the following steps:
1. Categorize information systems.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
110 CISSP Cert Guide
Repeat as Necessary
Step 1
Categorize
Information Systems
Step 6 FIPS 199/SP 800-60 Step 2
Monitor Select
Security Controls Security Controls
SP 800-137 FIPS 200/SP 800-53
Risk
Management
Framework
Step 5 Security Life Cycle Step 3
Authorize Implement
Information Systems Security Controls
SP 800-37 SP 800-160
Step 4
Assess
Security Controls
SP 800-53A
FIPS 199
FIPS 199 defines standards for security categorization of federal information sys-
tems. The FIPS 199 nomenclature may be referred to as the aggregate CIA score. This
U.S. government standard establishes security categories of information systems
used by the federal government.
FIPS 199 requires federal agencies to assess their information systems in the cat-
egories of confidentiality, integrity, and availability and rate each system as low,
moderate, or high impact in each category. An information system’s overall security
category is the highest rating from any category.
A potential impact is low if the loss of any tenet of CIA could be expected to have
a limited adverse effect on organizational operations, organizational assets, or indi-
viduals. This occurs if the organization is able to perform its primary function but
not as effectively as normal. This category involves only minor damage, financial
loss, or harm.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 111
A potential impact is moderate if the loss of any tenet of CIA could be expected to
have a serious adverse effect on organizational operations, organizational assets, or
individuals. This occurs if the effectiveness with which the organization is able to
perform its primary function is significantly reduced. This category involves signifi-
cant damage, financial loss, or harm.
A potential impact is high if the loss of any tenet of CIA could be expected to have
a severe or catastrophic adverse effect on organizational operations, organizational
assets, or individuals. This occurs if an organization is not able to perform one or
more of its primary functions. This category involves major damage, financial loss,
or severe harm.
FIPS 199 provides a helpful chart that ranks the levels of CIA for information assets,
as shown in Table 1-6.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
112 CISSP Cert Guide
based on the entities that make it up. FIPS 199 provides a nomenclature for express-
ing these values, as shown here:
Now let’s assume that all of the sites reside on the same web server. To determine
the nomenclature for the web server, you need to use the highest values of each of
the categories:
Some organizations may decide to place the public site on a web server and isolate
the partner site and internal site on another web server. In this case, the public web
server would not need all of the same security controls and would be cheaper to
implement than the partner/internal web server.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 113
Let’s look at an example: An information system used for acquisitions contains both
sensitive, presolicitation phase contract information, and routine administrative
information. The management within the contracting organization determines that
■ For the sensitive contract information, the potential impact from a loss of con-
fidentiality is moderate, the potential impact from a loss of integrity is moder-
ate, and the potential impact from a loss of availability is low.
■ For the routine administrative information (non-privacy-related information),
the potential impact from a loss of confidentiality is low, the potential impact
from a loss of integrity is low, and the potential impact from a loss of availabil-
ity is low.
The resulting security categories, or SCs, of these information types are expressed as
SC contract information = {(confidentiality, moderate), (integrity, moderate),
(availability, low)}
SC administrative information = {(confidentiality, low), (integrity, low),
(availability, low)}
This represents the high-water mark or maximum potential impact values for each
security objective from the information types resident on the acquisition system.
In some cases, the impact level for a system security category will be higher than any
security objective impact level for any information type processed by the system.
The primary factors that most commonly raise the impact levels of the system secu-
rity category above that of its constituent information types are aggregation and
critical system functionality. Other factors that can affect the impact level include
public information integrity, catastrophic loss of system availability, large intercon-
necting systems, critical infrastructures and key resources, privacy information, and
trade secrets.
The end result of NIST SP 800-60 Vol. 1 Rev. 1 is security categorization documen-
tation for every information system. These categories can then be used to complete
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
114 CISSP Cert Guide
the business impact analysis (BIA), design the enterprise architecture, design the
disaster recovery plan (DRP), and select the appropriate security controls.
SP 800-53 Rev. 5
NIST SP 800-53 Rev. 5 is a security controls development framework developed by
the NIST body of the U.S. Department of Commerce.
SP 800-53 Rev. 5 divides the controls into three classes: technical, operational, and
management. Each class contains control families or categories.
Table 1-7 lists the NIST SP 800-53, Rev. 5 control families.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 115
4. Apply the control selection process to new development and legacy systems.
Tailoring Guidance
• Identifying and Designating Common Controls
• Applying Scoping Considerations
Initial • Selecting Compensating Controls Tailored
Security • Assigning Security Control Parameter Values Security
Control • Supplementing Baseline Security Controls Control
Baseline • Providing Additional Specification Information Baseline
(Low, Mod, High) for Implementation (Low, Mod, High)
Before Tailoring Creating Overlays After Tailoring
Figure 1-19 NIST Security Control Selection Process (Image Courtesy of NIST)
SP 800-160
NIST SP 800-160 defines the systems security engineering framework. It defines
and focuses the systems security engineering activities, both technical and non-
technical, toward the achievement of stakeholder security objectives and presents a
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
116 CISSP Cert Guide
coherent, well-formed, evidence-based case that those objectives have been achieved.
It is shown in Figure 1-20.
Figure 1-20 NIST Systems Security Engineering Framework (Image Courtesy of NIST)
The framework defines three contexts within which the systems security engineer-
ing activities are conducted. These are the problem context, the solution context,
and the trustworthiness context.
The problem context defines the basis for a secure system given the stakeholder’s
mission, capability, performance needs, and concerns; the constraints imposed by
stakeholder concerns related to cost, schedule, risk, and loss tolerance; and other
constraints associated with life cycle concepts for the system. The solution context
transforms the stakeholder security requirements into system design requirements;
addresses all security architecture, design, and related aspects necessary to realize a
system that satisfies those requirements; and produces sufficient evidence to dem-
onstrate that those requirements have been satisfied. The trustworthiness context is
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 117
Figure 1-21 NIST System Life Cycle Processes and Stages (Image Courtesy of NIST)
The following naming convention is established for the system life cycle processes.
Each process is identified by a two-character designation. Table 1-8 provides a list-
ing of the system life cycle processes and their associated two-character designators.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
118 CISSP Cert Guide
ID Process ID Process
DE Design Definition PM Portfolio Management
DM Decision Management QA Quality Assurance
DS Disposal QM Quality Management
HR Human Resource Management RM Risk Management
IF Infrastructure Management SA System Analysis
IM Information Management SN Stakeholder Needs and Requirements Definition
IN Integration SP Supply
IP Implementation SR System Requirements Definition
KM Knowledge Management TR Transition
LM Life Cycle Model Management VA Validation
MA Maintenance VE Verification
Each process listed in Table 1-8 has a unique purpose within the life cycle. Each
process has tasks associated with it.
SP 800-37 Rev. 2
NIST SP 800-37 Rev. 2 defines the tasks that should be carried out in each step of
the risk management framework as follows (see also Figure 1-22):
Step 1. Prepare tasks.
Task 1-1: Identify and assign key roles for executing the Risk Manage-
ment Framework.
Task 1-2: Establish an organizational risk management strategy that
determines organizational risk tolerance.
Task 1-3: Complete a risk assessment or update an existing one.
Task 1-4: Establish control baselines and/or Cybersecurity Framework
Profiles and make them available.
Task 1-5: Identify, document, and publish common controls for organi-
zational systems.
Task 1-6: Conduct a prioritization of the organization’s systems that have
the same impact level.
Task 1-7: Develop and deploy a strategy for monitoring control efficacy.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 119
Categorize
Monitor Select
Prepare
Authorize Implement
Assess
Figure 1-22 NIST SP 800-37 Rev. 2 Risk Management (Image Courtesy of NIST)
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
120 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 121
SP 800-30 Rev. 1
According to NIST SP 800-30 Rev. 1, common information-gathering techniques
used in risk analysis include automated risk assessment tools, questionnaires, inter-
views, and policy document reviews. Multiple sources should be used to determine
the risks to a single asset. NIST SP 800-30 identifies the following steps in the risk
assessment process:
1. Prepare for the assessment.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
122 CISSP Cert Guide
3. Communicate results.
Figure 1-23 shows the risk assessment process according to NIST SP 800-30.
Determine Risk
Figure 1-23 NIST SP 800-30 Risk Assessment Process (Image Courtesy of NIST)
SP 800-39
The purpose of NIST SP 800-39 is to provide guidance for an integrated, orga-
nizationwide program for managing information security risk to organizational
operations (i.e., mission, functions, image, and reputation), organizational assets,
individuals, other organizations, and the nation resulting from the operation and
use of federal information systems. NIST SP 800-39 defines three tiers in an
organization.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 123
Tier 1 is the organization view, which addresses risk from an organizational perspec-
tive by establishing and implementing governance structures that are consistent
with the strategic goals and objectives of organizations and the requirements defined
by federal laws, directives, policies, regulations, standards, and missions/business
functions. Tier 2 is the mission/business process view, which designs, develops, and
implements mission/business processes that support the missions/business functions
defined at Tier 1. Tier 3 is the information systems view, which includes operational
systems, systems under development, systems undergoing modification, and systems
in some phase of the system development life cycle.
Figure 1-24 shows the risk management process applied across all three tiers identi-
fied in NIST SP 800-39.
Assess
Frame
Tier 1 - Organization
Tier 2 - Mission/Business Processes
Monitor Tier 3 - Information Systems Respond
Figure 1-24 NIST Risk Management Process Applied Across All Three Tiers (Image Courtesy
of NIST)
2. Assess risk.
3. Respond to risk.
4. Monitor risk.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
124 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 125
Function Category
Unique Function Unique Category
Identifier Identifier
ID.AM Asset Management
ID.BE Business Environment
ID.GV Governance
ID Identify
ID.RA Risk Assessment
ID.RM Risk Management Strategy
ID.SC Supply Chain Risk Management
PR.AC Access Control
PR.AT Awareness and Training
PR.DS Data Security
PR Protect
PR.IP Information Protection Processes and Procedures
PR.MA Maintenance
PR.PT Protective Technology
DE.AE Anomalies and Events
DE Detect DE.CM Security Continuous Monitoring
DE.DP Detection Processes
RS.RP Response Planning
RS.CO Communications
RS Respond RS.AN Analysis
RS.MI Mitigation
RS.IM Improvements
RC.RP Recovery Planning
Figure 1-25 NIST Cybersecurity Framework Function and Category Unique Identifiers (Image
Courtesy of NIST)
Finally, a framework profile is the alignment of the functions, categories, and sub-
categories with the business requirements, risk tolerance, and resources of the
organization. A profile enables organizations to establish a roadmap for reducing
cybersecurity risk that is well aligned with organizational and sector goals, considers
legal/regulatory requirements and industry best practices, and reflects risk manage-
ment priorities.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
126 CISSP Cert Guide
The following steps illustrate how an organization could use the framework to
create a new cybersecurity program or improve an existing program. These steps
should be repeated as necessary to continuously improve cybersecurity:
1. Prioritize and scope.
2. Orient.
An organization may repeat the steps as needed to continuously assess and improve
its cybersecurity.
ISO/IEC 27005:2018
ISO/IEC 27005:2018 supports the concepts detailed in ISO/IEC 27001:2013.
According to ISO/IEC 27005:2018, the risk management process consists of the
following steps:
1. Context Establishment: Defines the risk management’s boundary.
2. Risk Analysis (Risk Identification & Estimation phases): Evaluates the risk
level.
3. Risk Assessment (Risk Analysis & Evaluation phases): Analyzes the identi-
fied risks and takes into account the objectives of the organization.
4. Risk Treatment (Risk Treatment & Risk Acceptance phases): Determines
how to handle the identified risks.
5. Risk Communication: Shares information about risk between the decision
makers and other stakeholders.
6. Risk Monitoring and Review: Detects any new risks and maintains the risk
management plan.
Figure 1-26 shows the risk management process based on ISO/IEC 27005:2018.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 127
Context Establishment
Risk Assessment
Communication and Consultation
Risk Identification
Risk Evaluation
Risk Treatment
ISO/IEC 27005:2018 has been published. ISO/IEC FDIS 27005 is currently under
development at time of writing.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
128 CISSP Cert Guide
e
ns
ng
nc
ic
io
eg
rti
ia
t
pl
ra
t
po
ra
m
pe
Re
St
Co
O
Internal Environment
Subsidiary
Business Unit
Objective Setting
Division
Event Identification
Risk Response
Control Activities
Monitoring
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 129
The Organization’s
Strategic Objectives
Risk Assessment
Risk Analysis
Risk Identification
Risk Description
Risk Estimation
Risk Evaluation
Formal Audit
Modification
Risk Reporting
Threats and Opportunities
Decision
Risk Treatment
Monitoring
Geographical Threats
Many threats are a function of the geographic location of the office or facility. The
following sections discuss a wide variety of threats and issues, some of which apply
to only certain areas. Security professionals must be prepared to anticipate and miti-
gate those issues.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
130 CISSP Cert Guide
a door lock system on the server room that requires a swipe of the employee card
is designed to prevent access by those who are already in the building (an internal
threat). Keep this distinction in mind as you read the following sections.
Natural Threats
Many of the physical threats that must be addressed and mitigated are caused by
the forces of nature. Building all facilities to withstand the strongest hurricanes,
tornadoes, and earthquakes is not economically feasible because in many areas these
events happen infrequently, if ever. What can be done is to make a realistic assess-
ment of the historical weather conditions of an area and perform a prudent cost/
benefit analysis to determine which threats should be addressed and which should be
accepted. Here, we discuss some of the major natural threats.
Hurricanes/Tropical Storms
In certain areas, hurricanes and tropical storms are so frequent and unpredictable
that all buildings are required to be capable of withstanding the more moderate
instances of these storms. In other areas, doing that makes no sense even though
these storms do occur from time to time. The location of the facility should dictate
how much is spent in mitigating possible damages from these events.
Tornadoes
Although events of the last few years might seem to contradict this statement, over
the long haul certain areas are more prone to tornadoes than others. A study of the
rate and severity of tornadoes in an area from a historical perspective can help to
determine measures that make sense for a particular location.
NOTE In recent tornado outbreaks, many cellphone towers have been knocked out
completely. In rural areas especially, communication with loved ones can be next to
impossible. But the problem occurs not just in rural areas. In the Dallas–Fort Worth
tornado outbreak in December 2015, it took many individuals up to 48 hours to
locate loved ones because of lack of communications. You can imagine how this loss of
communication would affect a company, school, or hospital.
Earthquakes
Earthquakes should be treated in the same way as hurricanes, tropical storms, and
tornadoes; that is, the location of the specific facility should dictate the amount of
preparation and the measures to take to address this risk. For example, facilities in
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 131
California might give this issue more attention than those in the southeast of the
United States where these events are extremely rare.
Floods
Flooding should always be a consideration because it is an event that can occur with
the right circumstances just about anywhere. If at all possible, computing systems
and equipment should be kept off the floor, and server rooms and wiring closets
should be built on raised floors and away from windows and exit doors to help
prevent damage that could occur in even a small flood.
Volcanoes
Volcanoes, like earthquakes, should be considered if the location warrants. For
example, facilities in Hawaii might give this more consideration than facilities in the
northeast United States.
System Threats
Some of the threats that exist are not from the forces of nature but from failures in
systems that provide basic services, such as electricity and utilities. Although these
system threats can sometimes arise from events of nature, here we discuss guidelines
for preparing and dealing with these events, which can occur in any location and in
any type of weather conditions.
Electrical
Electricity is the lifeline of the organization and especially in regard to computing
systems; outages not only are an inconvenience but also can damage equipment and
cause loss of data. Moreover, when the plug is pulled, to a large degree the enter-
prise grinds to a halt in today’s world.
For this reason, all mission-critical systems should have uninterruptible power sup-
plies (UPSs) that can provide power on a short-term basis until the system can be
cleanly shut down. In cases where power must be maintained for longer than a mat-
ter of minutes, onsite generators should be available to provide the power to keep
systems running on a longer-term basis until power is restored.
Noise, humidity, and brownouts are also issues that affect the electricity supply.
The recommended optimal relative humidity range for computer operations is
40 to 60 percent. Critical systems must be protected from both power sags and
surges. Neither is good for equipment. Line conditioners placed between the system
and the power source can help to even out these fluctuations and prevent damage.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
132 CISSP Cert Guide
Finally, the most prevalent cause of computer center fires is electrical distribution
systems. Checking these systems regularly can identify problems before they occur.
Communications
Protecting the physical security of communication, such as email, telephone, and fax
systems, is a matter of preventing unauthorized access to the physical communica-
tion lines (cables and so on) and physical and logical access to equipment used to
manage these systems.
For example, in the case of email, the email servers should be locked away, and
access to them over the network must be tightly controlled with usernames and
complex passwords.
In the case of fax machines, implementing policies and procedures can prevent
sensitive faxes from becoming available to unauthorized persons. In some cases,
preventing certain types of information from being transmitted with faxes might be
necessary.
Many phone systems now have been merged into the data network using Voice over
IP (VoIP). With these systems, routers and switches might be involved in managing
the phone system and should be physically locked away and logically protected from
network access in the same fashion as email servers. Because email and VoIP both
use the data network, an organization should ensure that cabling is not exposed to
tampering and malicious destruction. A plenum space is a pathway that can facili-
tate heating and cooling system airflow and should be considered when developing
building or renovating server rooms.
NOTE The term plenum is also used regarding cabling. Plenum cabling is any
cabling that is run in the plenum space of a building. As such, this cabling must follow
certain fire guidelines to obtain the plenum designation.
The following are some additional considerations that can impact disaster recovery:
■ Maintain fault-tolerant connections to the Internet, such as gigabit as the pri-
mary connection and a backup fiber connection.
■ Establish phone connections to employees besides primary organizational
phone connections. Know cellphone and home numbers for employee
notifications.
■ Establish radio communications over the entire campus with repeater anten-
nae to provide communication during emergencies. Many primary forms of
communication (such as phone lines and cellphones) can go down.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 133
Utilities
Some utilities systems, such as gas and water, can be routed into the facility through
ducts and tunnels that might provide an unauthorized entry point to the building.
These ducts and tunnels, which provide this opportunity, should be monitored with
sensors and access control mechanisms.
Any critical parts of the systems where cut-off valves and emergency shutdown sys-
tems are located should be physically protected from malicious tampering. In some
cases, covering and protecting these valves and controls using locking cages might
be beneficial.
Human-Caused Threats
Although many of the physical threats organizations face are a function of natural
occurrences and random events, some of them are purposeful. Next, we explore
some of the physical threats faced from malicious and careless humans. These
human-caused threats come from both external forces and internal forces.
Explosions
Explosions can be both intentional and accidental. Intentional explosions can occur
as a result of political motivation (covered in more detail in the section “Politically
Motivated Threats”), or they can simply be vandalism. Accidental explosions can be
the result of a failure to follow procedures and the failure of physical components.
With regard to intentional explosions, the best defense is to prevent access to areas
where explosions could do significant damage to the enterprise’s operational com-
ponents, such as server rooms, wiring closets, and areas where power and utilities
enter the building. When an intentional explosion occurs, typically the perpetrator
will consider locating the explosive where the most harm can be done, so those areas
should get additional physical protection.
Fire
Fires can happen anywhere and thus are a consideration at all times. Chapter 3
covers both fire suppression and fire detection techniques. Organizations should
address the threat of fire in the contexts of both an accident and an intentional
attack. An auxiliary station alarm might be beneficial in many cases. This mechanism
automatically causes an alarm originating in a data center to be transmitted over the
local municipal fire or police alarm circuits for relaying to both the local police/fire
station and the appropriate headquarters.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
134 CISSP Cert Guide
Fire extinguishers are classified using the standard system shown in Tables 1-9 and
1-10. In Chapter 3, we talk more about fire extinguishers and suppression systems
for the various types.
With respect to construction materials, according to (ISC)2, all walls must have a
two-hour minimum fire rating in an information processing facility. Knowing that
the most prevalent cause of computer center fires is electrical distribution systems is
also useful. Regardless of the fire source, the first action to take in the event of a fire
is the evacuation of all personnel.
Vandalism
Vandalism is intentional destruction and can often result in defacement of walls,
bathrooms, and such, but when critical components are accessible, this threat can
impact operations. Cut cables and smashed devices are reasons stressed in prevent-
ing physical access to these components.
Even when all measures have been taken, vandalism can still cause problems. For
example, a purposefully plugged toilet can flood a floor and damage equipment if
undetected.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 135
Fraud
In the context of physical security, fraud involves gaining access to systems,
equipment, or the facility through deception. For example, someone who enters
the facility posing as a service person and someone who tailgates and follows an
employee through the card system use forms of fraudulent physical access.
Physical access control systems become critical to preventing this type of fraud and
the damage it can lead to.
Theft
Preventing physical theft of company assets depends on preventing physical access
to the facility. Physical theft is the risk that will most likely affect CIA. For assets
that leave the facility, such as laptops, you should think about protecting sensitive
data that might exist on them through the use of encryption, preferably through
encrypted drives.
Collusion
Collusion occurs when two or more employees work together to accomplish a theft
of some sort that could not be accomplished without their combined knowledge or
responsibilities. Organizations should use proper separation of duties to prevent a
single person from controlling enough of a process to hide their actions.
Limiting the specific accesses of operations personnel forces an operator into
collusion with an operator of a different category to have access to unauthorized
data. Collusion is much less likely to occur from a statistical standpoint than a single
person operating alone. When you consider this fact, the trade-off in exchanging
one danger for another is justified.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
136 CISSP Cert Guide
Strikes
Although strikes might be the least dangerous of the threats in this list, they can still
damage the enterprise. In countries like the United States, basic rules of order have
been established that prevent the worst of the possible outcomes, but even then an
orderly strike can cost productivity and can hurt the image of the company. In other
countries, strikes can be much more dangerous, especially when other political issues
become intertwined with monetary issues.
Riots
Riots often occur seemingly out of nowhere, although typically an underlying issue
explodes at some single incident. These events can be very dangerous as large mobs
will often participate in activities that none of the individuals would normally do
on their own. Often times the enterprise is seen as a willing participant in some
perceived slight or wrong suffered by the rioters. In that case, the company and its
assets become a large and somewhat easy target. At larger organizations, a threat
intelligence group may be able to provide an alert about a potential riot in close
proximity.
Civil Disobedience
Civil disobedience is the intentional refusal to obey certain laws, demands, and
commands of a government and is commonly, though not always, defined as being
nonviolent resistance. One of the typical by-products of this is a disruption of
some process to bring attention to the perceived injustice of the law or a rule being
broken.
This behavior might also manifest itself as an action against some practice by the
enterprise that might not be illegal but might be seen by some groups as harmful in
some way. When this is the case, the physical security of the facility becomes impor-
tant because in some cases action might be taken to harm the facility.
Terrorist Acts
Increasingly, and more so after the 9/11 attacks, the threats of terrorist activity have
caused a new focus on not only the security of facilities both at home and abroad but
also of the physical safety of workers and officers. In many cases, certain industries
have found it beneficial to include emergency planning designed to address terrorist
acts. Reactions to common scenarios are rehearsed to ensure the best possible out-
come in the case of an attack.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 137
Bombing
Bombing of facilities or company assets, once a rare occurrence, is no longer so
in many parts of the world today. Increasingly, the enterprise is driven to include
such considerations as local disturbance levels and general political unrest in an
area before company sites are chosen. In many cases the simple threat of a bomb is
enough to engage evacuation plans that are both costly and disruptive. Despite this,
evacuation plans that address terrorist threats and bombings have become an inte-
gral part of any security policy, especially in certain parts of the world.
Threat Modeling
Earlier in this chapter, in the “Risk Management Concepts” section, we defined vul-
nerabilities, threats, threat agents, and other concepts. Threat modeling allows an
organization to use a structured approach to security and to address the top threats
that have the greatest potential impact to the organization first. Threat modeling is
used to identify and rate the threats that are most likely to impact an organization.
Threat modeling can be carried out using three different perspectives:
■ Application-centric threat modeling: This perspective involves using appli-
cation architecture diagrams to analyze threats.
■ Asset-centric threat modeling: This perspective involves identifying the
assets of an organization and classifying them according to data sensitivity and
their intrinsic value to a potential attacker, in order to prioritize risk levels.
This method uses attack trees, attack graphs, or displayed patterns to deter-
mine how an asset can be attacked.
■ Attacker-centric threat modeling: This perspective involves profiling an
attacker’s characteristics, skills, and motivation to exploit vulnerabilities.
Attacker profiles are then used to understand the type of attacker who would
be most likely to execute specific types of exploits and implement a mitigation
strategy accordingly. Tree diagrams are often used.
No matter which threat modeling method you decide to use, the basic steps in the
threat modeling process are as follows:
1. Identify assets.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
138 CISSP Cert Guide
NOTE Vulnerability, attack, threat, and risk are covered earlier in this chapter in the
“Risk Management Concepts” section.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 139
STRIDE Model
Developed by Microsoft, STRIDE is a threat classification model that is used to
assess the threats in an application. It covers the following six categories:
■ Spoofing of user identity
■ Tampering
■ Repudiation
■ Information disclosure (privacy breach or data leak)
■ Denial of service (DoS)
■ Elevation of privilege
This method usually requires subject matter experts (SMEs) to determine the
threats, threat classifications, and relevance of security properties to the elements of
a threat model.
3. Application decomposition
4. Threat analysis
5. Vulnerability detection
6. Attack enumeration
Trike Methodology
Trike is both a methodology and a tool with its basis in a requirements model
designed to ensure the level of risk assigned to each asset is classified as acceptable
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
140 CISSP Cert Guide
NIST SP 800-154
NIST SP 800-154 is a draft publication for data-centric system threat modeling. It
includes the following steps:
1. Identify and characterize the system and data of interest.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 141
Most of the actions within the methodology can be addressed in a wide variety of
ways in terms of both content (what information is captured) and format/structure
(how that information is captured). Organizations should customize as they see fit.
Identifying Threats
Identifying threats and threat actors as part of threat modeling is not much different
from identifying threats and vulnerabilities as discussed earlier in this chapter, in the
“Risk Assessment” section. However, when carrying out threat modeling, you may
decide to develop a more comprehensive list of threat actors to assist in scenario
development.
Security professionals should analyze all the threats to identify all the actors who
pose significant threats to the organization. Examples of threat actors include both
internal and external actors, such as the following:
■ Internal actors
■ Reckless employee
■ Untrained employee
■ Partner
■ Disgruntled employee
■ Internal spy
■ Government spy
■ Vendor
■ Thief
■ External actors
■ Anarchist
■ Competitor
■ Corrupt government official
■ Data miner
■ Government cyber warrior
■ Irrational individual
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
142 CISSP Cert Guide
■ Legal adversary
■ Mobster
■ Activist
■ Terrorist
■ Vandal
These actors can be subdivided into two categories: nonhostile and hostile. Of the
actors listed, three are usually considered nonhostile: reckless employee, untrained
employee, and partner. All the other actors should be considered hostile.
An organization needs to analyze each of these threat actors according to set criteria.
The organization should give each threat actor a ranking to help determine which
ones should be analyzed. Examples of some of the most commonly used criteria
include the following:
■ Skill level: None, minimal, operational, adept
■ Resources: Individual, team, organization, government
■ Visibility: Overt, covert, clandestine, don’t care
■ Objective: Copy, destroy, injure, take, don’t care
■ Outcome: Acquisition/theft, business advantage, damage, embarrassment,
technical advantage
Based on these criteria, the organization must then determine which of the actors
it wants to analyze. For example, the organization may choose to analyze all hos-
tile actors who have a skill level of adept and resources of organization or govern-
ment. Then the list is consolidated to include only the threat actors that fit all these
criteria.
Next, the organization must determine what it really cares about protecting. Often
this determination is made using some sort of business impact analysis. After the
vital assets are determined, the organization should then select the scenarios that
could have a catastrophic impact on the organization by using the objective and out-
come values from the threat actor analysis and the asset value and business impact
information from the impact analysis.
Potential Attacks
To identify the potential attacks that can occur, an organization must create scenar-
ios that can be fully analyzed. For example, an organization may decide to analyze
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 143
NOTE Specific attacks are discussed throughout this book. Cryptanalytic attacks are
covered in Chapter 3, “Security Architecture and Engineering.” Network attacks are
covered in Chapter 4, “Communication and Network Security.” Access control attacks
are covered in Chapter 5, “Identity and Access Management (IAM).”
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
144 CISSP Cert Guide
Onsite Assessment
An onsite assessment involves a team from the third party. This team needs access
to all aspects of the organization under regulation. This assessment might include
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 145
Document Exchange/Review
A document exchange/review involves transmitting a set of documents to the third
party. The process used for the document exchange must be secure on both ends of
the exchange.
Process/Policy Review
A process/policy review focuses on a single process or policy within the organization
and ensures that the process or policy follows regulations.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
146 CISSP Cert Guide
For each different acquisition type, it may be necessary to define separate security
policies. For example, mobile devices that are not used may need to be locked in a
file cabinet or safe. Keys for company vehicles should not be kept out in the open
where they are easy to obtain. Computers that are located in a high-traffic area may
need some sort of mechanism that locks the devices to desks. The security controls
vary just as much as the acquisition types.
Service-Level Requirements
SLAs are agreements about the ability of a support system to respond to problems
within a certain timeframe while providing an agreed level of service. These agree-
ments can be internal between departments or external with service providers.
Agreeing on the speed at which various problems are addressed introduces some
predictability to the response to problems; this ultimately supports the maintenance
of access to resources. The following are some examples of what may be included in
an SLA:
■ Loss of connectivity to the DNS server must be restored within a reasonable
timeframe.
■ Loss of connectivity to Internet service must be restored within a five-hour
period.
■ Loss of connectivity of a host machine must be restored within an eight-hour
period.
Before an SLA can be written and signed, organizations must negotiate the
service-level requirements. If an organization does not have carefully documented
requirements, it cannot be sure that the SLA from the vendor will fulfill its needs.
Requirements that need to be documented include the following:
■ Description of service
■ Hours of service needed
■ Service interruption process
■ Availability requirements
■ Maintenance requirements and allowed downtime
■ Workload expected
■ Performance expected
Security professionals need to work with business unit managers when services must
be obtained from a third party to ensure that the service-level requirements are
documented.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 147
Levels Required
Security training teaches personnel the skills to enable them to perform their jobs in
a secure manner. Awareness training and security training are usually combined as
security awareness training, which improves user awareness of security and ensures
that users can be held accountable for their actions. Security education is more inde-
pendent and is targeted at security professionals who require security expertise to act
as in-house experts for managing the security programs. Awareness training is the
what, security training is the how, and security education is the why.
Security awareness training should be developed based on the audience. In addition,
trainers must understand the corporate culture and how it will affect security. The
audiences to be considered when designing training include high-level management,
middle management, technical personnel, and regular staff.
For high-level management, the security awareness training must provide a clear
understanding of potential risks and threats, effects of security issues on organiza-
tional reputation and financial standing, and any applicable laws and regulations that
pertain to the organization’s security program. Middle management training should
discuss policies, standards, baselines, guidelines, and procedures, particularly how
these components map to the individual departments. Also, middle management
must understand their responsibilities regarding security. Technical staff should
receive technical training on configuring and maintaining security controls, includ-
ing how to recognize an attack when it occurs. In addition, technical staff should be
encouraged to pursue industry certifications and higher education degrees. Regular
staff need to understand their responsibilities regarding security so that they per-
form their day-to-day tasks in a secure manner. With regular staff, providing real-
world examples to emphasize proper security procedures is effective.
Personnel should sign a document that indicates they have completed the training
and understand all the topics. Although the initial training should occur when
personnel is hired, security awareness training should be considered a continuous
process, with future training sessions occurring annually at a minimum.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
148 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 149
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
150 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 151
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
152 CISSP Cert Guide
3. What is a vulnerability?
a. The entity that carries out a threat
b. The exposure of an organizational asset to losses
c. An absence or a system weakness that can be exploited
d. A control that reduces risk
4. Which framework uses the six communication questions (what, where, when,
why, who, and how) that intersect with six layers (operational, component,
physical, logical, conceptual, and contextual)?
a. Six Sigma
b. SABSA
c. ITIL
d. ISO/IEC 27000 series
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 153
10. Which type of crime occurs when a computer is used as a tool to help commit
a crime?
a. Computer-assisted crime
b. Incidental computer crime
c. Computer-targeted crime
d. Computer prevalence crime
11. Which access control type reduces the effect of an attack or another
undesirable event?
a. Compensative control
b. Preventive control
c. Detective control
d. Corrective control
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
154 CISSP Cert Guide
12. What is the first stage of the security program life cycle?
a. Plan and Organize
b. Implement
c. Operate and Maintain
d. Monitor and Evaluate
14. Which management officer implements and manages all aspects of security,
including risk analysis, security policies and procedures, training, and emerging
technologies?
a. Data protection officer (DPO)
b. Chief financial officer (CFO)
c. Chief security officer (CSO)
d. Chief information officer (CIO)
15. Which of the following do organizations have employees sign to protect trade
secrets?
a. Trademark
b. Patent
c. Digital Rights Management (DRM)
d. Nondisclosure agreement (NDA)
16. Which type of access control type is an acceptable use policy (AUP) most
likely considered?
a. Corrective
b. Detective
c. Compensative
d. Directive
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 155
17. What is the legal term used to describe an organization taking all reasonable
measures to prevent security breaches and also taking steps to mitigate dam-
ages caused by successful breaches?
a. Due care
b. Due diligence
c. Default security posture
d. Qualitative risk analysis
19. Which of the following is not a consideration for security professionals during
mergers and acquisitions?
a. New data types
b. New technology types
c. Cost of the merger or acquisition
d. The other organization’s security awareness training program
20. What is the first step of CRAMM (CCTA Risk Analysis and Management
Method)?
a. Identify threats and vulnerabilities.
b. Identify and value assets.
c. Identify countermeasures.
d. Prioritize countermeasures.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
156 CISSP Cert Guide
24. Which of the following is a segment of the communication path that an attack
uses to access a vulnerability?
a. Breach
b. Threat agent
c. Attack vector
d. Countermeasure
26. What is the first step of the NIST SP 800-154 draft publication for
data-centric system threat modeling?
a. Identify and select the attack vectors to be included in the model.
b. Identify and characterize the system and data of interest.
c. Analyze the threat model.
d. Characterize the security controls for mitigating the attack vectors.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 157
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
158 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 159
12. a. The four stages of the security program life cycle, in order, are as follows:
1. Plan and Organize
2. Implement
3. Operate and Maintain
4. Monitor and Evaluate
13. b. The Zachman Framework is a two-dimensional model that intersects com-
munication interrogatives (what, why, where, and so on) with various view-
points (planner, owner, designer, and so on). It is designed to help optimize
communication between the various viewpoints during the creation of the
security architecture.
14. c. The chief security officer (CSO) is the officer that leads any security effort
and reports directly to the chief executive officer (CEO). The chief privacy
officer (CPO) is the officer responsible for private information and usually
reports directly to the chief information officer (CIO). The chief financial offi-
cer (CFO) is the officer responsible for all financial aspects of an organization.
The CFO reports directly to the CEO and must also provide financial data
for the shareholders and government entities. The CIO is the officer respon-
sible for all information systems and technology used in the organization and
reports directly to the CEO or CFO.
15. d. Most organizations that have trade secrets attempt to protect these secrets
using nondisclosure agreements (NDAs). These NDAs must be signed by
any entity that has access to information that is part of the trade secret. A
trademark is an intellectual property type that ensures that the symbol, sound,
or expression that identifies a product or an organization is protected from
being used by another. A patent is an intellectual property type that covers an
invention described in a patent application and is granted to an individual or
company. Digital rights management (DRM) is used by hardware manufactur-
ers, publishers, copyright holders, and individuals to control the use of digital
content. This often also involves device controls.
16. d. The most popular directive control is an acceptable use policy (AUP) that
lists proper (and often examples of improper) procedures and behaviors that
personnel must follow. Corrective controls are in place to reduce the effect of
an attack or other undesirable event. Examples of corrective controls include
installing fire extinguishers and implementing new firewall rules. Detective
controls are in place to detect an attack while it is occurring to alert appropri-
ate personnel. Examples of detective controls include motion detectors, IDSs,
or guards. Compensative controls are in place to substitute for a primary
access control and mainly act as a mitigation to risks. Examples of compensa-
tive controls include requiring two authorized signatures to release sensitive or
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
160 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 1: Security and Risk Management 161
appropriate to the incident. A cyber incident response plan is a plan that estab-
lishes procedures to address cyberattacks against an organization’s information
system(s).
23. b. A disaster recovery plan (DRP) is an information system–focused plan
designed to restore operability of the target system, application, or computer
facility infrastructure at an alternate site after an emergency. An occupant
emergency plan (OEP) is a plan that outlines first-response procedures for
occupants of a facility in the event of a threat or incident to the health and
safety of personnel, the environment, or property. An information system con-
tingency plan (ISCP) provides established procedures for the assessment and
recovery of a system following a system disruption. A critical infrastructure
protection (CIP) plan is a set of policies and procedures that serve to protect
and recover assets and mitigate risks and vulnerabilities.
24. c. An attack vector is a segment of the communication path that an attack
uses to access a vulnerability. A breach is an attack that has been successful in
reaching its goal. A threat is carried out by a threat agent. Not all threat agents
will actually exploit an identified vulnerability. A countermeasure reduces the
potential risk. Countermeasures are also referred to as safeguards or controls.
25. d. Developed by Microsoft, STRIDE is a threat classification model that
is used to assess the threats in an application. It covers the following six
categories:
■ Spoofing of user identity
■ Tampering
■ Repudiation
■ Information disclosure (privacy breach or data leak)
■ Denial of service (DoS)
■ Elevation of privilege
The Visual, Agile, and Simple Threat (VAST) model was created as a result of
the shortcomings in the other models and methodologies. VAST threat mod-
eling scales across the infrastructure and entire development portfolio. Trike is
both a methodology and a tool with its basis in a requirements model designed
to ensure the level of risk assigned to each asset is classified as acceptable by
stakeholders. The Process for Attack Simulation and Threat Analysis (PASTA)
methodology provides a seven-step process for analyzing applications to align
business objectives and technical requirements. It is intended to provide an
attacker-centric view of the application and infrastructure from which defend-
ers can develop an asset-centric mitigation strategy.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
162 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
This page intentionally left blank
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
This chapter covers the following topics:
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
CHAPTER 2
Asset Security
Assets are any entities that are valuable to an organization and include tangible
and intangible assets. As mentioned in Chapter 1, “Security and Risk Manage-
ment,” tangible assets include computers, facilities, supplies, and personnel.
Intangible assets include intellectual property, data, and organizational reputa-
tion. All assets in an organization must be protected to ensure the organization’s
future success. Although securing some assets is as easy as locking them in a safe,
other assets require more advanced security measures. The most valuable asset
of any organization is its data.
The Asset Security domain addresses a broad array of topics, including informa-
tion and asset identification and classification, information and asset handling,
information and asset ownership, asset inventory and asset management, data
life cycle, asset retention, and data security controls and compliance require-
ments. Out of 100 percent of the exam, this domain carries an average weight of
10 percent, which is the lowest weight of the domains.
A security professional must be concerned with all aspects of asset security. The
most important factor in determining the controls used to ensure asset security
is an asset’s value. Although some assets in the organization may be considered
more important because they have greater value, you should ensure that no
assets are forgotten. This chapter covers all the aspects of asset security that you,
as an IT security professional, must understand.
NOTE Throughout this chapter, the terms information and data are used inter-
changeably, as commonly happens in the real world.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
166 CISSP Cert Guide
Foundation Topics
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 2: Asset Security 167
procedures, data security issues can arise because of the different storage methods
used. For example, suppose an organization’s research department decides to imple-
ment a Microsoft SQL Server database to store all research data, but the organiza-
tion does not have a data policy. If the database is implemented without a thorough
understanding of the types of data that will be stored and the users’ needs, the
research department may end up with a database that is difficult to navigate and
manage. In addition, the proper access control mechanism may not be in place,
resulting in users being able to edit the data that should only have view access.
Liability involves protecting the organization from legal issues. Liability is directly
affected by legal and regulatory requirements that apply to the organization. Issues
that can affect liability include asset or data misuse, data inaccuracy, data corruption,
data breach, and data loss or a data leak.
Data privacy is determined as part of data analysis. Data classifications must be
determined based on the value of the data to the organization. After the data clas-
sifications are determined, data controls should be implemented to ensure that the
appropriate security controls are implemented based on data classifications. Privacy
laws and regulations must also be considered.
Sensitive data is any data that could adversely affect an organization or individual if
it were released to the public or obtained by attackers. When determining sensitiv-
ity, you should understand the types of threats that can occur, the vulnerability of
the data, and the data type. For example, Social Security numbers are more sensitive
than physical address data.
Data ownership is the final issue that you must consider as part of data policy
design. This issue is particularly important if multiple organizations store their data
within the same asset or database. One organization may want completely different
security controls in place to protect its data. Understanding legal ownership of data
is important to ensure that you design a data policy that takes into consideration
the different requirements of multiple data owners. While this is most commonly a
consideration when multiple organizations are involved, it can also be an issue with
different business units in the same organization. For example, data from the human
resources department has different owners and therefore different requirements
than research department data.
Data Quality
Data quality is defined as data’s fitness for use. The integrity factor of the secu-
rity triad drives the data quality. Data quality must be maintained throughout the
data life cycle, including during data capture, data modification, data storage, data
distribution, data usage, and data archiving. These terms are also known as data
in use, data at rest, and data in transit. Security professionals must ensure that their
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
168 CISSP Cert Guide
organization adopts the appropriate quality control and quality assurance measures
so that data quality does not suffer. Data quality is most often safeguarded by ensur-
ing data integrity, which protects data from unintentional, unauthorized, or acciden-
tal changes. With data integrity, data is known to be good, and information can be
trusted as being complete, consistent, and accurate. System integrity ensures that a
system will work as intended.
Security professionals should work to document data standards, processes, and pro-
cedures to monitor and control data quality. In addition, internal processes should
be designed to periodically assess data quality. When data is stored in databases,
quality control and assurance are easier to ensure using the internal data controls
in the database. For example, you can configure a field to only a valid number. By
doing this, you would ensure that only numbers could be input into the field. This
is an example of input validation. Input validation can occur on both the client side
(using regular expressions) and the server side (using code or in the database) to
avoid SQL injection attacks.
Data contamination occurs when data errors occur. Data can be corrupt due to
network or hash corruptions, lack of integrity policies, transmission errors, and bad
encryption algorithms. Data errors can be reduced through implementation of the
appropriate quality control and assurance mechanisms. Data verification, an impor-
tant part of the process, evaluates how complete and correct the data is and whether
it complies with standards. Data verification can be carried out by personnel who
have the responsibility of entering the data. Data validation evaluates data after data
verification has occurred and tests data to ensure that data quality standards have
been met. Data validation must be carried out by personnel who have the most
familiarity with the data.
Organizations should develop procedures and processes that keep two key data
issues in the forefront: error prevention and correction. Error prevention is pro-
vided at data entry, whereas error correction usually occurs during data verification
and validation.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 2: Asset Security 169
to ensure that products are shipped to the correct address. In addition, the accounts
receivable department will need access to customer demographic information for
billing purposes. There is no need for each business unit to have separate data sets
for this information. Identifying the customer demographic data set as being needed
by multiple business units prevents duplication of efforts across business units.
Within each data set, documentation must be created for each type of data. In the
customer demographic data set example, customer name, address, and phone num-
ber are all collected. For each of the data types, the individual parameters for each
data type must be created. Whereas an address may allow a mixture of numerals
and characters, a phone number should allow only numerals. In addition, each data
type may have a maximum length. Finally, it is important to document which data is
required—meaning that it must be collected and entered. For example, an organiza-
tion may decide that fax numbers are not required but phone numbers are required.
Remember that each of these decisions is best made by the personnel working most
closely with the data.
After all the documentation has occurred, the data organization must be mapped
out. This organization will include all interrelationships between the data sets. It
should also include information on which business units will need access to data sets
or subsets of a data set.
NOTE Big data is a term for data sets that are so large or complex that they cannot
be analyzed by traditional data processing applications. Specialized applications have
been designed to help organizations with their big data. The big data challenges that
may be encountered include data analysis, data capture, data search, data sharing, data
storage, and data privacy.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
170 CISSP Cert Guide
NOTE The common private sector classifications and military and government
classifications are discussed in a later section.
The information life cycle, covered in more detail later in this chapter, should also
be based on the classification of the data. Organizations are required to retain cer-
tain information, particularly financial data, based on local, state, or government
laws and regulations.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 2: Asset Security 171
Data criticality is a measure of the importance of the data. Data that is considered
sensitive may not necessarily be considered critical. Assigning a level of criticality to
a particular data set requires considering the answers to a few questions:
■ Will you be able to recover the data in case of disaster?
■ How long will it take to recover the data?
■ What is the effect of this downtime, including loss of public standing?
PII
Personally identifiable information (PII) was defined and explained in Chapter 1.
PII is considered information that should be classified and protected. National Insti-
tute of Standards and Technology (NIST) Special Publication (SP) 800-122 gives
guidelines on protecting the confidentiality of PII.
According to SP 800-122, organizations should implement the following recom-
mendations to effectively protect PII:
■ Organizations should identify all PII residing in their environment.
■ Organizations should minimize the use, collection, and retention of PII to
what is strictly necessary to accomplish their business purpose and mission.
■ Organizations should categorize their PII by the PII confidentiality impact
level.
■ Organizations should apply the appropriate safeguards for PII based on the
PII confidentiality impact level.
■ Organizations should develop an incident response plan to handle breaches
involving PII.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
172 CISSP Cert Guide
Determining the impact from a loss of confidentiality of PII should take into
account relevant factors. Several important factors that organizations should
consider are as follows:
■ Identifiability: How easily PII can be used to identify specific individuals
■ Quantity of PII: How many individuals are identified in the information
■ Data field sensitivity: The sensitivity of each individual PII data field, as well
as the sensitivity of the PII data fields together
■ Context of use: The purpose for which PII is collected, stored, used,
processed, disclosed, or disseminated
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 2: Asset Security 173
Organizations that collect, use, and retain PII should use NIST SP 800-122 to help
guide the organization’s efforts to protect the confidentiality of PII.
PHI
Protected health information (PHI), also referred to as electronic protected health
information (EPHI or ePHI), is any individually identifiable health information.
PHI is treated as a special case of PII with different standards and frameworks.
NIST SP 800-66 provides guidelines for implementing the Health Insurance Por-
tability and Accountability Act (HIPAA) Security Rule. The Security Rule applies to
the following covered entities:
■ Covered healthcare providers: Any provider of medical or other health ser-
vices, or supplies, who transmits any health information in electronic form in
connection with a transaction for which HHS (U.S. Department of Health and
Human Services) has adopted a standard.
■ Health plans: Any individual or group plan that provides or pays the cost of
medical care (e.g., a health insurance issuer and the Medicare and Medicaid
programs).
■ Healthcare clearinghouses: A public or private entity that processes another
entity’s healthcare transactions from a standard format to a nonstandard for-
mat, or vice versa.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
174 CISSP Cert Guide
Each covered entity must ensure the confidentiality, integrity, and availability of
PHI that it creates, receives, maintains, or transmits; protect against any reasonably
anticipated threats and hazards to the security or integrity of EPHI; and protect
against reasonably anticipated uses or disclosures of such information that are not
permitted by the Privacy Rule.
The Security Rule is separated into six main sections as follows:
■ Security Standards General Rules: Includes the general requirements all
covered entities must meet; establishes flexibility of approach; identifies stan-
dards and implementation specifications (both required and addressable);
outlines decisions a covered entity must make regarding addressable imple-
mentation specifications; and requires maintenance of security measures to
continue reasonable and appropriate protection of PHI.
■ Administrative Safeguards: Defined in the Security Rule as the “adminis-
trative actions and policies, and procedures to manage the selection, devel-
opment, implementation, and maintenance of security measures to protect
electronic protected health information and to manage the conduct of the
covered entity’s workforce in relation to the protection of that information.”
■ Physical Safeguards: Defined as the “physical measures, policies, and proce-
dures to protect a covered entity’s electronic information systems and related
buildings and equipment, from natural and environmental hazards, and unau-
thorized intrusion.”
■ Technical Safeguards: Defined as the “the technology and the policy and
procedures for its use that protect electronic protected health information and
control access to it.”
■ Organizational Requirements: Includes standards for business associate
contracts and other arrangements, including memoranda of understanding
between a covered entity and a business associate when both entities are
government organizations; and requirements for group health plans.
■ Policies and Procedures and Documentation Requirements: Requires
implementation of reasonable and appropriate policies and procedures to
comply with the standards, implementation specifications, and other require-
ments of the Security Rule; maintenance of written documentation (which
may be also in electronic form such as email) and/or records that includes
policies, procedures, actions, activities, or assessments required by the Secu-
rity Rule; and retention, availability, and update requirements related to the
documentation.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 2: Asset Security 175
Proprietary Data
Proprietary data is defined as internally generated data or documents that contain
technical or other types of information controlled by an organization to safeguard
its competitive edge. Proprietary data may be protected under copyright, patent, or
trade secret laws. While there are no specific and different standards or frameworks
to govern the protection of proprietary data, organizations must ensure that the
confidentiality, integrity, and availability of proprietary data are protected. Because
of this, many organizations protect proprietary data with the same types of controls
that are used for PII and PHI.
Security professionals should ensure that proprietary data is identified and properly
categorized to ensure that the appropriate controls are put into place.
2. Private
3. Sensitive
4. Public
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
176 CISSP Cert Guide
data. Access to confidential data usually requires authorization for each access. In
most cases, the only way for external entities to have authorized access to confiden-
tial data is as follows:
■ After signing a confidentiality agreement
■ When complying with a court order
■ As part of a government project or contract procurement agreement
Data that is private includes any information related to personnel, including human
resources records, medical records, and salary information, that is used only within
the organization. Data that is sensitive includes organizational financial information
and requires extra measures to ensure its CIA and accuracy. Public data is data that is
generally shared with the public and would not cause a negative impact on the orga-
nization. Examples of public data include how many people work in the organization
and what products an organization manufactures or sells.
U.S. federal agencies use the Sensitive but Unclassified (SBU) designation when
information is not classified but still needs to be protected and requires strict
controls over its distribution. There are over 100 different labels for SBU, including
■ For official use only (FOUO)
■ Limited official use
■ Sensitive security information
■ Critical infrastructure information
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 2: Asset Security 177
Data that is top secret includes weapon blueprints, technology specifications, spy
satellite information, and other military information that could gravely damage
national security if disclosed. Data that is secret includes deployment plans, missile
placement, and other information that could seriously damage national security if
disclosed. Data that is confidential includes strength of forces in the United States
and overseas, technical information used for training and maintenance, and other
information that could seriously affect the government if unauthorized disclosure
occurred. Data that is sensitive but unclassified includes medical or other personal
data that might not cause serious damage to national security if disclosed but could
cause citizens to question the reputation of the government and may even lead to
legal battles with lawsuits. Military and government information that does not fall
into any of the four other categories is considered unclassified and usually available
to the public based on the Freedom of Information Act.
NOTE Enacted on July 4, 1966, and taking effect one year later, the Freedom of
Information Act (FOIA) provides a powerful tool to advocates for access to informa-
tion. Under the FOIA, anyone may request and receive any records from federal
agencies unless the documents are officially declared exempt based upon specific cate-
gories, such as top secret, secret, and confidential. To learn more about how to explore
for FOIA data or make a FOIA request, visit www.foia.gov.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
178 CISSP Cert Guide
The environment where the media will be stored is also important. For example,
damage could occur to magnetic media above 100 degrees Fahrenheit (38 degrees
Celsius).
Media marking refers to the use of human-readable information about the media,
while media labeling refers to the use of security attributes in internal data structures.
Marking is usually written on the media itself so the correct media can be easily
identified. Labeling is internal to the media itself. A backup tape may be marked
with a server name or other identifier of the asset to which the backup belongs. If an
administrator accesses the backups on the backup tape, each backup will be labeled
with a descriptive name that usually includes the date, time, and type of backup. In
addition, ACLs may be configured on the different backup files to limit the users
who can access the backup files.
Labeling is the vehicle for communicating the assigned classification to custodians,
users, and applications (for example, access control and DLP). Labels make it easy to
identify the data classification. Labels can take many forms: electronic, print, audio,
or visual. Labeling recommendations are tied to media type. In electronic form, the
classification label should be a part of the document name (for example, Customer
Transaction History_Protected). On written or printed documents, the classifica-
tion label should be clearly watermarked, as well as in either the document header
or footer. For physical media, the classification label should be clearly marked on the
case using words or symbols.
Destruction
During media disposal, you must ensure no data remains on the media. The most
reliable, secure means of removing data from magnetic storage media, such as a
magnetic tape cassette, is through degaussing, which exposes the media to a powerful,
alternating magnetic field. It removes any previously written data, leaving the media
in a magnetically randomized (blank) state. More information on the destruction of
media is given earlier in this chapter, later in the “Data Remanence and Destruc-
tion” section, and in Chapter 7, “Security Operations.”
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 2: Asset Security 179
Strategy
Plan
Dispose
Design
Asset
Modify Life Cycle
Procure
Maintain
Operate
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
180 CISSP Cert Guide
In a typical life cycle, an asset goes through the enrollment, operation, and end-
of-life phases. The enrollment process involves manual IT staff activities, such as
assigning and tagging the asset with a serial number and barcode, loading a baseline
IT image, assigning the asset to an owner, and, finally, recording the serial number
as well as other attributes into a database. The attributes might also include primary
location, hardware model, baseline IT image, and owner. This process can also be
referred to as the inventory phase.
As the asset goes through the operations phase, changes can occur. Such changes
could include introduction of new or unauthorized software, the removal of certain
critical software, or the removal of the physical asset itself from the enterprise.
These changes need to be tracked and recorded. As a consequence, asset monitoring,
anomaly detection, reporting, and policy enforcement are the primary activities in
this phase.
The assets within the enterprise are monitored using installed agents that reside on
the asset, as well as network-based monitoring systems that scan and capture net-
work traffic. These monitoring systems collect data from and about the assets and
send periodic reports to the analytics engine.
As an asset reaches the end of its operational life, it goes through activities within the
end-of-life phase that include returning the asset to IT support for data removal and
removing the serial number from the registration database and other associated data-
bases. Finally, the asset is prepared for physical removal from the enterprise facility.
Asset management includes the operate, maintain, and modify phases of the asset
life cycle. After an asset is configured as it should be with all updates and settings,
administrators should document the configuration baseline, which is a description
of an asset’s attributes at a point in time, which serves as a basis for defining change.
(Configuration and change management are discussed in more detail in Chapter 7.)
As part of asset management, an asset’s security and configuration baseline should
be enforced by configuration management agents, and installed software is captured
by software asset management agents. Both categories of agents forward reports to
their respective servers, which serve as data storage facilities. Reports can be com-
piled based on the data received from the agents and sent to those responsible for
managing the assets. Regular examination of these reports should be a priority to
ensure that assets have the appropriate security controls.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 2: Asset Security 181
Organizations should ensure that any information they collect and store is managed
throughout the life cycle of that information. If no information life cycle is followed,
the data would be retained indefinitely, never discarded, and rarely, if ever, updated.
Security professionals must therefore ensure that data owners and custodians under-
stand the information life cycle.
For most organizations, the five phases of the information life cycle are as follows:
1. Create/receive
2. Distribute
3. Use
4. Maintain
5. Dispose/store
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
182 CISSP Cert Guide
When data becomes old, invalid, and not fit for any further use, it is considered to
be in the disposition stage. You should either properly dispose of it or ensure that it
is securely stored. Some organizations must maintain data records for a certain num-
ber of years per local, state, or federal laws or regulations. This type of data should
be archived for the required period. In addition, any data that is part of litigation
should be retained as requested by the court of law, and organizations should follow
appropriate chain of custody and evidence documentation processes. Data archival
and destruction procedures should be clearly defined by the organization.
All organizations need policies in place for the retention and destruction of data.
Data retention and destruction must follow all local, state, and government regula-
tions and laws. Documenting proper procedures ensures that information is main-
tained for the required time to prevent financial fines and possible incarceration of
high-level organizational officers. These procedures must include both the retention
period and destruction process.
Figure 2-2 shows the information life cycle.
Databases
Databases have become the technology of choice for storing, organizing, and analyz-
ing large sets of data. End users who use data from databases generally access a data-
base though a client interface. As the need arises to provide access to entities outside
the enterprise, the opportunities for misuse increase. In the following sections,
concepts necessary to discuss database security are covered as well as the security
concerns surrounding database management and maintenance.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 2: Asset Security 183
■ Network
■ Object-oriented
■ Object-relational
The relational model uses attributes (columns) and tuples (rows) to organize the data
in two-dimensional tables. Each cell in the table represents the intersection of an
attribute, and a tuple represents a record.
When working with relational database management systems (RDBMSs), you
should understand the following terms:
■ Relation: A connection between one or more tables. One column in a table is a
primary key that relates to another table as a foreign key.
■ Tuple: A row in a table.
■ Attribute: A column in a table.
■ Schema: Description of a relational database.
■ Record: A collection of related data items.
■ Base relation: In SQL, a relation that is actually existent in the database.
■ View: The set of data derived from one or more tables or views available to a
given user. Security is enforced through the use of views.
■ Degree: The number of columns in a table.
■ Cardinality: The number of rows in a relation.
■ Domain: The set of allowable values that an attribute can take.
■ Primary key: One or more columns that make each row of a table unique.
■ Foreign key: An attribute in one relation that has values matching the primary
key in another relation. Matches between the foreign key and the primary key
are important because they represent references from one relation to another
and establish the connection among these relations.
■ Candidate key: An attribute in a row that uniquely identifies that row.
■ Referential integrity: A requirement that for any foreign key attribute,
the referenced relation must have a tuple with the same value for its
primary key.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
184 CISSP Cert Guide
An important element of database design that ensures that the attributes in a table
depend only on the primary key is a process called normalization. Normalization
includes
■ Eliminating repeating groups by putting them into separate tables
■ Eliminating redundant data (occurring in more than one table)
■ Eliminating attributes in a table that are not dependent on the primary key of
that table
In the hierarchical database model, data is organized into a hierarchy. An object can
have one child (an object that is a subset of the parent object), multiple children,
or no children. To navigate this hierarchy, you must know the branch in which the
object is located. An example of the use of this system is the Windows Registry and a
Lightweight Directory Access Protocol (LDAP) directory.
In the network model, as in the hierarchical model, data is organized into a hierarchy,
but unlike the hierarchical model, objects can have multiple parents. Because of this,
knowing which branch to find a data element in is not necessary because there will
typically be multiple paths to it.
The object-oriented model can handle a variety of data types and is more dynamic
than a relational database. Object-oriented database (OODB) systems are useful in
storing and manipulating complex data, such as images and graphics. Consequently,
complex applications involving multimedia, computer-aided design (CAD), video,
graphics, and expert systems are more suited to the object-oriented model. It also
has the characteristics of ease of reusing code and analysis and reduced maintenance.
Objects can be created as needed, and the data and the procedures (or methods) go
with the object when it is requested. A method is the code defining the actions that
the object performs in response to a message. This model uses some of the same
concepts of a relational model. In the object-oriented model, the relation, column,
and tuple (relational terms) are referred to as class, attribute, and instance objects.
The object-relational model is the marriage of object-oriented and relational technol-
ogies, combining the attributes of both. This is a relational database with a software
interface that is written in an object-oriented programming (OOP) language. The
logic and procedures are derived from the front-end software rather than the data-
base. This means each front-end application can have its own specific procedures.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 2: Asset Security 185
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
186 CISSP Cert Guide
associations between data and correlate these associations into metadata, which is
data about data. It allows for more sophisticated inferences (sometimes called busi-
ness intelligence [BI]) to be made about the data. Three measures should be taken
when using data warehousing applications:
■ Control metadata from being used interactively.
■ Monitor the data purging plan.
■ Reconcile data moved between the operations environment and data
warehouse.
Database Maintenance
Database administrators must regularly conduct database maintenance. Databases
must be backed up regularly. All security patches and updates for the hardware and
software, including the database software, must be kept up to date. Hardware and
software upgrades are necessary as organizational needs increase and as technology
advances.
Security professionals should work with database administrators to ensure that
threat analysis for databases is performed at least annually. They should also work
to develop the appropriate mitigations and controls to protect against the identified
threats.
Database Threats
Security threats to databases usually revolve around unwanted access to data.
Two security threats that exist in managing databases involve the processes of
aggregation and inference. Aggregation is the act of combining information from
various sources. It can become a security issue with databases when users do not
have access to a given set of data objects but do have access to them individually, or
at least some of them, and are able to piece together the information to which they
should not have access. On the other hand, an inference occurs when the attacker
uses several pieces of generic nonsensitive information to determine or learn specific
sensitive data.
Two types of access measures can be put in place to help prevent access to inferable
information:
■ Content-dependent access control bases access on the sensitivity of the data. For
example, a department’s manager might have access to the salaries of the
employees in that department but not to the salaries of employees in other
departments. The cost of this measure is an increased processing overhead.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 2: Asset Security 187
Database Views
Access to the information in a database is usually controlled through the use of
database views. A view refers to the given set of data that a user or group of users
can see when they access the database. Before a user is able to use a view, that user
must have permission on both the view and all dependent objects. Views can be used
to enforce the concept of least privilege.
Database Locks
Database locks are used when one user is accessing a record that prevents another
user from accessing the record at the same time to prevent edits until the first user is
finished. Locking not only provides exclusivity to writes but also controls reading of
unfinished modifications or uncommitted data.
Polyinstantiation
Polyinstantiation is a process used to prevent data inference violations like the
database threats previously covered. It does this by enabling a relation to contain
multiple tuples with the same primary keys, with each instance distinguished by a
security level. It prevents low-level database users from inferring the existence of
higher-level data.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
188 CISSP Cert Guide
Data Owner
Data owners must understand the way in which the data they are responsible for
is used and when that data should be released. They must also determine the data’s
value to and impact on the organization. A data owner should understand what it
will take to restore or replace data and the cost that will be incurred during this
process. Finally, data owners must understand when data is inaccurate or no longer
needed by the organization.
In most cases, each business unit within an organization designates a data owner,
who must be given the appropriate level of authority for the data for which that
owner is responsible. Data owners must understand any intellectual property rights
and copyright issues for the data. Data owners are responsible for ensuring that the
appropriate agreements are in place if third parties are granted access to the data.
Security professionals must work with the owners of information and assets to deter-
mine who should have access to the information and assets, the value of the informa-
tion and assets, and the controls that should be implemented to protect the privacy
of information and assets. As a result, security professionals must understand the role
of data owners, system owners, and business/mission owners.
Unfortunately, in most cases, data owners do not own the systems on which their
data resides. Therefore, it is important that the data owner work closely with the
system owner. Even if the appropriate ACLs are configured for the data, the data can
still be compromised if the system on which the data resides is not properly secured.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 2: Asset Security 189
Data Controller
Data controllers determine the “why” and “how” personal data is processed. In some
cases, the data controller role and the data owner role are the same. However, orga-
nizations should separate these roles when the data being stored and managed has
special protections or laws that affect it. The data controller can focus on maintain-
ing the privacy and confidentiality of the data.
In the European Union’s General Data Protection Regulation (GDPR) and other
privacy laws, the data controller has the most responsibility when it comes to pro-
tecting the privacy and rights of the data’s subject, such as the user of a website. Sim-
ply put, the data controller controls the procedures and purpose of data usage. Data
controllers should ensure that any data collected adheres to the applicable laws and
regulations. The data controller is responsible for documenting how the data will be
used.
Data Custodian
Data custodians must understand the levels of data access that can be given to users.
Data custodians work with data owners to determine the level of access that should
be given. This is an excellent example of separations. By having separate roles such
as data owners and data custodians, an organization can ensure that no single role is
responsible for data access. This setup prevents fraudulent creation of user accounts
and assignment of rights.
Data custodians should understand data policies and guidelines. They should
document the data structures in the organization and the levels of access given. They
are also responsible for data storage, archiving, and backups. Finally, they should be
concerned with data quality and should therefore implement the appropriate audit
controls.
Centralized data custodians are common. Data owners give the data custodians the
permission level that users and groups should be given. Data custodians actually
implement the access control lists (ACLs) for the devices, databases, folders, and
files.
System Owners
System owners are responsible for the systems on which data resides. While the data
owner owns the data and the data custodian configures the appropriate permissions
for user access to the data, the system owner must determine the parameters that
govern the system, such as what types of data and applications can be stored on the
system, who owns the data and applications, and who determines the users who can
access the data and applications.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
190 CISSP Cert Guide
System Custodians
System custodians are responsible for administering the systems on which data
resides based on the parameters set forth by the system owner.
Business/Mission Owners
Business or mission owners must ensure that all operations fit within the business
goals and mission. This task includes ensuring that collected data is necessary for
the business to function. Collecting unnecessary data wastes time and resources.
Because the business/mission owner is primarily concerned with the overall busi-
ness, conflicts between data owners, data custodians, and system owners may need to
be resolved by the business/mission owner, who will need to make the best decision
for the organization. For example, say that a data owner requests more room on a
system for the storage of data. The data owner strongly believes that the new data
being collected will help the sales team be more efficient. However, storage on the
system owner’s asset is at a premium. The system owner is unwilling to allow the
data owner to use the amount of space requested. In this case, the business/mission
owner would need to review both sides and decide whether collecting and storing
the new data would result in enough increased revenue to justify the cost of allowing
the data owner more storage space. If so, it may also be necessary to invest in more
storage media for the system or to move the data to another system that has more
resources available. But keep in mind that moving the data would possibly involve
another system owner.
Security professionals should always be part of these decisions because they under-
stand the security controls in place for any systems involved and the security con-
trols needed to protect the data. Moving the data to a system that does not have the
appropriate controls may cause more issues than just simply upgrading the system
on which the data currently resides. Only a security professional is able to objec-
tively assess the security needs of the data and ensure that they are met.
Data Processors
Data processors are any personnel within an organization who process the data that
has been collected throughout the entire life cycle of the data. If any individual
accesses the data in any way, that individual can be considered a data processor.
However, in some organizations, data processors are only those individuals who can
enter or change data.
No matter which definition an organization uses, it is important that security
professionals work to provide training to all data processors on the importance of
asset privacy, especially data privacy. This training is usually included as part of the
security awareness training. It is also important to include any privacy standards or
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 2: Asset Security 191
policies that are based on laws and regulations. After personnel have received the
appropriate training, they should sign a statement saying that they will abide by the
organization’s privacy policy.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
192 CISSP Cert Guide
Data Location
Data location is the physical location of the data when it is being stored, transmitted,
and accessed. Many laws and regulations affect what kinds of data can be stored and
how that data must be protected based on the citizenship of the data subject. But
there are also laws and regulations that can affect data based on where it is stored.
This issue is complicated by the fact that so many organizations are implementing
cloud solutions for data storage.
Security professionals should ensure that organizations keep backup copies on site
and another backup copy off site. If a disaster, such as a tornado, destroys the pri-
mary location, the organization would still have a backup copy stored off site.
The decision of how far off site to store the backup needs to be considered. If the
backup is stored at the same location, it could be destroyed in the same tornado.
Even if the backup was stored three miles away, it is possible a tornado could destroy
both locations.
Some organizations maintain data in data centers. The organization may replicate
this data to one or more other data centers to maintain critical data availability.
These data centers are typically located in separate geographical locations. Orga-
nizations should verify the cloud storage locations to ensure they are in a separate
geographical location.
Organizations such as Google, Amazon, and Netflix store data in content data serv-
ers around the country for easy access. Content servers store the content of data at
various locations for users to connect quickly and play the video or order an item
seamlessly.
Data Maintenance
Data maintenance includes efforts to organize and care for data throughout its
lifetime. Maintenance includes updating the data on a regular schedule or when
requested to do so by the data subject. If the data is stored on a single server, updat-
ing the data is easy. If data is stored on multiple servers and other devices, protecting
the data and ensuring it is maintained are much more complicated.
Depending on whether the organization can truly isolate the classified or private
data from unclassified data using separate networks, air gaps or unidirectional
network bridges could be implemented to provide data protection. If an air gap is
implemented, personnel would need to manually add data to the classified data net-
work. If network bridges are used, personnel could copy data from the unclassified
data network to the classified data network, provided the policies were appropriately
configured.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 2: Asset Security 193
Organizations should routinely review data policies to ensure that policies are
updated and being followed. Security professionals should review recent data
breaches and determine the root cause so that controls can be installed or updated.
Data Retention
Data retention involves retaining and maintaining important data as long as it is
needed or required by law and destroying it when it is no longer needed. An organi-
zation’s data policy typically identifies retention time frames for data based on data
types. Some laws and regulations dictate the time that an organization should retain
data, such as three years, seven years, or even indefinitely. Data can even be placed
on legal hold based on pending litigation. Organizations have the responsibility of
complying with all laws, regulations, and legal holds. However, even in the absence
of external requirements, an organization should establish policies on the length for
data retention of the different types of data.
For example, organizations may retain financial data for a different period of time
than it retains PII. Audit logs may need different and longer or shorter retention
periods than financial data or PII because audit logs allow security professionals to
reconstruct actions that occurred during a breach. If appropriate retention policies
are not in place, valuable data can be lost earlier than expected. A longer retention
period means that the organization will need more backup media.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
194 CISSP Cert Guide
powerful, alternating magnetic field, removing any previously written data and
leaving the media in a magnetically randomized (blank) state.
■ Destruction: Destruction involves destroying the media on which the data
resides. Encryption scrambles the data on the media, thereby rendering it
unreadable without the encryption key. Destruction is the physical act of
destroying media in such a way that it cannot be reconstructed. Shredding
involves physically breaking media to pieces. Pulverizing involves reducing
media to dust. Pulping chemically alters the media. Finally, burning incinerates
the media.
The majority of these countermeasures work for magnetic media. However, solid-
state drives present unique challenges because they cannot be overwritten. Most
solid-state drive vendors provide sanitization commands that can be used to erase
the data on the drive. Security professionals should research these commands to
ensure that they are effective. Another option for these drives is to erase the crypto-
graphic key. Often a combination of these methods must be used to fully ensure that
the data is removed.
Data remanence is also a consideration when using any cloud-based solution for
an organization. Security professionals should be involved in negotiating any con-
tract with a cloud-based provider to ensure that the contract covers data remanence
issues, although it is difficult to determine that the data is properly removed. Using
data encryption is a great way to ensure that data remanence is not a concern when
dealing with the cloud.
Data Audit
While an organization may have the most up-to-date data management plan in
place, data management alone is not enough to fully protect data. Organizations
must also put into place a data auditing mechanism that will help administrators
identify vulnerabilities before attacks occur. Auditing mechanisms can be configured
to monitor almost any level of access to data. However, auditing mechanisms affect
the performance of the systems being audited. Always carefully consider any perfor-
mance impact that may occur as a result of the auditing mechanism. Although audit-
ing is necessary, it is important not to audit so many events that the auditing logs are
littered with useless or unused information.
Confidential or sensitive data should be more carefully audited than public informa-
tion. As a matter of fact, it may not even be necessary to audit access to public infor-
mation. But when considering auditing for confidential data, an organization may
decide to audit all access to that data or just attempts to change the data. Only the
organization and its personnel are able to develop the best auditing plan.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 2: Asset Security 195
Finally, auditing is good only if there is a regular review of the logs produced.
Administrators or security professionals should obtain appropriate training on
reviewing audit logs. In addition, appropriate alerts should be configured if certain
critical events occur. For example, if multiple user accounts are locked out due to
invalid login attempts over a short period of time, this lockout may be an indication
that systems are experiencing a dictionary or other password attack. If an alert were
scheduled to notify administrators when a certain number of lockouts occur over
a period of time, administrators may be able to curtail the issue before successful
access is achieved by the attacker.
Asset Retention
Asset and data retention requirements vary based on several factors, including asset
or data type, asset or data age, and legal and regulatory requirements. Security
professionals must understand where data is stored and the type of data stored. In
addition, security professionals should provide guidance on managing and archiving
data. Therefore, data retention policies must be established with the help of orga-
nizational personnel. The assets that store data will use the data retention policies
to help guide the asset retention guidelines. If a storage asset needs to be replaced,
a thorough understanding of the data that resides on the asset is essential to ensure
that data is still retained for the required period.
A retention policy usually contains the purpose of the policy, the portion of the
organization affected by the policy, any exclusions to the policy, the personnel
responsible for overseeing the policy, the personnel responsible for data, the data
types covered by the policy, and the retention schedule. Security professionals
should work with data owners to develop the appropriate data retention policy for
each type of data the organization owns. Examples of data types include, but are not
limited to, human resources data, accounts payable/receivable data, sales data, cus-
tomer data, and email.
Security professionals should ensure that asset retention policies also are created and
enforced. While asset retention policies are often governed by the data retention
policies, organizations may find it necessary to replace physical assets while need-
ing to retain the data stored on the asset. Security professionals should ensure that
the data residing on an asset that will be retired is fully documented and properly
retained as detailed by the data retention policy. Doing so will usually require that
the data is moved to another asset. For example, suppose an organization stores all
the PII data it retains on a SQL server located on the organization’s demilitarized
zone (DMZ). If the organization decides to replace the SQL server with a new
Windows Server computer, it will be necessary to back up the PII from the old
server and restore it to the new server. In addition, the organization may want to
retain the backup of the PII and store it in a safe or other secured location, in case
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
196 CISSP Cert Guide
the organization should ever need it. Then the organization must ensure that the
PII cannot be retrieved from the hard drive on the old server. Doing so may require
physical destruction of the hard drive.
To design asset and data retention policies, the organization should answer the
following questions:
■ What are the legal/regulatory requirements and business needs for the assets/
data?
■ What are the types of assets/data?
■ What are the retention periods and destruction needs for the assets/data?
The personnel who are most familiar with each asset and data type should work with
security professionals to determine the asset and data retention policies. For exam-
ple, human resources personnel should help design the data retention policies for all
human resources assets and data. While designing asset and data retention policies,
an organization must consider the media and hardware that will be used to retain
the data. Then, with this information in hand, the organization and/or business unit
should draft and formally adopt the asset and data retention policies.
As part of asset retention, security professionals need to understand two terms: end
of life (EOL) and end of support (EOS). These terms apply to any software or hard-
ware asset. EOL is the date when a vendor stops offering a product for sale. How-
ever, the product is still supported (such as warranties, updates, and repairs) by the
vendor, at least for a while. This support usually includes deploying security updates
for the product. EOS, also referred to as end-of-service life (EOSL), is the date when
all vendor support ends. Organizations sometimes retain legacy hardware to access
older data, such as data on tape drives. Legacy applications can also be retained if
the application provides a particular function and a replacement application has not
been selected. If legacy hardware or applications need to be retained, security pro-
fessionals should take measures to ensure that they are deployed in a manner that
prevents remote access, including deploying them on an isolated network.
After the asset and data retention policies have been created, personnel must be
trained to comply with these policies. Auditing and monitoring should be configured
to ensure data retention policy compliance. Periodically, data owners and processors
should review the data retention policies to determine whether any changes need
to be made. All data retention policies, implementation plans, training, and audit-
ing should be fully documented. In addition, IT support staff should work to ensure
that the assets on which the data is stored are kept up to date with the latest security
patches and updates.
Remember that it is not possible to find a one-size-fits-all solution for all organiza-
tions because of the different types of information, assets, or data. Only those most
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 2: Asset Security 197
familiar with each asset or data type can determine the best retention policy for
that asset or data. Although a security professional should be involved in the design
of the retention policies, the security professional is there to ensure that security
is always considered and that retention policies satisfy organizational needs. The
security professional should act only in an advisory role and should provide expertise
when needed.
Data Security
Data security includes the procedures, processes, and systems that protect data from
unauthorized access. Unauthorized access includes unauthorized digital and physical
access. Data security also protects data against any threats that can affect data confi-
dentiality, integrity, or availability.
To provide data security, an organization should implement security using a
defense-in-depth strategy, as discussed in Chapter 1. If a single layer of access is not
analyzed, then data is at risk. For example, you can implement authentication mech-
anisms to ensure that users must authenticate before digitally accessing the network.
But if you do not have the appropriate physical security controls in place to prevent
unauthorized access to your facility, an attacker can easily gain access to your net-
work just by connecting an unauthorized device to the network.
Security professionals should make sure their organization implements measures
and safeguards for any threats that have been identified. In addition, security profes-
sionals must remain vigilant and constantly be on the lookout for new threats.
Data States
Three basic data states must be considered as part of asset security. These three
states are data at rest, data in transit, and data in use. Security professionals must
ensure that controls are implemented to protect data in all three of these states.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
198 CISSP Cert Guide
Data at Rest
Data at rest is data that is being stored and not being actively used at a certain point
in time. While data is at rest, security professionals must ensure that the confiden-
tiality, integrity, and availability of the data are ensured. Confidentiality can be pro-
vided by implementing data encryption. Integrity can be provided by implementing
the appropriate authentication mechanisms and ACLs so that only authenticated,
authorized users can edit data. Availability can be provided by implementing a fault-
tolerant storage solution, such as RAID.
Data in Transit
Data in transit is data that is being transmitted over a network or sent via a physical
medium, like a DVD or flash drive. While data is being transmitted, security pro-
fessionals must ensure that the confidentiality, integrity, and availability of the data
are ensured. Confidentiality can be provided by implementing link encryption or
end-to-end encryption. As with data at rest, authentication and ACLs can help with
data integrity of data in transit. Availability can be provided by implementing server
farms and dual backbones.
Data in Use
Data in use is data that is being accessed or manipulated in some way. Data manipu-
lation includes editing the data and compiling the data into reports. The main issues
with data in use are to ensure that only authorized individuals have access to or can
read the data and that only authorized changes are allowed to the data. Confiden-
tiality can be provided by using privacy or screen filters to prevent unauthorized
individuals from reading data on a screen. It can also be provided by implementing a
document shredding policy for all reports that contain PII, PHI, proprietary data, or
other confidential information. Data integrity can be provided by implementing the
appropriate controls on the data. Data locks can prevent data from being changed,
and data rules can ensure that changes occur only within defined parameters. For
certain data types, organizations may decide to implement two-person controls to
ensure that data changes are entered and verified. Availability can be provided by
using the same strategies as used for data at rest and data in transit. In addition,
organizations may wish to implement locks and views to ensure that users need-
ing access to data obtain the most up-to-date version of that data. Data in use is the
most difficult data to protect.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 2: Asset Security 199
gives the user the appropriate permissions for the data. But these two steps are an
oversimplification of the process. Security professionals must ensure that the organi-
zation understands issues such as the following:
■ Are the appropriate data policies in place to control the access and use of data?
■ Do the data owners understand the access needs of the users?
■ What are the different levels of access needed by the users?
■ Which data formats do the users need?
■ Are there subsets of data that should have only restricted access for users?
■ Of the data being collected, is there clearly identified private versus public
data?
■ Is data being protected both when it is at rest and when it is in transit?
■ Are there any legal or jurisdictional issues related to data storage location, data
transmission, or data processing?
While the data owners and data custodians work together to answer many of these
questions, security professionals should be involved in guiding them through this
process. If a decision is made to withhold data, the decision must be made based
on privacy, confidentiality, security, or legal/regulatory restrictions. The criteria by
which these decisions are made must be recorded as part of an official organizational
data policy.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
200 CISSP Cert Guide
NOTE Data retention is a set of rules within an organization that dictates types
of unaltered data that must be kept and for how long. Archiving is the process of
securely storing unaltered data for later potential retrieval. Data should be retained in
accordance with a documented schedule, stored securely in accordance with its clas-
sification, and securely disposed of at the end of the retention period.
When considering data storage and archiving, security professionals need to ensure
that the different aspects of storage are properly analyzed to ensure appropriate
deployment. This includes analyzing server hardware and software, database main-
tenance, data backups, and network infrastructure. Each part of the digital trail that
the data will travel must be understood so that the appropriate policies and proce-
dures can be put into place to ensure asset privacy.
Data that is still needed and useful to the organization should remain in primary
storage for easy access by users. Data marked for archiving must be moved to some
sort of backup media or secondary storage. Organizations must determine the form
of data archive storage that will best suit their needs. For some business units in
the organization, it may be adequate to archive the data to magnetic tape or opti-
cal media, such as DVDs. With these forms of storage, restoring the data from the
archive can be a laborious process. For business units that need an easier way to
access the archived data, some sort of solid-state or hot-pluggable drive technology
may be a better way to go.
No matter which media your organization chooses for archival purposes, security
professionals must consider the costs of the mechanisms used and the security of
the archive. Storing archived data that has been backed up to DVD in an unlocked
file cabinet may be more convenient for a business unit, but it does not provide any
protection of the data on the DVD. In this case, the security professional may need
to work with the business unit to come up with a more secure storage mechanism
for data archives. When data is managed centrally by the IT or data center staff,
personnel usually better understand security issues related to data storage and may
therefore not need as much guidance from security professionals.
Baselines
One practice that can make maintaining security simpler is to create and deploy
standard images that have been secured with security baselines. A baseline is a set of
configuration settings that provides a floor of minimum security in the image being
deployed. Organizations should capture baselines for all devices, including network
devices, computers, host computers, and virtual machines.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 2: Asset Security 201
Baselines can be controlled through the use of Group Policy in Windows. These
policy settings can be made in the image and applied to both users and computers.
These settings are refreshed periodically through a connection to a domain control-
ler and cannot be altered by the user. It is also quite common for the deployment
image to include all of the most current operating system updates and patches.
When a network makes use of these types of technologies, the administrators have
created a standard operating environment. The advantages of such an environment
are more consistent behavior of the network and simpler support issues. System
scans should be performed weekly to detect changes from the baseline.
Security professionals should help guide their organization through the process of
establishing baselines. If an organization implements very strict baselines, it will pro-
vide a higher level of security that may actually be too restrictive. If an organization
implements a very lax baseline, it will provide a lower level of security that will likely
result in security breaches. Security professionals should understand the balance
between protecting organizational assets and allowing users access, and they should
work to ensure that both ends of this spectrum are understood.
Standards Selection
Because organizations need guidance on protecting their assets, security profession-
als must be familiar with the standards that have been established. Many standards
organizations have been formed, including NIST, the U.S. Department of Defense
(DoD), and the International Organization for Standardization (ISO).
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
202 CISSP Cert Guide
The U.S. DoD Instruction 8510.01 establishes a certification and accreditation pro-
cess for DoD information systems.
The ISO organization works with the International Electrotechnical Commission
(IEC) to establish many standards regarding information security. The ISO/IEC
standards that security professionals need to understand are covered in Chapter 1.
Security professionals may also need to research other standards, including stan-
dards from the European Network and Information Security Agency (ENISA),
European Union (EU), and U.S. National Security Agency (NSA). It is important
that the organization researches the many standards available and apply the most
beneficial guidelines based on the organization’s needs.
Cryptography
Cryptography, also referred to as encryption, can provide different protection based
on which level of communication is being used. The two types of encryption com-
munication levels are link encryption and end-to-end encryption.
Link Encryption
Link encryption encrypts all the data that is transmitted over a link. In this type of
communication, the only portion of the packet that is not encrypted is the data-
link control information, which is needed to ensure that devices transmit the data
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 2: Asset Security 203
properly. All the information is encrypted, with each router or other device decrypt-
ing its header information so that routing can occur and then re-encrypting before
sending the information to the next device.
If the sending party needs to ensure that data security and privacy are maintained
over a public communication link, then link encryption should be used. This is often
the method used to protect email communication or when banks or other institu-
tions that have confidential data must send that data over the Internet.
Link encryption protects against packet sniffers and other forms of eavesdropping
and occurs at the data link and physical layers of the OSI model. Advantages of link
encryption include: All the data is encrypted, and no user interaction is needed for it
to be used. Disadvantages of link encryption include: Each device that the data must
be transmitted through must receive the key, key changes must be transmitted to
each device on the route, and packets are decrypted at each device.
End-to-End Encryption
End-to-end encryption encrypts less of the packet information than link encryp-
tion. In end-to-end encryption, packet routing information and packet headers and
addresses are not encrypted. As a result, potential hackers can obtain more informa-
tion if a packet is acquired through packet sniffing or eavesdropping.
End-to-end encryption has several advantages. A user usually initiates end-to-end
encryption, which allows the user to select exactly what gets encrypted and how.
It affects the performance of each device along the route less than link encryption
because every device does not have to perform encryption/decryption to determine
how to route the packet.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
204 CISSP Cert Guide
Finally, automatic expiration can be used so that copyrighted material can be shared
as a subscription that blocks access after a certain date.
Pirating is any method of duplicating and distributing copyrighted works and is
used for written material, videos, games, software, and more. DRM can be used to
prevent the copying, printing, and forwarding of protected works.
Digital watermarking can be used to detect, but not prevent, copying of protected
material. In addition, vendors sometimes insert metadata in the file that helps to
identify the original purchaser of the protected content.
Each feature in DRM has advantages and disadvantages. Security professionals
should work with management to perform a full risk analysis prior to deploying a
DRM solution and include only those features that are needed.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 2: Asset Security 205
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
206 CISSP Cert Guide
4. What is the highest level of data classification for private sector systems?
a. Public
b. Sensitive
c. Private
d. Confidential
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 2: Asset Security 207
6. Which organizational role owns a system and must work with other users to
ensure that data is secure?
a. Business owner
b. Data custodian
c. Data owner
d. System owner
2. c. The data owner is responsible for deciding which users have access to data.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
208 CISSP Cert Guide
1. Create/receive
2. Distribute
3. Use
4. Maintain
5. Dispose/store
6. d. The system owner owns a system and must work with other users to ensure
that data is secure.
7. c. The phases of the information life cycle are as follows:
1. Create/receive
2. Distribute
3. Use
4. Maintain
5. Dispose/store
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
This page intentionally left blank
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
This chapter covers the following topics:
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 211
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
212 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
CHAPTER 3
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
214 CISSP Cert Guide
Foundation Topics
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 215
The systems life cycle stages of this standard include concept, development,
production, utilization, support, and retirement. While this standard defines system
life cycle processes, it does not by itself address security during systems engineering.
NIST SP 800-160 is based on ISO/IEC 15288:2015 and discussed in Chapter 1.
To understand engineering using secure design principles, organizations must
understand the difference between objects and subjects and closed versus open
systems.
NOTE Do not confuse closed versus open system with closed versus open source. An open-
source solution uses source code that is known to the public. A closed source solution
uses code that is known only to the manufacturer. Both open-source and closed-
source solutions can be open or closed systems.
Threat Modeling
Threat modeling is the process of identifying potential threats and determining
possible mitigations and countermeasures, if any, for the threats. The process can
provide an organization with an attacker’s profile, likely attack vectors, targeted
asset, and an analysis of the controls or defenses that should be implemented for the
identified threats.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
216 CISSP Cert Guide
Least Privilege
The principle of least privilege is important in the design of systems. Least privilege
means that users are granted access only to the information and resources that are
minimally necessary for them to do their jobs. If the principle of least privilege is
strictly enforced across an organization and the appropriate procedures are in place,
privilege creep, wherein user privileges accumulate over time, will be prevented so
that systems are as secure as possible.
When designing operating system processes, security professionals should ensure
that system processes run in user mode when possible. When a process executes in
privileged mode, the potential for vulnerabilities greatly increases. If a process needs
access to privileged services, it is best to use an application programming interface
(API) to ask for supervisory-mode services.
Related to the principle of least privilege, the principle of least functionality is that
systems and devices should be configured to provide only essential or minimally
required capabilities and specifically prohibit or restrict the use of functions, ports,
protocols, and services.
NOTE The principle of least privilege is also discussed in Chapter 5, “Identity and
Access Management (IAM),” and Chapter 7, “Security Operations.”
Defense in Depth
Communications security management and techniques are designed to prevent,
detect, and correct errors so that the CIA of transactions over networks might be
maintained. Most computer attacks result in a violation of one of the security prop-
erties: confidentiality, integrity, or availability. A defense-in-depth approach refers to
deploying layers of protection. For example, even when you are deploying firewalls,
access control lists (ACLs) should still be applied to resources to help prevent access
to sensitive data in case the firewall is breached.
Secure Defaults
Secure defaults, also referred to as secure by default, is a term used to describe a
condition wherein an application’s or device’s default settings are set to the most
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 217
secure settings possible. If the application or device is reset, these secure defaults
should be maintained. Security professionals should keep in mind that the most
secure settings are not often the most user-friendly settings.
If a technology follows secure defaults principles, the technology will have
embedded, built-in cybersecurity principles. Depending on the technology, device,
or application, best practices in secure defaults should include password prompts,
history, length and strength, the closing of unused ports or services, encryption, and
remote access disablement.
Fail Securely
To understand the concept of fail securely, security professionals must understand
two related terms: fail safe and fail secure. Most often these terms are used in
conjunction with physical controls, particularly door locks.
A product that is fail safe is unlocked when power is removed. Personnel there-
fore can enter or leave the area. A product that is fail secure is locked when power
is removed. In this case, personnel can leave the area, but they must use a key to
enter the area. These terms refer to the status of the secure side of the door. Most
products provide free egress or exit whether they are fail safe or fail secure.
Fail-safe products should never be used for areas of high security. Simply cutting
the power would give a threat actor access to the security area. Security profession-
als should ensure that public or general areas use fail-safe products, whereas secure
areas, such as data centers, use fail-secure products.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
218 CISSP Cert Guide
by a department head or asset owner, and the person who assigns the appropriate
permissions can only do so with the proper request made by the data or asset owner.
Keep It Simple
Keep it simple, also referred to as keep it simple, stupid (KISS), is a design prin-
ciple that states a design and/or system should be as simple as possible and avoid
unneeded complexity. Simplicity guarantees the greatest levels of user acceptance
and interaction.
Security professionals should ensure that organizations focus on implementing
simple controls to provide security for confidentiality, integrity, and availability. To
offset the need for controls to be simple, organizations should deploy a layered secu-
rity model.
Zero Trust
Zero trust is a security model based on the principle of maintaining strict access
controls and not trusting anyone or anything by default. Zero trust requires strict
identity verification for every person and device trying to access resources on a pri-
vate network, regardless of whether they are sitting within or outside of the network
perimeter.
In a zero trust environment, each access request is fully identified, authenticated,
authorized, and encrypted before granting access. A zero trust environment is built
upon five fundamental elements:
■ The person or device is always assumed to be hostile.
■ External and internal threats exist at all times.
■ Location is not sufficient for deciding trust in a person or device.
■ Every device, user, and communication is identified, authenticated, and
authorized.
■ Policies must be dynamic and calculated from as many sources of data as
possible.
Privacy by Design
Privacy by design is a term that implies data protection through technology design.
Behind this is the thought that data protection in data processing procedures is best
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 219
Using a trust but verify approach ensures that checks and balances are implemented
and that the appropriate controls are deployed to meet the expectations of the
organization.
Shared Responsibility
Shared responsibility is a principle that requires that each user is accountable for
different aspects of security and all must work together to ensure full coverage. All
personnel within an organization must be aware of their responsibilities regard-
ing security. During annual security and awareness training, personnel should be
given scenarios wherein they see when and how to report security issues they may
encounter.
All organizations should implement a security issues reporting portal so that
it becomes part of organizational culture. This portal should include a feature
that allows personnel to anonymously report security issues or violations that
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
220 CISSP Cert Guide
Availability describes what percentage of the time the resource or the data is
available. This is usually measured as a percentage of “up” time, with 99.9 percent up
time representing more availability than 99 percent up time. Making sure that the
data is accessible when and where it is needed is a prime goal of security.
Confinement
Confinement is a term used to describe isolating processes or machines/subsystems
in a larger system. When a process is confined, the process is only allowed to read
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 221
from and write to certain memory locations and resources. Confinement is usually
carried out using the operating system, through a confinement service, or using a
hypervisor.
Bounds
On a system, processes run at an assigned authority level, which defines what the
process can do. Two common authority levels are user and kernel. The bounds of
a process set limits on the memory addresses and resources the process can access.
The bounds logically segment memory areas for each process to use. Highly secure
systems will physically bound the processes, meaning that the processes run in
memory areas that are physically separated from each other. Logically bounded
memory is cheaper than but not as secure as physically bounded memory.
Isolation
A process runs in isolation when it is confined using bounds. Process isolation
ensures that any actions taken by the process will only affect the memory and
resources used by the isolated process. Isolation prevents other processes,
applications, or resources from accessing the memory or resources of another.
Security Modes
A mandatory access control (MAC) system operates in different security modes at
various times, based on variables such as sensitivity of data, the clearance level of the
user, and the actions users are authorized to take. The following sections provide
descriptions of these modes.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
222 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 223
security operations of a system. In the real world, the use of formal models is often
skipped because it delays the design process somewhat (although the cost might
be a lesser system). This section discusses some basic model types along with some
formal models derived from the various approaches available.
A security model maps the desires of the security policy makers to the rules that a
computer system must follow. Different model types exhibit various approaches to
achieving this goal. The specific models that are contained in the section “Security
Models” incorporate various combinations of these model types.
Matrix-Based Models
A matrix-based model organizes tables of subjects and objects indicating what
actions individual subjects can take upon individual objects. This concept is found
in other model types as well, such as the lattice model discussed in the previous
section. Access control to objects is often implemented as a control matrix. It is
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
224 CISSP Cert Guide
a straightforward approach that defines access rights to subjects for objects. The
two most common implementations of this concept are ACLs and capabilities. In
its table structure, a row would indicate the access one subject has to an array of
objects. Therefore, a row could be seen as a capability list for a specific subject. It
consists of the following parts:
■ A list of objects
■ A list of subjects
■ A function that returns an object’s type
■ The matrix itself, with the objects making the columns and the subjects
making the rows
Noninterference Models
In multilevel security models, the concept of noninterference prescribes those
actions that take place at a higher security level but do not affect or influence those
that occur at a lower security level. Because this model is less concerned with the
flow of information and more concerned with a subject’s knowledge of the state of
the system at a point in time, it concentrates on preventing the actions that take
place at one level from altering the state presented.
One of the attack types that this conceptual model is meant to prevent is interfer-
ence, which occurs when someone has access to information at one level that allows
them to infer information about another level.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 225
The prevention of illegal information flow among the entities is the aim of an infor-
mation flow model.
Take-Grant Model
A system in the Take-Grant model is represented as a directed graph, called a
protection graph. The subjects and objects of the computer system are the vertices,
and the access rights of subjects to objects are represented by arcs. Although the
Take-Grant model uses standard access rights like read and write, the Take-Grant
model includes two additional access rights:
■ Take (t) is the right to take any access rights from the subject.
■ Grant (g) is the right to assign its access rights to any subject.
Figure 3-1 shows a graph of the Take-Grant model’s Take and Grant access rights.
t Y
X Y g
{r, w} X
{r, w}
Z
Z
t
X Y Y
g
{r, w}
X {r}
{r}
{r, w}
Z Z
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
226 CISSP Cert Guide
Security Models
A number of formal models incorporating the concepts discussed in the previous
section have been developed and used to guide the security design of systems. The
following sections discuss some of the more widely used or important security mod-
els, including the following:
■ Bell-LaPadula model
■ Biba model
■ Clark-Wilson integrity model
■ Lipner model
■ Brewer-Nash (Chinese Wall) model
■ Graham-Denning model
■ Harrison-Ruzzo-Ullman model
■ Goguen-Meseguer model
■ Sutherland model
Bell-LaPadula Model
The Bell-LaPadula model was the first mathematical model of a multilevel system
that used both the concepts of a state machine and those of controlling informa-
tion flow. It formalizes the U.S. DoD multilevel security policy. It is a state machine
model capturing confidentiality aspects of access control. Any movement of infor-
mation from a higher level to a lower level in the system must be performed by a
trusted subject.
Bell-LaPadula, known as “no read up and no write down,” incorporates three basic
rules with respect to the flow of information in a system:
■ The simple security rule: A subject cannot read data located at a higher
security level than that possessed by the subject (also called no read up).
■ The star (*)-property rule: A subject cannot write to a lower level than that
possessed by the subject (also called no write down or the confinement rule).
■ The strong star property rule: A subject can perform both read and write
functions only at the same level granted to the subject.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 227
(Subject) read
write
PUBLIC SL same
down
read write
(Object) down same (Object)
PUBLIC SL write read SECRET SL
same up
read write
(Subject)
same up
PUBLIC SL
The main concern of the Bell-LaPadula security model and its use of these rules is
confidentiality. Although its basic model is a MAC system, another property rule
called the discretionary security property (ds-property) makes a mixture of manda-
tory and discretionary controls possible. This property allows a subject to pass along
permissions at its own discretion. In the discretionary portion of the model, access
permissions are defined through an access control matrix using a process called
authorization, and security policies prevent information flowing downward from a
high security level to a low security level.
The Bell-LaPadula security model does have limitations. Among those are
■ It contains no provision or policy for changing data access control. Therefore,
it works well only with access systems that are static in nature.
■ It does not address what are called covert channels. A low-level subject can
sometimes detect the existence of a high-level object when it is denied access.
Sometimes it is not enough to hide the content of an object; also their exis-
tence might have to be hidden.
■ Its main contribution at the expense of other concepts is confidentiality.
This security policy model was the basis for the Orange Book, discussed in the later
section “TCSEC.”
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
228 CISSP Cert Guide
Biba Model
The Biba model came after the Bell-LaPadula model and shares many character-
istics with that model. These two models are the most well-known of the models
discussed here. It is also a state machine model that uses a series of lattices or secu-
rity levels, but the Biba model concerns itself more with the integrity of informa-
tion rather than the confidentiality of that information. It does this by relying on
a data classification system to prevent unauthorized modification of data. Subjects
are assigned classes according to their trustworthiness; objects are assigned integ-
rity labels according to the harm that would be done if the data were modified
improperly.
Like the Bell-LaPadula model, the Biba model applies a series of properties or
axioms to guide the protection of integrity. Its effect is that data must not flow from
a receptacle of given integrity to a receptacle of higher integrity:
■ Integrity axiom: Subjects cannot write to a higher integrity level than that to
which they have access (no write up).
■ Simple integrity axiom: Subjects cannot read to a lower integrity level than
that to which they have access (no read down).
■ Invocation property: Subjects cannot invoke (request service of) higher
integrity.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 229
This model enforces these elements by allowing data to be altered only through
programs and not directly by users. Rather than employing a lattice structure, it uses
a three-part relationship of subject/program/object known as a triple. It also sets as
its goal the concepts of separation of duties and well-formed transactions:
■ Separation of duties: This concept ensures that certain operations require
additional verification or that all personnel do their part.
■ Well-formed transaction: This concept ensures that all values are checked
before and after the transaction by carrying out particular operations to com-
plete the change of data from one state to another.
Lipner Model
The Lipner model is an implementation that combines elements of the Bell-
LaPadula model and the Biba model. The first way of implementing integrity with
the Lipner model uses Bell-LaPadula and assigns subjects to one of two sensitivity
levels—system manager and anyone else—and to one of four job categories. Objects
are assigned specific levels and categories. Categories become the most significant
integrity (such as access control) mechanism. The second implementation uses both
Bell-LaPadula and Biba. This method prevents unauthorized users from modifying
data and prevents authorized users from making improper data modifications. The
implementations also share characteristics with the Clark-Wilson model in that it
separates objects into data and programs.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
230 CISSP Cert Guide
Graham-Denning Model
The Graham-Denning model addresses an issue ignored by the Bell-LaPadula
(with the exception of the ds-property) and Biba models. It deals with the delegate
and transfer rights. It focuses on issues such as
■ Securely creating and deleting objects and subjects
■ Securely providing or transferring access rights
Harrison-Ruzzo-Ullman Model
The Harrison-Ruzzo-Ullman model also deals with access rights. It restricts the set
of operations that can be performed on an object to a finite set to ensure integrity. It
is used by software engineers to prevent unforeseen vulnerabilities from being intro-
duced by overly complex operations.
Goguen-Meseguer Model
Although not as well known as Biba and other integrity models, the Goguen-Meseguer
model is the foundation of the noninterference model. With this model, the list of
objects that a subject can access is predetermined. Subjects can then perform these
predetermined actions only against the predetermined objects. Subjects are unable to
interfere with each other’s activities.
Sutherland Model
The Sutherland model focuses on preventing interference in support of integrity.
Based on the state machine and information flow models, this model defines a set of
system states, initial states, and state transitions. Using these predetermined secure
states, the Sutherland model maintains integrity and prohibits interference.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 231
ISO/IEC 42010:2011
ISO/IEC 42010:2011 uses specific terminology when discussing architectural
frameworks. The following is a review of some of the most important terms:
■ Architecture: The organization of the system, including its components and
their interrelationships, along with the principles that guide its design and
evolution
■ Architectural description (AD): The set of documents that convey the
architecture in a formal manner
■ Stakeholder: Individuals, teams, and departments, including groups outside
the organization with interests or concerns to consider
■ View: The representation of the system from the perspective of a stakeholder
or a set of stakeholders
■ Viewpoint: A template used to develop individual views that establish the
audience, techniques, and assumptions made
Computing Platforms
A computing platform is composed of the hardware and software components that
allow software to run. This typically includes the physical components, the operat-
ing systems, and the programming languages used. From a physical and logical
perspective, a number of possible frameworks or platforms are in use. The following
sections discuss some of the most common.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
232 CISSP Cert Guide
Mainframe/Thin Clients
When a mainframe/thin client platform is used, a client/server architecture exists.
The server holds the application and performs all the processing. The client soft-
ware runs on the user machines and simply sends requests for operations and
displays the results. When a true thin client is used, very little exists on the user
machine other than the software that connects to the server and renders the result.
Distributed Systems
The distributed platform also uses a client/server architecture, but the division of
labor between the server portion and the client portion of the solution might not be
quite as one-sided as you would find in a mainframe/thin client scenario. In many
cases multiple locations or systems in the network might be part of the solution.
Also, sensitive data may be more likely to be located on the user’s machine, and
therefore the users play a bigger role in protecting it with best practices.
Another characteristic of a distributed environment is multiple processing locations
that can provide alternatives for computing in the event a site becomes unavailable.
Data is stored at multiple, geographically separate locations. Users can access the
data stored at any location with the users’ distance from those resources transparent
to the user.
Distributed systems can introduce security weaknesses into the network that must
be considered. The following are some examples:
■ Desktop systems can contain sensitive information that might be at risk of
being exposed.
■ Users might generally lack security awareness.
■ Modems present a vulnerability to dial-in attacks.
■ Lack of proper backup might exist.
Middleware
In a distributed environment, middleware is software that ties the client and server
software together. It is neither a part of the operating system nor a part of the server
software. It is the code that lies between the operating system and applications
on each side of a distributed computing system in a network. It might be generic
enough to operate between several types of client/server systems of a particular type.
Embedded Systems
An embedded system is a piece of software built into a larger piece of software
that is in charge of performing some specific function on behalf of the larger system.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 233
The embedded part of the solution might address specific hardware communica-
tions and might require drivers to talk between the larger system and some specific
hardware.
Mobile Computing
Mobile code is instructions passed across the network and executed on a remote
system. An example of mobile code is Java and ActiveX code downloaded into a web
browser from the World Wide Web. Any introduction of code from one system to
another is a security concern but is required in some situations. An active content
module that attempts to monopolize and exploit system resources is called a hostile
applet. The main objective of the Java Security Model (JSM) is to protect the user
from hostile, network mobile code. It does this by placing the code in a sandbox,
which restricts its operations.
Virtual Computing
Virtual environments are increasingly being used as the computing platform for
solutions. Most of the same security issues that must be mitigated in the physical
environment must also be addressed in the virtual network.
In a virtual environment, instances of an operating system are called virtual
machines (VMs). A host system can contain many VMs. Software called a hypervisor
manages the distribution of resources (CPU, memory, and disk) to the VMs.
Figure 3-3 shows the relationship between the host machine, its physical resources,
the resident VMs, and the virtual resources assigned to them.
OS OS OS OS OS OS OS OS OS OS OS OS OS OS OS
Physical Servers
Figure 3-3 Virtualization
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
234 CISSP Cert Guide
Security Services
The process of creating system architecture also includes design of the security that
will be provided. These services can be classified into several categories depending
on the protections they are designed to provide. The following sections briefly
examine and compare types of security services.
Integrity Services
As you might recall, integrity implies that data has not been changed. When integ-
rity services are present, they ensure that data moving through the operating system
or application can be verified to not have been damaged or corrupted in the transfer.
Cryptography Services
If the system is capable of scrambling or encrypting information in transit, it is
said to provide cryptography services. In some cases this service is not natively
provided by a system and if desired must be provided in some other fashion, but
if the capability is present, it is valuable, especially in instances where systems are
distributed and talk across the network.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 235
Although our focus here is on security, the value of this service goes beyond security
because it also allows for monitoring what the system itself is actually doing.
System Components
When discussing the way security is provided in an architecture, having a basic
grasp of the components in computing equipment is helpful. The following sections
discuss those components and some of the functions they provide.
CPU
The central processing unit (CPU), also called the processor, is the hardware in the
system that executes all the instructions in the code. The CPU is the heart of a com-
puter or IT systems. It has its own set of instructions for its internal operation, and
those instructions define its architecture. The software that runs on the system must
be compatible with this architecture, which really means the CPU and the software
can communicate.
When more than one processor is present and available, the system becomes capable
of multiprocessing. This capability allows the computer to execute multiple instruc-
tions in parallel. It can be done with separate physical processors or with a single
processor with multiple cores. When multiple cores are used, each core operates as a
separate CPU.
CPUs have their own memory, and the CPU is able to access this memory faster
than any other memory location. It also typically has cache memory where the most
recently executed instructions are kept in case they are needed again. When a CPU
gets an instruction from memory, the process is called fetching.
An arithmetic logic unit (ALU) in the CPU performs the actual execution of the
instructions. The control unit acts as the system manager while instructions from
applications and operating systems are executed. CPU registers contain the instruc-
tion set information and data to be executed and include general registers, special
registers, and a program counter register.
CPUs can work in user mode or privileged mode, which is also referred to as kernel
or supervisor mode. When applications are communicating with the CPU, it is in
user mode. If an instruction that is sent to the CPU is marked to be performed in
privileged mode, it must be a trusted operating system process and is given function-
ality not available in user mode.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
236 CISSP Cert Guide
The CPU is connected to an address bus. Memory and I/O devices recognize this
address bus. These devices can then communicate with the CPU, read requested
data, and send it to the data bus.
When microcomputers were first developed, the instruction fetch time was much
longer than the instruction execution time because of the relatively slow speed of
memory access. This situation led to the design of the Complex Instruction Set
Computer (CISC) CPU. In this arrangement, the set of instructions was reduced
(while made more complex) to help mitigate the relatively slow memory access.
After memory access was improved to the point where not much difference existed
in memory access times and processor execution times, the Reduced Instruction Set
Computer (RISC) architecture was introduced. The objective of the RISC architec-
ture was to reduce the number of cycles required to execute an instruction, which
was accomplished by making the instructions less complex.
Preemptive multitasking means that task switches can be initiated directly out of
interrupt handlers. With cooperative (nonpreemptive) multitasking, a task switch is
only performed when a task calls the kernel and allows the kernel a chance to per-
form a task switch.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 237
Symmetric Asymmetric
Memory Memory
Multithreading
Multithreading allows multiple tasks to be performed within a single process.
A thread is a self-contained sequence of instruction that can execute in parallel with
other threads that are part of the same process. Multithreading is often used in
applications to reduce overhead and increase efficiency. An example of multithread-
ing is having multiple Microsoft Excel spreadsheets open at the same time. In this
situation, the computer does not run multiple instances of Microsoft Excel. Each
spreadsheet is treated as a single thread within the single Microsoft Excel process
with the software managing which thread is being accessed.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
238 CISSP Cert Guide
Process States
Process states are the different modes in which a process may run. A process can
operate in one of several states:
■ Ready: The process is ready to start processing when needed.
■ Waiting: The process is ready for execution but is waiting for access to an
object.
■ Running: The process is being executed until the process is finished, the time
expires, or the process is blocked or aborted.
■ Supervisory: The process is performing an action that requires higher
privileges.
■ Stopped: The process is finished or terminated.
NOTE Supervisor state and problem state are also processes that are discussed later
in this chapter in the “Memory Protection” section.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 239
ROM, on the other hand, is not volatile and also cannot be overwritten without
executing a series of operations that depend on the type of ROM. It usually contains
low-level instructions of some sort that make the device on which it is installed
operational. Some examples of ROM are
■ Flash memory: A type of electrically programmable ROM
■ Programmable logic device (PLD): An integrated circuit with connections
or internal logic gates that can be changed through a programming process
■ Field-programmable gate array (FPGA): A type of PLD that is programmed
by blowing fuse connections on the chip or using an antifuse that makes a con-
nection when a high voltage is applied to the junction
■ Firmware: A type of ROM where a program or low-level instructions are
installed
Memory directly addressable by the CPU, which is for the storage of instructions
and data that are associated with the program being executed, is called primary
memory. Regardless of which type of memory in which the information is located,
in most cases the CPU must get involved in fetching the information on behalf of
other components. If a component has the ability to access memory directly without
the help of the CPU, it is called direct memory access (DMA).
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
240 CISSP Cert Guide
Some additional terms you should be familiar with in regard to memory include the
following:
■ Associative memory: The type of memory that searches for a specific data
value in memory rather than using a specific memory address.
■ Implied addressing: The type of memory addressing that refers to registers
usually contained inside the CPU.
■ Absolute addressing: The type of memory addressing that addresses the entire
primary memory space. The CPU uses the physical memory addresses that are
called absolute addresses.
■ Cache: A relatively small amount (when compared to primary memory) of
very high speed RAM that holds the instructions and data from primary
memory and that has a high probability of being accessed during the currently
executing portion of a program.
■ Indirect addressing: The type of memory addressing where the address
location that is specified in the program instruction contains the address of the
final desired location.
■ Logical address: The address at which a memory cell or storage element
appears to reside from the perspective of an executing application program.
■ Relative address: The address that specifies its location by indicating its
distance from another address.
■ Virtual memory: A location on the hard drive used temporarily for storage
when memory space is low.
■ Memory leak: A failure that occurs when a computer program incorrectly
manages memory allocations, which can exhaust available system memory as
an application runs.
■ Secondary memory: Magnetic, optical, or flash-based media or other storage
devices that contain data that must first be read by the operating system and
stored into memory. This memory is less expensive than primary memory.
■ Volatile memory: Memory that is emptied when the device shuts down or
when an application cleans up.
■ Nonvolatile memory: Long-term persistent storage that remains even when
the device shuts down.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 241
Input/Output Devices
Input/output (I/O) devices are used to send and receive information to the system.
Examples are the keyboard, mouse, displays, and printers. The operating system
controls the interaction between the I/O devices and the system. In cases where the
I/O device requires the CPU to perform some action, it may signal the CPU with
a message called an interrupt. Not all devices require an interrupt to communicate
with the CPU.
Input/Output Structures
Some computer activities are general I/O operations that require manual configura-
tion of devices. The I/O structures used by those activities utilize memory-mapped
I/O, interrupt requests (IRQs), and direct memory access (DMA).
With memory-mapped I/O, the CPU manages access to a series of mapped memory
addresses or locations. Using these memory-mapped locations, the user actually
obtains input from the corresponding device. The input is copied to those memory
locations when the device signals that it is ready. When the user writes to the
memory-mapped locations, the output to the device is copied from the memory
location to the device when the CPU indicates that the output is ready. When
memory-mapped I/O is used, a single device or piece of hardware should map
to a specific memory address. That address should be used by no other device or
hardware. The operating system manages access to mapped-memory locations.
An IRQ assigns specific signal lines to a device through an interrupt controller.
IRQs are mapped to specific CPU-addressed memory locations. When a device
wants to communicate, it sends a signal to the CPU through its assigned IRQ. Older
devices must have exclusive use of an IRQ, while newer plug-and-play (PnP) devices
can share an IRQ. Older computers had IRQs 0–15, while newer computers have
IRQs 0–23. If an IRQ conflict occurs, none of the devices sharing the IRQ will be
available. The operating system manages access to IRQs.
DMA access uses a channel with two signal lines, one of which is the DMA request
(DMQ) line and the other of which is the DMA acknowledgment (DACK) line.
This I/O structure type allows devices to work directly with memory without wait-
ing on the CPU. The CPU simply authorizes the access and then lets the device
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
242 CISSP Cert Guide
communicate with memory directly. A DACK signal is used to release the memory
location back to the CPU. DMA is much faster than the other two methods. The
operating system manages DMA assignments.
Firmware
Firmware is software that is stored on an EPROM or EEPROM chip within a
device. While updates to firmware may become necessary, they are infrequent.
Firmware can exist as the basic input/output system (BIOS) on a computer or device
firmware.
BIOS/UEFI
A computer’s BIOS contains the basic instruction that a computer needs to boot
and load the operating system from a drive. The process of updating the BIOS with
the latest software is referred to as flashing the BIOS. Security professionals should
ensure that any BIOS updates are obtained from the BIOS vendor and have not
been tampered with in any way.
The traditional BIOS has been replaced with the Unified Extensible Firmware
Interface (UEFI). UEFI maintains support for legacy BIOS devices but is consid-
ered a more advanced interface than traditional BIOS. BIOS uses the master boot
record (MBR) to save information about the hard drive data, while UEFI uses the
GUID partition table (GPT). BIOS partitions were a maximum of 4 partitions, each
being only 2 terabytes (TB). UEFI allows up to 128 partitions, with the total disk
limit being 9.4 zettabytes (ZB) or 9.4 billion terabytes. UEFI is also faster and more
secure than traditional BIOS. UEFI Secure Boot requires boot loaders to have a
digital signature.
UEFI is an open standard interface layer between the firmware and the operating
system that requires firmware updates to be digitally signed. Security professionals
should understand the following points regarding UEFI:
■ It was designed as a replacement for traditional PC BIOS.
■ Additional functionality includes support for Secure Boot, network
authentication, and universal graphics drivers.
■ It protects against BIOS malware attacks including rootkits.
Secure Boot requires that all boot loader components (e.g., OS kernel, drivers) attest
to their identity (digital signature) and the attestation is compared to the trusted list.
■ When a computer is manufactured, a list of keys that identify trusted hard-
ware, firmware, and operating system loader code (and in some instances,
known malware) is embedded in the UEFI.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 243
Device Firmware
Hardware devices, such as routers and printers, require some processing power to
complete their tasks. This firmware is contained in the firmware chips located within
the devices. Like with computers, this firmware is often installed on EEPROM to
allow it to be updated. Again, security professionals should ensure that updates are
obtained only from the device vendor and that the updates have not been changed in
any manner, including modified by a third party.
Operating Systems
The operating system is the software that enables a human to interact with the
hardware that comprises the computer. Without the operating system, the computer
would be useless. Operating systems perform a number of noteworthy and interest-
ing functions as part of the interfacing between the human and the hardware. In this
section, we look at some of these activities.
A thread is an individual unit of an application for a specific process. A process is a
set of threads that are part of the same larger application. An application’s instruc-
tions are not considered processes until they have been loaded into memory where
all instructions must first be copied to be processed by the CPU. A process can be in
a running state, ready state, or blocked state. When a process is blocked, it is simply
waiting for data to be transmitted to it, usually through user data entry. A group of
processes that share access to the same resources is called a protection domain.
CPUs can be categorized according to the way in which they handle processes. A
superscalar computer architecture is characterized by a processor that enables con-
current execution of multiple instructions in the same pipeline stage. A processor in
which a single instruction specifies more than one concurrent operation is called a
Very Long Instruction Word (VLIW) processor. A pipelined processor overlaps the
steps of different instructions, whereas a scalar processor executes one instruction at
a time, consequently increasing pipelining.
From a security perspective, processes are placed in a ring structure according to
the concept of least privilege, meaning they are only allowed to access resources and
components required to perform the task. A common visualization of this structure
is shown in Figure 3-5.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
244 CISSP Cert Guide
Privilege
Level
3
2 Most
Privileged
1
0
Private
OS
Functions
OS Services
Least
Device Drivers Privileged
Application Programs
Memory Management
Because all information goes to memory before it can be processed, secure manage-
ment of memory is critical. Memory space insulated from other running processes in
a multiprocessing system is part of a protection domain.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 245
TCSEC
The Trusted Computer System Evaluation Criteria (TCSEC) was developed by the
National Computer Security Center (NCSC) for the U.S. DoD to evaluate prod-
ucts. NCSC has issued a series of books focusing on both computer systems and the
networks in which they operate. They address confidentiality, but not integrity. In
2005, TCSEC was replaced by the Common Criteria, discussed later in the chapter.
However, security professionals still need to understand TCSEC because of its effect
on security practices today and because some of its terminology is still in use.
With TCSEC, functionality and assurance are evaluated separately and form a
basis for assessing the effectiveness of security controls built into automatic data-
processing system products. For example, the concept of least privilege is derived
from TCSEC. In the following sections, we discuss those books and the ratings they
derive.
Rainbow Series
The original publication created by the TCSEC was the Orange Book, but as time
went by, other books were also created that focused on additional aspects of the
security of computer systems. Collectively, this set of more than 20 books is now
referred to as the Rainbow Series, alluding to the fact that each book is a different
color. For example, the Green Book focuses solely on password management. Next,
we cover the most important books: the Red Book, Orange Book, and Green Book.
Red Book
The Trusted Network Interpretation (TNI) extends the evaluation classes
of the TCSEC (DOD 5200.28-STD) to trusted network systems and components
in the Red Book. So where the Orange Book focuses on security for a single system,
the Red Book addresses network security.
Orange Book
The Orange Book is a collection of criteria based on the Bell-LaPadula model that
is used to grade or rate the security offered by a computer system product. Covert
channel analysis, trusted facility management, and trusted recoveries are concepts
discussed in this book.
The goals of this system can be divided into two categories, operational assurance
requirements and life cycle assurance requirements, the details of which are defined
next.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
246 CISSP Cert Guide
The life cycle assurance requirements specified in the Orange Book are as follows:
■ Security testing
■ Design specification and testing
■ Configuration management
■ Trusted distribution
TCSEC uses a classification system that assigns an alphabetic letter and a number to
describe systems’ security effectiveness. The assigned letter refers to a security assur-
ance level or division as A, B, C, D, and the number refers to gradients within that
security assurance level or class. Each division and class incorporates all the required
elements of the ones below it.
In order of least secure to most secure, the four classes and their constituent
divisions and requirements are as follows:
■ D—Minimal Protection
Reserved for systems that have been evaluated but that fail to meet the require-
ments for a higher division.
■ C—Discretionary Protection
■ C1—Discretionary Security Protection
— Requires identification and authentication.
— Requires separation of users and data.
— Uses discretionary access control (DAC) capable of enforcing access
limitations on an individual or group basis.
— Requires system documentation and user manuals.
■ C2—Controlled Access Protection
— Uses a more finely grained DAC.
— Provides individual accountability through login procedures.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 247
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
248 CISSP Cert Guide
■ A—Verified Protection
■ A1—Verified Design
— Provides higher assurance than B3, but is functionally identical to B3.
— Uses formal design and verification techniques, including a formal
top-level specification.
— Requires that formal techniques are used to prove the equivalence
between the Trusted Computer Base (TCB) specifications and the
security policy model.
— Provides formal management and distribution procedures.
— An example of such a system is Honeywell’s Secure Communications
Processor (SCOMP), a precursor to the XTS-400.
Green Book
The Green Book provides guidance on password creation and management. It
includes single sign-on (SSO) responsibilities, user responsibilities, authentication
mechanisms, and password protection. The following major features are advocated
in this guideline:
■ Users should be able to change their own passwords.
■ Passwords should be machine-generated rather than user-created.
■ Certain audit reports (e.g., date and time of last login) should be provided by
the system directly to the user.
ITSEC
TCSEC addresses confidentiality only and bundles functionality and assurance.
In contrast to TCSEC, the Information Technology Security Evaluation Criteria
(ITSEC) addresses integrity and availability as well as confidentiality. Another
difference is that the ITSEC was mainly a set of guidelines used in Europe, whereas
the TCSEC was relied on more in the United States.
ITSEC has a rating system in many ways similar to that of TCSEC. ITSEC has
10 classes, F1 to F10, to evaluate the functional requirements and 7 TCSEC classes,
E0 to E6, to evaluate the assurance requirements.
Security functional requirements include the following:
■ F00: Identification and authentication
■ F01: Audit
■ F02: Resource utilization
■ F03: Trusted paths/channels
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 249
The TCSEC and ITSEC systems can be mapped to one another, but the ITSEC
provides a number of ratings that have no corresponding concept in the TCSEC
ratings. Table 3-3 shows a mapping of the two systems.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
250 CISSP Cert Guide
ITSEC TCSEC
F7 Systems that provide high availability
F8 Systems that provide high data integrity during communication
F9 Systems that provide high confidentiality (using cryptography)
F10 Networks with high demands on confidentiality and integrity
The ITSEC has been largely replaced by Common Criteria, discussed in the next
section.
Common Criteria
In 1990 the ISO identified the need for a standardized rating system that could be
used globally. The Common Criteria (CC) for Information Technology Security
Evaluation was the result of a cooperative effort to establish this system. This system
uses Evaluation Assurance Levels (EALs) to rate systems, with each EAL represent-
ing a successively higher level of security testing and design in a system. The result-
ing rating represents the potential the system has to provide security. It assumes that
the customer will properly configure all available security solutions, so it is required
that the vendor always provide proper documentation to allow the customer to fully
achieve the rating. ISO/IEC 15408-1:2009 is the ISO version of the CC.
The CC represents requirements for IT security of a product or system in two cate-
gories: functionality and assurance. This means that the rating should describe what
the system does (functionality), and the degree of certainty the raters have that the
functionality can be provided (assurance).
The CC has seven assurance levels, which range from EAL1 (lowest), where
functionality testing takes place, through EAL7 (highest), where thorough testing is
performed and the system design is verified.
The assurance designators used in the CC are as follows:
■ EAL1: Functionally tested
■ EAL2: Structurally tested
■ EAL3: Methodically tested and checked
■ EAL4: Methodically designed, tested, and reviewed
■ EAL5: Semi-formally designed and tested
■ EAL6: Semi-formally verified design and tested
■ EAL7: Formally verified design and tested
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 251
The CC uses a concept called a protection profile during the evaluation process.
The protection profile describes a set of security requirements or goals along with
functional assumptions about the environment. Therefore, if someone identified
a security need not currently addressed by any products, that person could write a
protection profile that describes the need and the solution and all issues that could
go wrong during the development of the system. This would be used to guide the
development of a new product. A protection profile contains the following elements:
■ Descriptive elements: The name of the profile and a description of the
security problem that is to be solved.
■ Rationale: Justification of the profile and a more detailed description of the
real-world problem to be solved. The environment, usage assumptions, and
threats are given along with security policy guidance that can be supported by
products and systems that conform to this profile.
■ Functional requirements: Establishment of a protection boundary, meaning
the threats or compromises that are within this boundary to be countered. The
product or system must enforce the boundary.
■ Development assurance requirements: Identification of the specific require-
ments that the product or system must meet during the development phases,
from design to implementation.
■ Evaluation assurance requirements: Establishment of the type and intensity
of the evaluation.
The result of following this process will be a security target. This is the vendor’s
explanation of what the product brings to the table from a security standpoint.
Intermediate groupings of security requirements developed along the way to a
security target are called packages.
While it is important to understand the EAL levels of the CC, the CC has been
redesigned. Common Criteria Version 3.1, Revision 5, uses the term Target of
Evaluation (TOE). A TOE is defined as a set of software, firmware, and/or hardware
possibly accompanied by guidance. The TOE consists of a specific version and a
specific representation of the TOE. For example, the Windows 10 Enterprise OS is
a specific version, and its configuration on a computer based on the organization’s
security policies is the specific representation.
The CC includes two types of evaluations: Security Target (ST)/TOE evaluation
and Protection Profile (PP) evaluation. In an ST evaluation, the sufficiency of the
TOE and the operational environment are determined. In a TOE evaluation, the
correctness of the TOE is determined. The PP evaluation is a document, typically
created by a user or user community, which identifies security requirements for a
class of security devices relevant to that user for a particular purpose.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
252 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 253
ISO/IEC 27001
ISO/IEC 27001:2018 is the latest version of the 27001 standard and is one of the
most popular standards by which organizations obtain certification for information
security. It provides guidance on how to ensure that an organization’s information
security management system (ISMS) is properly built, administered, and maintained.
It includes the following components:
■ ISMS scope
■ Information security policy
■ Risk assessment process and its results
■ Risk treatment process and its decisions
■ Information security objectives
■ Information security personnel competence
■ ISMS-related documents that are necessary
■ Operational planning and control documents
■ Information security monitoring and measurement evidence
■ ISMS internal audit program and its results
■ Top management ISMS review evidence
■ Identified nonconformities evidence and corrective actions
4. Define the ISMS scope, information security policy, and information security
objectives.
5. Develop document control, internal audit, and corrective action procedures.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
254 CISSP Cert Guide
7. Develop a statement of applicability and risk treatment plan and accept all
residual risks.
8. Implement controls defined in the risk treatment plan and maintain imple-
mentation records.
9. Develop and implement security training and awareness programs.
10. Implement the ISMS, maintain policies and procedures, and perform correc-
tive actions.
11. Maintain and monitor the ISMS.
ISO/IEC 27002
ISO/IEC 27002:2013 is the latest version of the 27002 standard and provides a code
of practice for information security management.
It includes the following 14 content areas:
■ Information security policy
■ Organization of information security
■ Human resources security
■ Asset management
■ Access control
■ Cryptography
■ Physical and environmental security
■ Operations security
■ Communications security
■ Information systems acquisition, development, and maintenance
■ Supplier relationships
■ Information security incident management
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 255
PCI DSS applies to all entities that store, process, and/or transmit cardholder data.
It covers technical and operational system components included in or connected to
cardholder data. If an organization accepts or processes payment cards, then PCI
DSS applies to that organization. If there is a breach or possibility of breach (even
without harming cardholders in anyway) for an entity that follows PCI-DSS, the
entity should immediately be reported to customers.
For more information on PCI-DSS, you can download the PCI-DSS Quick
Reference Guide at https://www.pcisecuritystandards.org/documents/
PCI_DSS-QRG-v3_2_1.pdf.
NOTE Access control categories and types are discussed in depth in Chapter 1.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
256 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 257
The information system owner and information security architect are responsible
for selecting the security controls for the information system and documenting the
controls in the security plan.
Memory Protection
In an information system, memory and storage are the most important resources.
Damaged or corrupt data in memory can cause the system to stop functioning. Data
in memory can be disclosed and therefore must be protected. Memory does not
isolate running processes and threads from data. Security professionals must use
processor states, layering, process isolation, abstraction, hardware segmentation, and
data hiding to help keep data isolated.
Most processors support two processor states: supervisor state (or kernel mode) and
problem state (or user mode). In supervisor state, the highest privilege level on the
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
258 CISSP Cert Guide
system is used so that the processor can access all the system hardware and data. In
problem state, the processor limits access to system hardware and data. Processes
running in supervisor state are isolated from the processes that are not running in
that state; supervisor-state processes should be limited to only core operating system
functions.
A security professional can use layering to organize programming into separate
functions that interact in a hierarchical manner. In most cases, each layer has access
only to the layers directly above and below it. Ring protection is the most common
implementation of layering, with the inner ring (ring 0) being the most privileged
ring and the outer ring (ring 3) being the lowest privileged. The OS kernel usually
runs on ring 0, and user applications usually run on ring 3.
A security professional can isolate processes by providing memory address spaces for
each process. Other processes are unable to access address spaces allotted to another
process. Naming distinctions and virtual mapping are used as part of process
isolation.
Hardware segmentation works like process isolation. It prevents access to infor-
mation that belongs to a higher security level. However, hardware segmentation
enforces the policies using physical hardware controls rather than the operating
system’s logical process isolation. Hardware segmentation is rare and is usually
restructured to governmental use, although some organizations may choose to use
this method to protect private or confidential data.
Data hiding prevents data at one security level from being seen by processes
operating at other security levels.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 259
new operating system much harder. The system can only boot after the TPM veri-
fies system integrity by comparing the original computed hash value of the system’s
configuration to the hash value of its configuration at boot time.
The TPM consists of both static memory and dynamic memory that is used to
retain the important information when the computer is turned off.
The memory used in a TPM chip is as follows:
■ Endorsement Key (EK): Persistent memory installed by the manufacturer
that contains a public/private key pair
■ Storage Root Key (SRK): Persistent memory that secures the keys stored in
the TPM
■ Attestation Identity Key (AIK): Dynamic memory that ensures the integrity
of the EK
■ Platform Configuration Register (PCR) hashes: Dynamic memory that
stores data hashes for the sealing function
■ Storage keys: Dynamic memory that contains the keys used to encrypt the
computer’s storage, including hard drives, USB flash drives, and so on
Interfaces
An interface is a mechanism that a user employs to access a system, an application, a
device, or another entity. Most users assume that the interfaces they use are secure.
Organizations are responsible for ensuring that secure interfaces are implemented
across the network. If an entity has multiple user interfaces—such as a graphical
user interface, a command-line interface, and a remote access interface—all these
interfaces should require secure authentication. It is a security professional’s job to
understand the difference between secure and insecure interfaces and to ensure that
insecure interfaces are replaced with secure interfaces.
Fault Tolerance
Fault tolerance allows a system to continue operating properly in the event that
components within the system fail. For example, providing fault tolerance for a hard
drive system involves using fault-tolerant drives and fault-tolerant drive adapters.
However, the cost of any fault tolerance must be weighed against the cost of the
redundant device or hardware. If security capabilities of information systems are not
fault tolerant, attackers may be able to access systems if the security mechanisms fail.
Organizations should weigh the cost of deploying a fault-tolerant system against the
cost of any attack against the system being secured. It may not be vital to provide a
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
260 CISSP Cert Guide
Policy Mechanisms
Organizations can implement different policy mechanisms to increase the security
of information systems. The policy mechanisms include separation of privilege and
accountability.
Separation of Privilege
The principle of separation of privilege is tied to the principle of least privilege. Sep-
aration of privilege requires that security professionals implement different permis-
sions for each type of privileged operation. This principle ensures that the principle
of least privilege is applied to administrative-level users. Very few administrative-
level users need full administrative-level access to all systems. Separation of privi-
lege ensures that administrative-level access is only granted to users for only those
resources or privileges that the user needs to perform.
For example, credit card service representatives on the phone cannot grant addi-
tional credit. However, they can view the credit limit or take your financial details
and send a credit limit request application to their managers for processing.
Accountability
Accountability ensures that users are held accountable for the actions that they
take. However, accountability relies heavily on the system’s ability to monitor activ-
ity. Accountability is usually provided using auditing functions. When auditing is
enabled, it is also important to ensure that the auditing logs are preserved and can-
not be edited. Finally, keep in mind that accounting also relies heavily on the autho-
rization and authentication systems. Organizations cannot track user activities if the
users are not individually authenticated and authorized.
Encryption/Decryption
Information systems use encryption and decryption to provide confidentiality
of data. Encryption is the process of translating plain text data (plaintext) into
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 261
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
262 CISSP Cert Guide
Client-Based Systems
In most networks, client systems are the most widely used because they are the
systems that users most rely on to access resources. Client systems range from
desktop systems to laptops to mobile devices of all types. This section focuses mainly
on the vulnerabilities of desktops and laptops.
NOTE Security vulnerabilities of mobile devices are discussed later in this chapter.
Because client systems are so prolific, new attacks against these systems seem to crop
up every day. Security practitioners must ensure that they know which client systems
attach to the network so they can ensure that the appropriate controls are imple-
mented to protect them.
Traditional client-side threats usually target web browsers, browser plug-ins, and
email clients. But threats also exploit the applications and operating systems that are
deployed. Client systems also tend to have exposed services deployed that are not
needed. Often client systems are exposed to hostile servers. Added to these issues is
the fact that most normal users are not security savvy and often inadvertently cause
security issues on client systems.
Security architecture for client systems should include policies and controls that
cover the following areas:
■ Deploying only licensed, supported operating systems. These operating
systems should be regularly updated with all vendor patches, security updates,
and service packs as they are released.
■ Deploying anti-malware and antivirus software on every client system.
Updates to this software should also be configured as automatic to ensure that
the most recently detected vulnerabilities are covered.
■ Deploying a firewall with a well-configured access control list (ACL) and
host-based intrusion detection system on the client systems.
■ Using drive encryption such as BitLocker to protect the data on the hard
drives.
■ Issuing user accounts with the minimum permissions the users require to do
their jobs. Users who need administrative access should have both an admin-
istrative account and a regular account and should use the administrative
account only when performing administrative duties.
■ Testing all updates and patches, including those to both the operating systems
and applications, prior to deployment at the client level.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 263
Server-Based Systems
In some cases an attack can focus on the operations of the server operating system
itself rather than the web applications running on top of it. Later, we look at the way
in which these attacks are implemented, focusing mainly on the issue of data flow
manipulation.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
264 CISSP Cert Guide
Database Systems
In many ways, a database is the Holy Grail for the attacker. It is typically where
sensitive information resides. When considering database security, you need to
understand the following terms: inference, aggregation, contamination, and data
mining warehouse.
Inference
Inference occurs when someone has access to information at one level that allows
them to infer information about another level. The main mitigation technique for
inference is polyinstantiation, which is the development of a detailed version of an
object from another object using different values in the new object. It prevents low-
level database users from inferring the existence of higher level data.
Aggregation
Aggregation is defined as assembling or compiling units of information at one
sensitivity level and having the resultant totality of data being of a higher sensitiv-
ity level than the individual components. So you might think of aggregation as a
different way of achieving the same goal as inference, which is to learn information
about data on a level to which you do not have access.
Contamination
Contamination is the intermingling or mixing of data of one sensitivity or need-
to-know level with that of another. Proper implementation of security levels is the
best defense against these problems.
Cryptographic Systems
By design, cryptographic systems are responsible for encrypting data to prevent
data disclosure. Security professionals must ensure that their organization’s software
and IT systems are using the latest version of a cryptographic algorithm, if possible.
Once a compromise of a cryptographic algorithm is known, that algorithm should
no longer be used.
ICSs should be securely segregated from other networks as a security layer. The
Stuxnet virus hit the SCADA used for the control and monitoring of industrial
processes. SCADA components are considered privileged targets for cyberattacks.
Through the use of cybertools, it is possible to destroy an industrial process. This
was the idea used on the attack on the nuclear plant in Natanz in order to interfere
with the Iranian nuclear program.
Considering the criticality of the systems, physical access to SCADA-based systems
must be strictly controlled. Systems that integrate IT security with physical access
controls like badging systems and video surveillance should be deployed. In addition,
the solution should be integrated with existing information security tools such as
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
266 CISSP Cert Guide
In a typical ICS, this means a defense-in-depth strategy that includes the following:
■ Develop security policies, procedures, training, and educational material that
applies specifically to the ICS.
■ Address security throughout the life cycle of the ICS.
■ Implement a network topology for the ICS that has multiple layers, with the
most critical communications occurring in the most secure and reliable layer.
■ Provide logical separation between the corporate and ICS networks.
■ Employ a DMZ network architecture.
■ Ensure that critical components are redundant and are on redundant networks.
■ Design critical systems for graceful degradation (fault tolerant) to prevent
catastrophic cascading events.
■ Disable unused ports and services on ICS devices after testing to assure this
will not impact ICS operation.
■ Restrict physical access to the ICS network and devices.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 267
■ Restrict ICS user privileges to only those that are required to perform each
person’s job.
■ Use separate authentication mechanisms and credentials for users of the ICS
network and the corporate network.
■ Use modern technology, such as smart cards, for Personal Identity Verification
(PIV).
■ Implement security controls such as intrusion detection software, antivirus
software, and file integrity checking software, where technically feasible, to
prevent, deter, detect, and mitigate the introduction, exposure, and propaga-
tion of malicious software to, within, and from the ICS.
■ Apply security techniques such as encryption and/or cryptographic hashes to
ICS data storage and communications where determined appropriate.
■ Expeditiously deploy security patches after testing all patches under field con-
ditions on a test system if possible, before installation on the ICS.
■ Track and monitor audit trails on critical areas of the ICS.
■ Employ reliable and secure network protocols and services where feasible.
When designing security solutions for ICS devices, security professionals should
include the following considerations: timeliness and performance requirements,
availability requirements, risk management requirements, physical effects, system
operation, resource constraints, communications, change management, managed
support, component lifetime, and component location.
ICS implementations use a variety of protocols and services, including
■ Modbus: A master/slave protocol that uses port 50
■ BACnet2: A master/slave protocol that uses port 47808
■ LonWorks/LonTalk3: A peer-to-peer protocol that uses port 1679
■ DNP3: A master/slave protocol that uses port 19999 when using Transport
Layer Security (TLS) and port 20000 when not using TLS
They can also use IEEE 802.1X, Zigbee, and Bluetooth for communication.
The basic process for developing an ICS security program includes the following:
1. Develop a business case for security.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
268 CISSP Cert Guide
The ICS security architecture should include network segregation and segmenta-
tion, boundary protection, firewalls, a logically separated control network, and
dual network interface cards (NICs) and should focus mainly on suitable isolation
between control networks and corporate networks.
Security professionals should also understand that many ISC/SCADA systems use
weak authentication and outdated operating systems. The inability to patch these
systems (and even the lack of available patches) means that the vendor is usually not
proactively addressing any identified or newly found security issues. Finally, many
of these systems allow unauthorized remote access, thereby making it easy for an
attacker to breach the system with little effort.
Cloud-Based Systems
Cloud computing is the centralization of data, software, or the computing environ-
ment itself in a web environment that can be accessed from anywhere and anytime.
An organization can create a cloud environment, or it can pay a vendor to provide
this service. A private cloud is considered more secure than a public cloud. Using a
public cloud introduces all sorts of security concerns. How do you know your data is
kept separate from other customers? How do you know your data is safe? Outsourc-
ing the security of their data makes many organizations uncomfortable.
Cloud computing is all the rage these days, and it comes in many forms. The basic
idea of cloud computing is to make resources available in a web-based data center so
the resources can be accessed from anywhere. A company can pay another company
to host and manage the cloud environment, or a company can host the environment.
Before a cloud deployment model is chosen, the organization must determine the
needs of the organization and the security requirements for any data that will be
stored in the cloud.
There is a trade-off when a decision must be made between the two architectures.
A solution deployed on organizational resources provides the most control over the
safety of your data but also requires the staff and the knowledge to deploy, manage,
and secure the solution. A cloud solution deployed on a provider’s resources puts
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 269
your data’s safety in the hands of a third party, but that party is often more capable
and knowledgeable about protecting data in this environment and managing the
cloud environment.
Cloud storage locates the data on a central server, but the key difference is that the
data is accessible from anywhere and, in many cases, from a variety of device types.
Moreover, cloud solutions typically provide fault tolerance.
NIST SP 800-145 gives definitions for cloud deployments that IT professionals
should understand. Security professionals should be familiar with four cloud
deployments:
■ Private cloud: This is a solution owned and managed by one company solely
for that company’s use. This type of cloud provides the most control and secu-
rity but also requires the biggest investment in both hardware and expertise.
■ Public cloud: This is a solution provided by a third party. It offloads the details
to that third party but gives up some control and can introduce security issues.
Typically, you are a tenant sharing space with others, and in many cases you
don’t know where your data is being kept physically.
■ Hybrid cloud: This is some combination of private and public. For example,
perhaps you only use the facilities of the provider but still manage the data
yourself.
■ Community cloud: This is a solution owned and managed by a group of orga-
nizations that create the cloud for a common purpose, perhaps to address a
common concern such as regularity compliance.
When a public solution is selected, various levels of service can be purchased. Some
of these levels include
■ Infrastructure as a Service (IaaS): Involves the vendor providing the hard-
ware platform or data center and the company installing and managing its own
operating systems and application systems. The vendor simply provides access
to the data center and maintains that access.
■ Platform as a Service (PaaS): Involves the vendor providing the hardware
platform or data center and the software running on the platform. This
includes the operating systems and infrastructure software. The company is
still involved in managing the system.
■ Software as a Service (SaaS): Involves the vendor providing the entire solu-
tion. This includes the operating system, infrastructure software, and the appli-
cation. It might provide you with an email system, for example, whereby the
vendor hosts and manages everything for you.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
270 CISSP Cert Guide
Client Device
Interconnecting Network
Hosted IT Department
Application
Application
Software-aaS*
Software/
Software
Infrastructure
Platform-aaS*
Software
Platform
Operating Systems
Virtualization
Layer
Infrastructure-aaS
Infrastructure
Physical Servers
Networking
and Firewalling
Data Center
Mechanical and
Electrical
Notes:
Brand names for illustrative/example purposes only,
and examples are not exhaustive.
NIST SP 800-144 gives guidelines on security and privacy in public cloud com-
puting. This publication defines two types of cloud computing service contracts:
predefined non-negotiable agreements and negotiated agreements. Non-negotiable
agreements are in many ways the basis for the economies of scale enjoyed by pub-
lic cloud computing. The terms of service are prescribed completely by the cloud
provider. They are typically not written with attention to federal privacy and
security requirements. Furthermore, with some offerings, the provider can make
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 271
Table 3-4 provides a list of security and privacy issues and recommendations for
public cloud deployments from NIST SP 800-144.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
272 CISSP Cert Guide
Table 3-4 NIST SP 800-144 Cloud Security and Privacy Issues and Recommendations
Areas Recommendations
Governance Extend organizational practices pertaining to the policies, procedures, and
standards used for application development and service provisioning in the
cloud, as well as the design, implementation, testing, use, and monitoring of
deployed or engaged services.
Put in place audit mechanisms and tools to ensure organizational practices
are followed throughout the system life cycle.
Compliance Understand the various types of laws and regulations that impose security
and privacy obligations on the organization and potentially impact cloud
computing initiatives, particularly those involving data location, privacy
and security controls, records management, and electronic discovery
requirements.
Review and assess the cloud provider’s offerings with respect to the
organizational requirements to be met and ensure that the contract terms
adequately meet the requirements.
Ensure that the cloud provider’s electronic discovery capabilities
and processes do not compromise the privacy or security of data and
applications.
Trust Ensure that service arrangements have sufficient means to allow visibility
into the security and privacy controls and processes employed by the cloud
provider, and their performance over time.
Establish clear, exclusive ownership rights over data.
Institute a risk management program that is flexible enough to adapt to
the constantly evolving and shifting risk landscape for the life cycle of the
system.
Continuously monitor the security state of the information system to
support ongoing risk management decisions.
Architecture Understand the underlying technologies that the cloud provider uses to
provision services, including the implications that the technical controls
involved have on the security and privacy of the system, over the full
system life cycle and across all system components.
Identity and Access Ensure that adequate safeguards are in place to secure authentication,
Management authorization, and other identity and access management functions, and are
suitable for the organization.
Software Isolation Understand virtualization and other logical isolation techniques that the
cloud provider employs in its multitenant software architecture, and assess
the risks involved for the organization.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 273
Areas Recommendations
Data Protection Evaluate the suitability of the cloud provider’s data management solutions
for the organizational data concerned and the ability to control access to
data, to secure data while at rest, in transit, and in use, and to sanitize data.
Take into consideration the risk of collating organizational data with
that of other organizations whose threat profiles are high or whose data
collectively represent significant concentrated value.
Fully understand and weigh the risks involved in cryptographic key
management with the facilities available in the cloud environment and the
processes established by the cloud provider.
Availability Understand the contract provisions and procedures for availability, data
backup and recovery, and disaster recovery, and ensure that they meet the
organization’s continuity and contingency planning requirements.
Ensure that during an intermediate or prolonged disruption or a serious
disaster, critical operations can be immediately resumed, and that all
operations can be eventually reinstituted in a timely and organized manner.
Incident Response Understand the contract provisions and procedures for incident response
and ensure that they meet the requirements of the organization.
Ensure that the cloud provider has a transparent response process in
place and sufficient mechanisms to share information during and after an
incident.
Ensure that the organization can respond to incidents in a coordinated
fashion with the cloud provider in accordance with their respective roles
and responsibilities for the computing environment.
NIST SP 800-146 lists the following issues and concerns of SaaS deployments:
■ Browser-based risks and risk remediation
■ Network dependence
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
274 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 275
Other general security issues that need to be considered include inconsistent user
credentials and authorization and data sharing issues related to using cryptography.
Distributed Systems
Distributed systems are discussed in the “Computing Platforms” section earlier in
this chapter.
Grid Computing
Grid computing is the process of harnessing the CPU power of multiple physical
machines to perform a job. In some cases, individual systems might be allowed to
leave and rejoin the grid. Although the advantage of additional processing power
is great, there has to be concern for the security of data that could be present on
machines that are entering and leaving the grid without proper authentication and
authorization. Therefore, grid computing is not necessarily a safe implementation
when secrecy of the data is a key issue.
Peer-to-Peer Computing
Any client/server solution in which any platform/system may act as a client or server
or both is called peer-to-peer computing. A widely used example of this is instant
messaging (IM). These implementations present security issues that do not present
themselves in a standard client/server arrangement. In many cases these systems
operate outside the normal control of the network administrators.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
276 CISSP Cert Guide
Internet of Things
The Internet of Things (IoT) refers to a system of interrelated computing devices,
mechanical and digital machines, and objects that are provided with unique identi-
fiers and the ability to transfer data over a network without requiring human-to-
human or human-to-computer interaction. The IoT has presented attackers with a
new medium through which to carry out an attack. Often the developers of the IoT
devices add the IoT functionality without thoroughly considering the security impli-
cations of such functionality or without building in any security controls to protect
the IoT devices.
NOTE IoT is a term for all physical objects, or “things,” that are now embedded
with electronics, software, and network connectivity. Thanks to the IoT, these
objects—including automobiles, kitchen appliances, and heating and air conditioning
controllers—can collect and exchange data. Unfortunately, engineers give most of
these objects this ability just for convenience and without any real consideration of
the security impacts. When these objects are then deployed, consumers do not think
of security either. The result is consumer convenience but also risk. As the IoT
evolves, security professionals must be increasingly involved in the IoT evolution to
help ensure that security controls are designed to protect these objects and the data
they collect and transmit.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 277
IoT Examples
IoT deployments include a wide variety of devices but are broadly categorized into
five groups:
■ Smart home: Includes products that are used in the home. They range from
personal assistance devices, such as Amazon’s Alexa, to HVAC components,
such as the Nest Thermostat. The goals of these devices are home manage-
ment and automation.
■ Wearables: Includes products that are worn by users. They range from
watches, such as the Apple Watch, to personal fitness devices, like the Fitbit.
■ Smart cities: Includes devices that help resolve traffic congestion issues and
reduce noise, crime, and pollution. They include smart energy, smart transpor-
tation, smart data, smart infrastructure, and smart mobility.
■ Connected cars: Includes vehicles that have Internet access and data-sharing
capabilities. They include GPS devices, OnStar, and AT&T-connected cars.
■ Business automation: Includes devices that automate HVAC, lighting, access
control, and fire detection for organizations.
When selecting IoT devices, particularly those that are implemented at the organi-
zational level, security professionals need to look into the following:
■ Does the vendor design explicitly for privacy and security?
■ Does the vendor have a bug bounty program and vulnerability reporting
system?
■ Does the device have default or manual overrides or special functions for
disconnected operations?
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
278 CISSP Cert Guide
Facets
Transportation
Activities
Timing
Energy Data
Artifacts
Boundaries
Healthcare Composition
Model of a CPS CPS CPS Assurance
Life Cycle
…Domain
Domains represent the different application areas of CPS and include all those
listed in Table 3-5. This list is expected to expand as new CPS and IoT devices are
launched.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 279
Domains
Agriculture Financial services
Buildings Healthcare
Cities Infrastructure (communications, power, water)
Communities Leisure
Consumer Manufacturing
Defense Science
Disaster resilience Social networks
Education Supply chain/retail
Emergency response Transportation
Energy Weather
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
280 CISSP Cert Guide
Aspect Description
Trustworthiness Concerns about trustworthiness of CPS including security, privacy, safety,
reliability, and resilience.
Timing Concerns about time and frequency in CPS, including the generation and
transport of time and frequency signals, timestamping, managing latency,
timing composability, and so on.
Data Concerns about data interoperability including fusion, metadata, type,
identity, and so on.
Boundaries Concerns related to demarcations of topological, functional, organizational,
or other forms of interactions.
Composition Concerns related to the ability to compute selected properties of a
component assembly from the properties of its components.
Compositionality requires components that are composable: they do
not change their properties in an assembly. Timing composability is
particularly difficult.
Life cycle Concerns about the life cycle of CPS including its components.
To learn more about the CPS Framework and other IoT initiatives from NIST, go
to https://www.nist.gov/itl/applied-cybersecurity/nist-cybersecurity-iot-program/
related-initiatives-nist.
Microservices
Microservices is a term for an application design technique whereby developers design
highly scalable, flexible applications by decomposing the application into discrete
services that implement specific business functions. These services, often referred to
as “loosely coupled,” can then be built, deployed, and scaled independently.
Microservices are based on container technology. Security professionals should
ensure that security is deployed at the container level. Containers are based on base-
line images, which may contain vulnerabilities. Organizations should perform regu-
lar scans of container images to ensure the images do not contain security issues.
To protect containers at runtime, organizations should adopt the principle of least
privilege.
Microservices should also be secured by creating one entry point, which all clients
and systems access, and which can easily be secured. This entry point is called an
API gateway. The API gateway performs authentication and authorization, and
filters requests to sensitive resources.
Using microservices, each service is a separate, isolated application section.
Programmers should be able to implement, maintain, modify, extend, and update
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 281
Containerization
Containerization is the use of containers to isolate and maintain an application. All
resources that the application requires to run are placed inside that container. When
an application is contained, you can pick it up and move it around regardless of the
host operating system if a virtualization host is deployed.
Organizations can run software without worrying about operating systems or
dependencies. Because an operating system runs underneath the containerization
platform, developers do not have to build a production environment with the right
settings and libraries. These are built into the container. Containers are not depen-
dent on the underlying OS and are more portable than virtual machines.
Container isolation provides security benefits. However, isolation does not make a
container safe by default. If attackers can find a container escape flaw, this flaw can
be used to gain access to sensitive data in other containers. Also, container platforms
often do not take advantage of network segmentation. Without network segmenta-
tion, an attacker can more easily cross from one compromised container to other
vulnerable ones on the same network.
Because containers are portable and easy to set up, attackers can create their own
malware-laden containers and upload them to public resources. Before running
containers, security professionals should understand the source and assess the
container’s security to ensure it is trustworthy and not opening the organization’s
network for attackers.
Security professionals must update and securely configure the host OS, harden the
containerization layers and any orchestration software, and configure accounts based
on the principles of least privilege. Otherwise, attackers will focus on insecurely
configured containerization layers. In addition, security professionals should ensure
protections are in place for all sensitive information, such as credentials, API keys,
and tokens at every level: the containerization platform, orchestration platforms, and
the individual containers.
Serverless Systems
Serverless is a term used for a model wherein applications rely on managed services
that do away with the need to manage, patch, and secure infrastructure and virtual
machines. This is most commonly seen deployed in the cloud. Serverless systems
have many vulnerabilities of which security professionals must be aware.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
282 CISSP Cert Guide
Any misconfigurations can act as an entry point for attacks against serverless archi-
tectures. With many independent functions and services, security professionals
should ensure that the principle of least privilege is followed for all user accounts. In
addition, the privileges of functions should be properly configured because privilege
escalation is considered a potential security threat.
Injection flaws in applications are one of the most common security risks. They
include untrusted inputs in application calls, cloud storage event triggers, NoSQL
databases, and code changes.
Monitoring and logging in serverless systems must be properly configured as if
these systems were physical systems. In addition, any third-party dependencies must
be documented and the security of them verified.
Because debugging services are often limited to the capabilities of the developers,
developers should implement verbose error messages and enable the debugging
mode. But these should be disabled when the application is moved to production
because they may reveal information about serverless functions and the logic used.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 283
primarily on the edge of the network perimeter, rather than relying on a central
location far away. Edge computing devices are often small, lacking built-in security,
and without automatic updates. They are often an easy entry point into the network,
which can then be used to access main systems.
Security professionals should ensure that edge computing systems are protected
against digital and physical attacks. Employing security by design is basic to secur-
ing edge computing systems. Poorly configured and poorly secured edge computing
systems provide attackers more opportunities to disrupt operations or to gain access
to the broader enterprise network. If the edge computing systems interact with the
service provider edge, organizations should examine the service provider’s security
processes, service-level agreements (SLAs) and architecture alignment. Employing
zero trust will ensure that untrusted devices will be more easily detectable. Finally,
organizations should ensure that any open-source code is assessed for security
vulnerabilities.
Virtualized Systems
Today physical servers are increasingly being consolidated as virtual servers on the
same physical box. Virtual networks using virtual switches even exist in the physi-
cal devices that host these virtual servers. These virtual network systems and their
traffic can be segregated in all the same ways as in a physical network using subnets,
VLANs, and of course, virtual firewalls. Virtual firewalls are software that has been
specifically written to operate in the virtual environment. Increasingly, virtualization
vendors such as VMware are making part of their code available to security vendors
to create firewalls (and antivirus products) that integrate closely with the product.
Keep in mind that in any virtual environment each virtual server that is hosted on
the physical server must be configured with its own security mechanisms. These
mechanisms include antivirus and anti-malware software and all the latest service
packs and security updates for all the software hosted on the virtual machine. Also,
remember that all the virtual servers share the resources of the physical device.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
284 CISSP Cert Guide
Maintenance Hooks
From the perspective of software development, a maintenance hook is a set of
instructions built into the code that allows someone who knows about the so-called
backdoor to use the instructions to connect to view and edit the code without using
the normal access controls. In many cases, maintenance hooks are placed in an appli-
cation to make it easier for the vendor to load patches, fix bugs, and/or otherwise
provide software support to the customer. In other cases, maintenance hooks can be
used in testing and tracking the activities of the product and not removed when the
application is deployed.
Regardless of how the maintenance hooks got into the code, they can present a
major security issue if they become known to hackers who can use them to access
the system. Countermeasures on the part of the customer to mitigate the danger are
■ Use a host-based IDS to record any attempts to access the system using one of
these hooks.
■ Encrypt all sensitive information contained in the system.
■ Implement auditing to supplement the IDS.
The best solution is for the vendor to remove all maintenance hooks before the
product goes into production. Code reviews should be performed to identify and
remove these hooks.
Time-of-Check/Time-of-Use Attacks
Time-of-check/time-of-use attacks attempt to take advantage of the sequence of
events that occur as the system completes common tasks. It relies on knowledge of
the dependencies present when a specific series of events occur in multiprocessing
systems. By attempting to insert themselves between events and introduce changes,
hackers can gain control of the result.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 285
Web-Based Attacks
Attacks upon information security infrastructures have continued to evolve steadily
over time, and the latest attacks use largely more sophisticated web application–
based attacks. These attacks have proven more difficult to defend with traditional
approaches using perimeter firewalls.
XML
Extensible Markup Language (XML) is the most widely used web language now
and has come under some criticism. The method currently used to sign data to
verify its authenticity has been described as inadequate by some, and the other
criticisms have been directed at the architecture of XML security in general. Next,
we discuss an extension of this language that attempts to address some of these
concerns.
SAML
Security Assertion Markup Language (SAML) is an XML-based open standard
data format for exchanging authentication and authorization data between parties,
in particular between an identity provider and a service provider. SAML allows the
user to have a portable identity for authentication and authorization on the Internet.
The major issue on which it focuses is called the web browser single sign-on (SSO)
problem.
SSO is the ability to authenticate once to access multiple sets of data. SSO at the
Internet level is usually accomplished with cookies, but extending the concept
beyond the Internet has resulted in many propriety approaches that are not interop-
erable. SAML’s goal is to create a standard for this process.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
286 CISSP Cert Guide
OWASP
The Open Web Application Security Project (OWASP) is an open-source application
security project. This group creates guidelines, testing procedures, and tools to assist
with web security. They are also known for maintaining a top-10 list of web applica-
tion security risks. Information on OWASP can be obtained from www.owasp.org.
While the most common types of corporate information stored on personal devices
are corporate emails and company contact information, it is alarming to note that
almost half of these devices also contain customer data, network login credentials,
and corporate data accessed through business applications.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 287
The main issues regarding mobile systems are device security, application security,
and mobile device concerns. Also, we cover NIST SP 800-164, which provides
guidelines for mobile devices.
Device Security
Device security involves the physical security of the mobile device. In the event that
a device is lost or stolen, users also need the capability to remotely track and lock the
device. Some of the recommendations for device security include
■ Locking your phone with a password or fingerprint detection
■ Encrypting your data
■ Setting up remote wipe
■ Backing up phone, credit card, pictures, and other personal data
■ Avoiding jail-breaking your iPhone or rooting your Android
■ Updating the operating system as updates are available
■ Being aware of social engineering scams
■ Using public Wi-Fi with added caution
Application Security
Although device security is important for mobile devices, application security is
just as important. Users should download approved apps only from the vendor
application stores. Some of the recommendations for application security include
■ Avoiding third-party apps
■ Being aware of social engineering scams
■ Downloading reputable and proven-to-work anti-malware for your mobile
device
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
288 CISSP Cert Guide
control over the security of the networks in which these devices are allowed to
operate.
Other initiatives today include company-owned, business only (COBO), company-
owned, personally enabled (COPE), and choose-your-own-device (CYOD)
deployments. No matter which deployment an organization uses, security
professionals must ensure that the risks of each model are understood and that
the appropriate policies are in place to protect company data and assets. Security
professionals are responsible for ensuring that management understands these risks
and implements the appropriate tools to control access to the enterprise.
Centralized mobile device management tools are a fast-growing solution. Some of
these tools leverage the messaging server’s management capabilities, and others are
third-party tools that can manage multiple brands of devices. Systems Manager by
Cisco is one example that integrates with the Cisco Meraki cloud services. Another
example for iOS devices is the Apple Configurator. One of the challenges with
implementing such a system is that not all personal devices may support native
encryption and/or the management process.
Typically, centralized mobile device management tools handle company-issued and
personal mobile devices differently. For organization-issued devices, a client applica-
tion typically manages the configuration and security of the entire device. If a per-
sonal device is allowed through a BYOD initiative, the application typically manages
the configuration and security of itself and its data only. The application and its data
are sandboxed from the other applications and data. The result is that the organiza-
tion’s data and the user’s data are protected if the device is stolen.
Regardless of whether a centralized mobile device management tool is in use, a
BYOD policy should include the following in the organization’s security policy:
■ Identify the allowed uses of personal devices on the corporate network.
■ Create a list of allowed applications on the devices and design a method of
preventing the installation of applications not on the list (for example, software
restriction policies).
■ Ensure that high levels of management are on board and supportive.
■ Train and regularly remind users to follow the new policies.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 289
As with many of the other security issues discussed in this book, user education is
key. A security professional must ensure that users understand the importance of
mobile device security.
If an organization does not implement an MDM or MAM solution, the mobile
device security policy should include, at minimum, the following policies:
■ Implement anti-malware/antivirus software on all mobile devices.
■ Use only secure communications.
■ Use strong authentication.
■ Require a PIN or some other login mechanism with each use of the device
after a certain idle period (no more than 10 minutes of inactivity).
■ Limit third-party software.
■ Implement GPS and other location services.
■ Enable remote locking and remote wiping features.
■ Never leave the device unattended.
■ Immediately report any missing or stolen device.
■ Disable all unnecessary options, applications, and services, including
Bluetooth.
■ Regularly back up data.
■ Install all updates from the device manufacturer.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
290 CISSP Cert Guide
NIST SP 800-164
NIST SP 800-164 is a draft Special Publication that gives guidelines on hardware-
rooted security in mobile devices. It defines three required security components for
mobile devices: Roots of Trust (RoTs), an application programming interface (API)
to expose the RoTs to the platform, and a Policy Enforcement Engine (PEnE).
Roots of Trust are the foundation of assurance of the trustworthiness of a mobile
device. RoTs must always behave in an expected manner because their misbehavior
cannot be detected. Hardware RoTs are preferred over software RoTs due to their
immutability, smaller attack surfaces, and more reliable behavior. They can provide
a higher degree of assurance that they can be relied upon to perform their trusted
function or functions. Software RoTs could provide the benefit of quick deployment
to different platforms. To support device integrity, isolation, and protected storage,
devices should implement the following RoTs:
■ Root of Trust for Storage (RTS)
■ Root of Trust for Verification (RTV)
■ Root of Trust for Integrity (RTI)
■ Root of Trust for Reporting (RTR)
■ Root of Trust for Measurement (RTM)
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 291
Mobile devices should implement the following three mobile security capabilities to
address the challenges with mobile device security:
■ Device integrity: Device integrity is the absence of corruption in the hard-
ware, firmware, and software of a device. A mobile device can provide evidence
that it has maintained device integrity if its software, firmware, and hardware
configurations can be shown to be in a state that is trusted by a relying party.
■ Isolation: Isolation prevents unintended interaction between applications and
information contexts on the same device.
■ Protected storage: Protected storage preserves the confidentiality and integ-
rity of data on the device while at rest, while in use (in the event an unauthor-
ized application attempts to access an item in protected storage), and upon
revocation of access.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
292 CISSP Cert Guide
Cryptographic Solutions
While security architecture and engineering involves securing all the devices that an
organization implements, it is not just enough to secure the devices. Organizations
must also secure the data as it resides on the devices and as it is transmitted over the
network. Cryptography involves using algorithms to protect data. The following
sections discuss cryptography concepts, cryptography history, cryptosystem features,
cryptographic mathematics, and cryptographic life cycle.
Cryptography Concepts
A security professional should understand many terms and concepts related to
cryptography.
These terms are often used when discussing cryptography:
■ Encryption: The process of converting data from plaintext to ciphertext. Also
referred to as enciphering.
■ Decryption: The process of converting data from ciphertext to plaintext. Also
referred to as deciphering.
■ Key: A parameter that controls the transformation of plaintext into ciphertext
or vice versa. Determining the original plaintext data without the key
is impossible. Keys can be both public and private. Also referred to as a
cryptovariable.
■ Synchronous: When encryption or decryption occurs immediately.
■ Asynchronous: When encryption or decryption requests are processed from a
queue. This method utilizes hardware and multiple processors in the process.
■ Symmetric: An encryption method whereby a single private key both encrypts
and decrypts the data. Also referred to as private or secret key encryption.
■ Asymmetric: An encryption method whereby a key pair, one private key and
one public key, performs encryption and decryption. One key performs the
encryption, whereas the other key performs the decryption. Also referred to as
public key encryption.
■ Digital signature: A method of providing sender authentication and message
integrity. The message acts as an input to a hash function, and the sender’s pri-
vate key encrypts the hash value. The receiver can perform a hash computation
on the received message to determine the validity of the message.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 293
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
294 CISSP Cert Guide
■ Confusion: The process of changing a key value during each round of encryp-
tion. Confusion is often carried out by substitution. Confusion conceals a
statistical connection between the plaintext and ciphertext. Claude Shannon
first discussed confusion.
■ Diffusion: The process of changing the location of the plaintext within the
ciphertext. Diffusion is often carried out using transposition. Claude Shannon
first introduced diffusion.
■ Avalanche effect: The condition where any change in the key or plaintext, no
matter how minor, will significantly change the ciphertext. Horst Feistel first
introduced avalanche effect.
■ Work factor or work function: The amount of time and resources that would
be needed to break the encryption.
■ Trapdoor: A secret mechanism that allows the implementation of the reverse
function in a one-way function.
■ One-way function: A mathematical function that can be more easily per-
formed in one direction than in the other.
Cryptography History
Cryptography has its roots in ancient civilizations. Although early cryptography
solutions were simplistic in nature, they were able to provide leaders with a means of
hiding messages from enemies.
In their earliest forms, most cryptographic methods implemented some sort of sub-
stitution cipher, where each character in the alphabet was replaced with another. A
mono-alphabetic substitution cipher uses only one alphabet, and a polyalphabetic
substitution cipher uses multiple alphabets. As with all other cryptography methods,
the early substitution ciphers had to be replaced by more complex methods.
The Spartans created the scytale cipher, which used a sheet of papyrus wrapped
around a wooden rod. The encrypted message had to be wrapped around a rod of
the correct size to be deciphered, as shown in Figure 3-8.
Y E T T
H E E A
R T H D
M
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 295
Standard Alphabet
ABCDEFGHIJKLMNOPQRSTUVWXYZ
DEFGHIJKLMNOPQRSTUVWXYZABC
Caesar Cipher
Vigenere Cipher
In the sixteenth century, Blaise de Vigenere of France developed one of the first
polyalphabetic substitution ciphers, today known as the Vigenere cipher. Although
it is based on the Caesar cipher, the Vigenere cipher is considerably more compli-
cated because it uses 27 shifted alphabets (see the Vigenere table in Figure 3-10). To
encrypt a message, you must know the security key and use it in conjunction with
the plaintext message to determine the ciphertext.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
296 CISSP Cert Guide
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A A B C D E F G H I J K L M N O P Q S S T U V W X Y Z
B B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
C C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
D D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
E E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
F F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
G G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
H H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
I I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
J J K L M N O P Q R S T U V W X Y Z A B C D E F G H I
K K L M N O P Q R S T U V W X Y Z A B C D E F G H I J
L L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
M M N O P Q R S T U V W X Y Z A B C D E F G H I J K L
N N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
O O P Q R S T U V W X Y Z A B C D E F G H I J K L M N
P P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
Q Q R S T U V W X Y Z A B C D E F G H I J K L M N O P
R R S T U V W X Y Z A B C D E F G H I J K L M N O P Q
S S T U V W X Y Z A B C D E F G H I J K L M N O P Q R
T T U V W X Y Z A B C D E F G H I J K L M N O P Q R S
U U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
V V W X Y Z A B C D E F G H I J K L M N O P Q R S T U
W W X Y Z A B C D E F G H I J K L M N O P Q R S T U V
X X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Y Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
Z Z A B C D E F G H I J K L M N O P Q R S T U V W X Y
As an example of a message on which the Vigenere cipher is applied, let’s use the
security key PEARSON and the plaintext message of MEETING IN CONFER-
ENCE ROOM. The first letter in the plaintext message is M, and the first letter in
the key is P. We should locate the letter M across the headings for the columns. We
follow that column down until it intersects with the row that starts with the letter
P, resulting in the letter B. The second letter of the plaintext message is E, and the
second letter in the key is E. Using the same method, we obtain the letter I. We con-
tinue in this same manner until we run out of key letters, and then we start over with
the key, which would result in the second letter I in the plaintext message working
with the letter P of the key.
So applying this technique to the entire message, the MEETING IN CONFER-
ENCE ROOM plaintext message converts to BIEKABT XR CFFTRGINTW
FBDQ ciphertext message.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 297
Kerckhoffs’s Principle
In the nineteenth century, Auguste Kerckhoffs developed six design principles for
the military use of ciphers. The six principles are as follows:
■ The system must be practically, if not mathematically, indecipherable.
■ It must not be required to be secret, and it must be able to fall into the hands
of the enemy without inconvenience.
■ Its key must be communicable and retainable without the help of written
notes, and changeable or modifiable at the will of the correspondents.
■ It must be applicable to telegraphic correspondence.
■ It must be portable, and its usage and function must not require the concourse
of several people.
■ Finally, given the circumstances that command its application, the system
needs to be easy to use, requiring neither mental strain nor the knowledge of a
long series of rules to observe.
In Kerckhoffs’s principle, remember that the key is secret, and the algorithm is
known.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
298 CISSP Cert Guide
Lucifer by IBM
The Lucifer project, developed by IBM, developed complex mathematical equations.
These equations later were used by the U.S. National Security Agency in the devel-
opment of the U.S. Digital Encryption Standard (DES), which is still used today in
some form. Lucifer used a Feistel cipher, an iterated block cipher that encrypts the
plaintext by breaking the block into two halves. The cipher then applies a round of
transformation to one of the halves using a subkey. The output of this transforma-
tion is Exclusive ORed (XORed) with the other block half. Finally, the two halves
are swapped to complete the round.
Cryptosystem Features
A cryptosystem consists of software, protocols, algorithms, and keys. The strength of
any cryptosystem comes from the algorithm and the length and secrecy of the key.
For example, one method of making a cryptographic key more resistant to exhaus-
tive attacks is to increase the key length. If the cryptosystem uses a weak key, it
facilitates attacks against the algorithm.
While a cryptosystem supports the three core principles of the CIA triad, crypto-
systems directly provide authentication, confidentiality, integrity, authorization, and
non-repudiation. The availability tenet of the CIA triad is supported by cryptosys-
tems, meaning that implementing cryptography will help to ensure that an organiza-
tion’s data remains available. However, cryptography does not directly ensure data
availability although it can be used to protect the data.
Authentication
Cryptosystems provide authentication by being able to determine the sender’s iden-
tity and validity. Digital signatures verify the sender’s identity. Protecting the key
ensures that only valid users can properly encrypt and decrypt the message.
Confidentiality
Cryptosystems provide confidentiality by altering the original data in such a way
as to ensure that the data cannot be read except by the valid recipient. Without the
proper key, unauthorized users are unable to read the message.
Integrity
Cryptosystems provide integrity by allowing valid recipients to verify that data has
not been altered. Hash functions do not prevent data alteration but provide a means
to determine whether data alteration has occurred.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 299
Authorization
Cryptosystems provide authorization by providing the key to valid users after those
users prove their identity through authentication. The key given to a user will allow
the user to access a resource.
Non-repudiation
Non-repudiation in cryptosystems provides proof of the origin of data, thereby pre-
venting senders from denying that they sent a message and supporting data integrity.
Public key cryptography and digital signatures provide non-repudiation.
The executive actions and the Office of Management and Budget (OMB) circulars
and memorandums that affect U.S. government systems cryptography standards
are also listed in NIST SP 800-175A. It also gives the definitions for the following
policies:
■ Information management policy: Specifies what information is to be
collected or created, and how it is to be managed
■ Information security policy: Supports and enforces portions of the
organization’s information management policy by specifying in more detail
what information is to be protected from anticipated threats and how that
protection is to be attained
■ Key management policy: Includes descriptions of the authorization and pro-
tection objectives and constraints that apply to the generation, distribution,
accounting, storage, use, recovery, and destruction of cryptographic keying
material, and the cryptographic services to be provided
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
300 CISSP Cert Guide
Finally, NIST SP 800-175A lists the Risk Management Framework steps from
NIST SP 800-37 that affect cryptography selection: categorization of information
and information systems and selection of security controls.
Cryptographic Mathematics
All cryptographic algorithms involve the use of mathematics. The fundamental
mathematical concepts for cryptography are discussed in the following sections.
Boolean
The rules used for the bits and bytes that form a computer are established by
Boolean mathematics. In a Boolean system, the values of each circuit are either true
or false, usually denoted by 1 and 0, respectively.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 301
Modulo Function
Used in cryptography, a modulo function is the value that is left over/remainder after
a division operation is performed. For example, 32 divided by 8 would have a remain-
der of 0 because 8 goes into 32 an even number of times (4); modulo in this case is 0.
The number 10 divided by 3 would have a remainder of 1 because 10 divided by
3 equals 3 with a remainder of 1. Therefore, modulo of 10 divided by 3 is 1.
One-Way Function
A one-way function produces output values for each possible combination of inputs.
This makes it impossible to retrieve the input values of a one-way function. Public
key algorithms are based on one-way functions. The inputs used are prime numbers.
For example, suppose an input contains only prime numbers with three digits. The
output or result of those three prime numbers could be determined using a good
calculator. However, if someone obtains the result of 19,786,001, it would be hard to
determine which three three-digit prime numbers were used. (By the way, 101, 227,
and 863 are the three prime numbers used.)
Nonce
A nonce is a random number that is used only once and acts as a placeholder variable
in functions. When the function is actually executed, the nonce is replaced with a
random number generated at the time of processing. A common example of a nonce
is an initialization vector (IV). IVs are values that are used to create a unique cipher-
text every time the same message is encrypted using the same key.
Split Knowledge
Split knowledge is the term used when information or privilege is divided between
multiple users or entities so that no single user has sufficient privileges to compro-
mise security. An example of split knowledge in cryptography is key escrow. With
key escrow, the key is held by a third party to ensure that the key could be retrieved
if the issuing party ceases to exist or has a catastrophic event.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 303
Key Management
Key management in cryptography is essential to ensure that the cryptography
provides confidentiality, integrity, and authentication. If a key is compromised, it can
have serious consequences throughout an organization.
Key management involves the entire process of ensuring that keys are protected
during creation, distribution, transmission, storage, and disposal. As part of this
process, keys must also be destroyed properly. When you consider the vast number
of networks over which the key is transmitted and the different types of systems on
which a key is stored, the enormity of this issue really comes to light.
As the most demanding and critical aspect of cryptography, it is important that
security professionals understand key management principles.
Keys should always be stored in ciphertext when stored on a noncryptographic
device. Key distribution, storage, and maintenance should be automatic by integrat-
ing the processes into the application.
Because keys can be lost, backup copies should be made and stored in a secure loca-
tion. A designated individual should have control of the backup copies with other
designated individuals serving as emergency backups. The key recovery process
should also require more than one operator to ensure that only valid key recovery
requests are completed. In some cases, keys are even broken into parts and deposited
with trusted agents, who provide their part of the key to a central authority when
authorized to do so. Although other methods of distributing parts of a key are used,
all the solutions involve the use of trustee agents entrusted with part of the key and
a central authority tasked with assembling the key from its parts. Also, key recovery
personnel should span across the entire organization and not just be members of the
IT department.
Organizations should also limit the number of keys that are used. The more keys
that you have, the more keys you must worry about and ensure are protected.
Although a valid reason for issuing a key should never be ignored, limiting the
number of keys issued and used reduces the potential damage.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
304 CISSP Cert Guide
Algorithm Selection
When selecting an algorithm, organizations need to understand the data that needs
protecting and the organizational environment, including any regulations and
standards with which they must comply. Organizations should answer the following
questions when selecting the algorithm to use:
■ What is the encryption timeframe? Use encryption that can survive a
brute-force attack at least long enough that the data is no longer important to
keep secret.
■ What data types need to be encrypted? Data at rest, data in use, and data in
motion need different types of encryption for protection.
■ What system restrictions exist? Considerations include budget, operating
system restrictions, infrastructure restrictions, and so on.
■ Who will be exchanging the encrypted data? Legacy systems may cause
restrictions on the encryption that can be used when data is exchanged.
Cryptographic Types
Algorithms that are used in computer systems implement complex mathematical
formulas when converting plaintext to ciphertext. The two main components to any
encryption system are the key and the algorithm. In some encryption systems, the
two communicating parties use the same key. In other encryption systems, the two
communicating parties use different keys in the process, but the keys are related.
In the following sections, we discuss the following:
■ Running key and concealment ciphers
■ Substitution ciphers
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 305
■ Transposition ciphers
■ Symmetric algorithms
■ Asymmetric algorithms
■ Hybrid ciphers
Substitution Ciphers
A substitution cipher uses a key to substitute characters or character blocks with
different characters or character blocks. The Caesar cipher and Vigenere cipher are
two of the earliest forms of substitution ciphers.
Another example of a substitution cipher is a modulo 26 substitution cipher. With
this cipher, the 26 letters of the alphabet are numbered in order starting at zero. The
sender takes the original message and determines the number of each letter in the
original message. Then the letter values for the keys are added to the original letter
values. The value result is then converted back to text.
Figure 3-11 shows an example of a modulo 26 substitution cipher encryption. With
this example, the original message is PEARSON, and the key is KEY. The ciphertext
message is ZIYBSMX.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
306 CISSP Cert Guide
One-Time Pads
A one-time pad, invented by Gilbert Vernam, is the most secure encryption scheme
that can be used. If it’s used properly, an attacker cannot break a one-time pad. A
one-time pad works like a running cipher in that the key value is added to the value
of the letters. However, a one-time pad uses a key that is the same length as the
plaintext message, whereas the running cipher uses a smaller key that is repeatedly
applied to the plaintext message.
Figure 3-12 shows an example of a one-time pad encryption. With this example, the
original message is PEARSON, and the key is JOHNSON. The ciphertext message
is YSHEKCA.
To ensure that the one-time pad is secure, the following conditions must exist:
■ Must be used only one time
■ Must be as long as (or longer than) the message
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 307
Although the earlier example uses a one-time pad in a modulo 26 scheme, one-
time pads can also be used at the bit level. When the bit level is used, the message
is converted into binary, and an XOR operation occurs two bits at a time. The
bits from the original message are combined with the key values to obtain the
encrypted message. When you combine the values, the result is 0 if both values are
the same and 1 if both values are different. An example of an XOR operation is as
follows:
Original message 01101100
Key 11011100
Cipher message 10110000
Steganography
Steganography occurs when a message is hidden inside another object, such as a
picture, audio file, video file, or a document. In steganography, it is crucial that only
those who are expecting the message know that the message exists.
A concealment cipher, discussed earlier, is one method of steganography. Another
method of steganography is digital watermarking, which is a logo or trademark that
is embedded in documents, pictures, or other objects. The watermarks deter people
from using the materials in an unauthorized manner.
Transposition Ciphers
A transposition cipher scrambles the letters of the original message in a different
order. The key determines the positions to which the letters are moved.
Figure 3-13 shows an example of a simple transposition cipher. With this example,
the original message is PEARSON EDUCATION, and the key is 4231 2314. The
ciphertext message is REAP ONSE AUCD IOTN. So you take the first four letters
of the plaintext message (PEAR) and use the first four numbers (4231) as the key
for transposition. In the new ciphertext, the letters would be REAP. Then you take
the next four letters of the plaintext message (SONE) and use the next four num-
bers (2314) as the key for transposition. In the new ciphertext, the letters would be
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
308 CISSP Cert Guide
ONSE. Then you take the next four letters of the original message and apply the
first four numbers of the key because you do not have any more numbers in the key.
Continue this pattern until complete.
Symmetric Algorithms
Symmetric algorithms use a private or secret key that must remain secret between
the two parties. Each party pair requires a separate private key. Therefore, a single
user would need a unique secret key for every user with whom they communicate.
Consider an example where there are 10 unique users. Each user needs a separate
private key to communicate with the other users. To calculate the number of keys
that would be needed in this example, you would use the following formula:
# of users × (# of users – 1) / 2
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 309
The two broad types of symmetric algorithms are stream-based ciphers and block
ciphers. Initialization vectors (IVs) are an important part of block ciphers. These
three components are discussed next.
Stream-Based Ciphers
Stream-based ciphers perform encryption on a bit-by-bit basis and use keystream
generators. The keystream generators create a bit stream that is XORed with the
plaintext bits. The result of this XOR operation is the ciphertext.
A synchronous stream-based cipher depends only on the key, and an asynchronous
stream cipher depends on the key and plaintext. The key ensures that the bit stream
that is XORed to the plaintext is random.
An example of a stream-based cipher is RC4, which is discussed later in this chapter.
Advantages of stream-based ciphers include the following:
■ Generally have lower error propagation because encryption occurs on each bit
■ Generally used more in hardware implementation
■ Use the same key for encryption and decryption
■ Generally cheaper to implement than block ciphers
■ Employ only confusion concept
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
310 CISSP Cert Guide
Block Ciphers
Block ciphers perform encryption by breaking the message into fixed-length units,
called blocks. A message of 1,024 bits could be divided into 16 blocks of 64 bits each.
Each of those 16 blocks is processed by the algorithm formulas, resulting in a single
block of ciphertext.
Examples of block ciphers include IDEA, Blowfish, RC5, and RC6, which are
discussed later in this chapter.
Advantages of block ciphers include the following:
■ Implementation is easier than stream-based cipher implementation.
■ Generally less susceptible to security issues.
■ Generally used more in software implementations.
Block ciphers employ both confusion and diffusion. Block ciphers often use different
modes: ECB, CBC, CFB, and CTR. These modes are discussed in detail later in this
chapter.
Asymmetric Algorithms
Asymmetric algorithms use both a public key and a private or secret key. The public
key is known by all parties, and the private key is known only by its owner. One of
these keys encrypts the message, and the other decrypts the message.
In asymmetric cryptography, determining a user’s private key is virtually impos-
sible even if the public key is known, although both keys are mathematically
related. However, if a user’s private key is discovered, the encryption system can be
compromised.
Asymmetric algorithms can be referred to as dual-key or public key cryptography.
Asymmetric systems provide confidentiality, integrity, authentication, and non-
repudiation. Because both users have one unique key that is part of the process,
determining where the message originated is possible.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 311
Hybrid Ciphers
Because both symmetric and asymmetric algorithms have weaknesses, solutions
have been developed that use both types of algorithms in a hybrid cipher. By using
both algorithm types, the cipher provides confidentiality, authentication, and
non-repudiation.
The process for hybrid encryption is as follows:
1. The symmetric algorithm provides the keys used for encryption.
2. The symmetric keys are then passed to the asymmetric algorithm, which
encrypts the symmetric keys and automatically distributes them.
3. The message is then encrypted with the symmetric key.
4. Both the message and the key are sent to the receiver.
5. The receiver decrypts the symmetric key and uses the symmetric key to
decrypt the message.
An organization should use hybrid encryption if the parties do not have a shared
secret key and large quantities of sensitive data must be transmitted.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
312 CISSP Cert Guide
Elliptic Curves
Elliptic curves are public key algorithms that use mathematical functions to create
faster, smaller, and more efficient cryptographic keys based on the elliptic curve the-
ory. The algebraic structure of the elliptic curves over infinite fields provides a more
difficult to break mechanism.
NOTE Elliptic Curve Cryptosystem (ECC) is discussed in detail later in this chapter.
Quantum Cryptography
Quantum cryptography, also called quantum encryption, uses quantum mechan-
ics principles to encrypt messages. Quantum’s multiple states, coupled with its “no
change theory,” are used as part of the process. Quantum cryptography requires
a quantum computer, which has the immense computing power to encrypt
and decrypt data. A quantum computer could quickly crack current public key
(asymmetric) cryptography.
Longer keys are a good defense against quantum computers breaking public key
cryptography. Another good defense is to use symmetric encryption for the messages
themselves and then use asymmetric encryption just for the keys.
Symmetric Algorithms
Symmetric algorithms were explained earlier in this chapter. In the following
sections, we discuss some of the most popular symmetric algorithms. Some of these
might no longer be commonly used because there are more secure alternatives.
Security professionals should be familiar with the following symmetric algorithms:
■ DES/3DES
■ AES
■ IDEA
■ Skipjack
■ Blowfish
■ Twofish
■ RC4/RC5/RC6/RC7
■ CAST
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 313
DES Modes
DES comes in the following five modes:
■ Electronic Code Book (ECB)
■ Cipher Block Chaining (CBC)
■ Cipher Feedback (CFB)
■ Output Feedback (OFB)
■ Counter Mode (CTR)
In ECB, 64-bit blocks of data are processed by the algorithm using the key. The
ciphertext produced can be padded to ensure that the result is a 64-bit block. If an
encryption error occurs, only one block of the message is affected. ECB operations
run in parallel, making it a fast method.
Although ECB is the easiest and fastest mode to use, it has security issues because
every 64-bit block is encrypted with the same key. If an attacker discovers the key,
all the blocks of data can be read. If an attacker discovers both versions of the 64-bit
block (plaintext and ciphertext), the key can be determined. For these reasons, the
mode should not be used when encrypting a large amount of data because patterns
would emerge.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
314 CISSP Cert Guide
ECB is a good choice if an organization needs encryption for its databases because
ECB works well with the encryption of short messages. Figure 3-14 shows the ECB
encryption process.
DES algorithm with key DES algorithm with key DES algorithm with key
In CBC, each 64-bit block is chained together because each resultant 64-bit cipher-
text block is applied to the next block. So plaintext message block 1 is processed by
the algorithm using an IV (discussed earlier in this chapter). The resultant ciphertext
message block 1 is XORed with plaintext message block 2, resulting in ciphertext
message 2. This process continues until the message is complete.
Unlike ECB, CBC encrypts large files without having any patterns within the result-
ing ciphertext. If a unique IV is used with each message encryption, the resultant
ciphertext will be different every time, even in cases where the same plaintext mes-
sage is used. Figure 3-15 shows the CBC encryption process.
DES algorithm with key DES algorithm with key DES algorithm with key
Whereas CBC and ECB require 64-bit blocks, CFB works with 8-bit (or smaller)
blocks and uses a combination of stream ciphering and block ciphering. Like CBC,
the first 8-bit block of the plaintext message is XORed by the algorithm using a key-
stream, which is the result of an IV and the key. The resultant ciphertext message is
applied to the next plaintext message block. Figure 3-16 shows the CFB encryption
process.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 315
The size of the ciphertext block must be the same size as the plaintext block. The
method that CFB uses can have issues if any ciphertext result has errors because
those errors will affect any future block encryption. For this reason, CFB should not
be used to encrypt data that can be affected by this problem, particularly video or
voice signals. This problem led to the need for DES OFB mode.
Similar to CFB, OFB works with 8-bit (or smaller) blocks and uses a combination of
stream ciphering and block ciphering. However, OFB uses the previous keystream
with the key to create the next keystream. Figure 3-17 shows the OFB encryption
process.
With OFB, the size of the keystream value must be the same size as the plaintext
block. Because of the way in which OFB is implemented, OFB is less susceptible to
the error type that CFB has.
CTR mode is similar to OFB mode. The main difference is that CTR mode uses an
incrementing IV counter to ensure that each block is encrypted with a unique key-
stream. Also, the ciphertext is not chaining into the encryption process. Because this
chaining does not occur, CTR performance is much better than the other modes.
Figure 3-18 shows the CTR encryption process.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
316 CISSP Cert Guide
AES
Advanced Encryption Standard (AES) is the replacement algorithm for DES. When
NIST decided a new standard was needed because DES had been cracked, NIST
was presented with five industry options:
■ IBM’s MARS
■ RSA Laboratories’ RC6
■ Anderson, Biham, and Knudsen’s Serpent
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 317
IDEA
International Data Encryption Algorithm (IDEA) is a block cipher that uses 64-bit
blocks. Each 64-bit block is divided into 16 smaller blocks. IDEA uses a 128-bit key
and performs eight rounds of transformations on each of the 16 smaller blocks.
IDEA is faster and harder to break than DES. However, IDEA is not as widely used
as DES or AES because it was patented, and licensing fees had to be paid to IDEA’s
owner, a Swiss company named Ascom. However, the patent expired in 2012. IDEA
is used in PGP, which is discussed later in this chapter.
Skipjack
Skipjack is a block-cipher, symmetric algorithm developed by the U.S. NSA. It
uses an 80-bit key to encrypt 64-bit blocks. This is the algorithm that is used in the
Clipper chip. Algorithm details are classified.
Blowfish
Blowfish is a block cipher that uses 64-bit data blocks using anywhere from 32- to
448-bit encryption keys. Blowfish performs 16 rounds of transformation. Initially
developed with the intention of serving as a replacement to DES, Blowfish is one of
the few algorithms that are not patented.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
318 CISSP Cert Guide
Twofish
Twofish is a version of Blowfish that uses 128-bit data blocks using 128-, 192-, and
256-bit keys. It uses 16 rounds of transformation. Like Blowfish, Twofish is not
patented.
RC4/RC5/RC6/RC7
A total of seven RC algorithms have been developed by Ron Rivest. RC1 was never
published, RC2 was a 64-bit block cipher, and RC3 was broken before release. So
the main RC implementations that a security professional needs to understand are
RC4, RC5, RC6, and RC7.
RC4, also called ARC4, is one of the most popular stream ciphers. It is used in SSL
and WEP (both of which are discussed in more detail in Chapter 4, “Communica-
tion and Network Security”). RC4 uses a variable key size of 40 to 2,048 bits and up
to 256 rounds of transformation.
RC5 is a block cipher that uses a key size of up to 2,048 bits and up to 255 rounds of
transformation. Block sizes supported are 32, 64, or 128 bits. Because of all the pos-
sible variables in RC5, the industry often uses an RC5=w/r/b designation, where w
is the block size, r is the number of rounds, and b is the number of 8-bit bytes in the
key. For example, RC5-64/16/16 denotes a 64-bit word (or 128-bit data blocks), 16
rounds of transformation, and a 16-byte (128-bit) key.
RC6 is a block cipher based on RC5, and it uses the same key size, rounds, and block
size. RC6 was originally developed as an AES solution, but lost the contest to Rijn-
dael. RC6 is faster than RC5.
RC7 is a block cipher based on RC6. Although it uses the same key size and rounds,
it has a block size of 256 bits. In addition, it uses six working registers instead of
four. As a result, it is much faster than RC6.
CAST
CAST, invented by Carlisle Adams and Stafford Tavares, has two versions: CAST-
128 and CAST-256. CAST-128 is a block cipher that uses a 40- to 128-bit key that
will perform 12 or 16 rounds of transformation on 64-bit blocks. CAST-256 is a
block cipher that uses a 128-, 160-, 192-, 224-, or 256-bit key that will perform 48
rounds of transformation on 128-bit blocks.
Table 3-14 lists the key facts about each symmetric algorithm.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 319
Asymmetric Algorithms
Asymmetric algorithms were explained earlier in this chapter. In the following sec-
tions, we discuss some of the most popular asymmetric algorithms. Some of them
might no longer be commonly used because more secure alternatives are available.
Security professionals should be familiar with the following symmetric algorithms:
■ Diffie-Hellman
■ RSA
■ El Gamal
■ ECC
■ Knapsack
■ Zero-knowledge proof
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
320 CISSP Cert Guide
Diffie-Hellman
Diffie-Hellman is an asymmetric key agreement algorithm created by Whitfield
Diffie and Martin Hellman. Diffie-Hellman is responsible for the key agreement
process. The key agreement process includes the following steps:
1. John and Sally need to communicate over an encrypted channel and decide to
use Diffie-Hellman.
2. John generates a private and public key, and Sally generates a private and a
public key.
3. John and Sally share their public keys with each other.
4. An application on John’s computer takes John’s private key and Sally’s public
key and applies the Diffie-Hellman algorithm, and an application on Sally’s
computer takes Sally’s private key and John’s public key and applies the Diffie-
Hellman algorithm.
5. Through this application, the same shared value is created for John and Sally,
which in turn creates the same symmetric key on each system using the asym-
metric key agreement algorithm.
Through this process, Diffie-Hellman provides secure key distribution, but not con-
fidentiality, authentication, or non-repudiation. The key to this algorithm is dealing
with discrete logarithms. Diffie-Hellman is susceptible to man-in-the-middle (or
on-path) attacks unless an organization implements digital signatures or digital cer-
tificates for authentication at the beginning of the Diffie-Hellman process.
RSA
RSA is the most popular asymmetric algorithm and was invented by Ron Rivest,
Adi Shamir, and Leonard Adleman. RSA can provide key exchange, encryption, and
digital signatures. The strength of the RSA algorithm is the difficulty of finding the
prime factors of very large numbers. RSA uses a 1,024- to 4,096-bit key and per-
forms one round of transformation.
RSA-768 and RSA-704 have been factored. If factorization of the prime numbers
used by an RSA implementation occurs, then the implementation is considered
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 321
breakable and should not be used. RSA-2048 is the largest RSA number. RSA-4096
is also available and has not been broken either. While RSA-4096 is considered
stronger, organizations may be unable to deploy RSA-4096 because an application
may limit them to 2048.
As a key exchange protocol, RSA encrypts a DES or an AES symmetric key for
secure distribution. RSA uses a one-way function to provide encryption/decryption
and digital signature verification/generation. The public key works with the one-way
function to perform encryption and digital signature verification. The private key
works with the one-way function to perform decryption and signature generation.
In RSA, the one-way function is a trapdoor. The private key knows the one-way
function. The private key is capable of determining the original prime numbers.
Finally, the private key knows how to use the one-way function to decrypt the
encrypted message.
Attackers can use Number Field Sieve (NFS), a factoring algorithm, to attack RSA.
El Gamal
El Gamal is an asymmetric key algorithm based on the Diffie-Hellman algorithm.
Like Diffie-Hellman, El Gamal deals with discrete logarithms. However, whereas
Diffie-Hellman can be used only for key agreement, El Gamal can provide key
exchange, encryption, and digital signatures.
With El Gamal, any key size can be used. However, a larger key size negatively
affects performance. Because El Gamal is the slowest asymmetric algorithm, using a
key size of 1,024 bits or less would be wise.
ECC
Elliptic Curve Cryptosystem (ECC) provides secure key distribution, encryption,
and digital signatures. The elliptic curve’s size defines the difficulty of the problem.
Although ECC can use a key of any size, it can use a much smaller key than RSA or
any other asymmetric algorithm and still provide comparable security. Therefore,
the primary benefit promised by ECC is a smaller key size, reducing storage and
transmission requirements. ECC is more efficient and provides better security than
RSA keys of the same size.
Figure 3-19 shows an elliptic curve example with the elliptic curve equation.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
322 CISSP Cert Guide
y2 = x3 + ax + b
Knapsack
Knapsack is a series of asymmetric algorithms that provide encryption and digital
signatures. This algorithm family is no longer used due to security issues.
Zero-Knowledge Proof
A zero-knowledge proof is a technique used to ensure that only the minimum
needed information is disclosed without giving all the details. An example of this
technique occurs when one user encrypts data with a private key and the receiver
decrypts with the originator’s public key. The originator has not given the private
key to the receiver. But the originator is proving that they have their private key
simply because the receiver can read the message.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 323
Certificates
A digital certificate provides an entity, usually a user, with the credentials to prove
its identity and associates that identity with a public key. At a minimum, a digital
certificate must provide the serial number, the issuer, the subject (owner), and the
public key.
An X.509 certificate complies with the X.509 standard. An X.509 certificate contains
the following fields:
■ Version
■ Serial Number
■ Algorithm ID
■ Issuer
■ Validity
■ Subject
■ Subject Public Key Info
■ Public Key Algorithm
■ Subject Public Key
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
324 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 325
3. Certificate issuance
4. Certificate acceptance
6. Certificate renewal
7. Certificate re-key
8. Certificate modification
These steps may be performed in any order that is convenient for the CA and
applicants that does not compromise security, but all must be completed before
certificate issuance.
For the CISSP exam, you should know the four main steps that involve how a cer-
tificate is issued to an entity: enrollment, verification, revocation, and renewal and
modification.
Enrollment
Enrollment is the process of requesting a certificate from the CA. According to
NISTIR 7924, a certificate application shall be submitted to the CA by the sub-
scriber, an authorized organizational representative (AOR), or an RA on behalf of
the subscriber. Multiple certificate requests from one RA or AOR may be submitted
as a batch.
When a subscriber is enrolled, all communications among PKI authorities
supporting the certificate application and issuance process will be authenticated
and protected from modification; any electronic transmission of shared secrets and
personally identifiable information will be protected. Communications may be elec-
tronic or out-of-band. Where electronic communications are used, cryptographic
mechanisms commensurate with the strength of the public/private key pair will be
used. Out-of-band communications will protect the confidentiality and integrity of
the data.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
326 CISSP Cert Guide
Verification
Verification is the process whereby an application verifies that a certificate is valid.
Applications use two types of verification methods to check the validity of a digital
certificate: certificate revocation lists (CRLs) and Online Certificate Status Protocol
(OCSP), both of which are discussed in the sections that follow.
To issue a certificate, the CA must verify that the identity and authorization of the
applicant have been verified. If this information cannot be verified, upon receiving
the request, the CAs/RAs will
■ Verify the identity of the requester.
■ Verify the authority of the requester and the integrity of the information in the
certificate request.
■ Build and sign a certificate if all certificate requirements have been met (in the
case of an RA, have the CA sign the certificate).
■ Make the certificate available to the subscriber after confirming that the
subscriber has formally acknowledged their obligations.
The certificate request may already contain a to-be-signed certificate built by either
the RA or the subscriber. This certificate will not be signed until all verifications and
modifications, if any, have been completed to the CA’s satisfaction. All authorization
and other attribute information received from a prospective subscriber will be veri-
fied before inclusion in a certificate. Failure to object to the certificate or its con-
tents will constitute acceptance of the certificate.
Revocation
Revocation is the process whereby a certificate is revoked. CAs operating under
NISTIR 7924 will make public a description of how to obtain revocation informa-
tion for the certificates they publish, and an explanation of the consequences of
using dated revocation information. This information will be given to subscribers
during certificate request or issuance, and will be readily available to any potential
relying party. Revocation requests must be authenticated.
A certificate will be revoked when the binding between the subject and the subject’s
public key defined within the certificate is no longer considered valid. When this
situation occurs, the associated certificate will be revoked and placed on the CRL
and/or added to the OCSP responder. (Both CRL and OCSP are explained in the
following sections.) Revoked certificates will be included on all new publications of
the certificate status information until the certificates expire.
CAs should revoke certificates as quickly as practical upon receipt of a proper
revocation request and by the requested revocation time.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 327
OCSP
Online Certificate Status Protocol (OCSP) is an Internet protocol that obtains the
revocation status of an X.509 digital certificate. OCSP is an alternative to the stan-
dard CRL that is used by many PKIs. OCSP automatically validates the certificates
and reports back the status of the digital certificate by accessing the CRL on the CA.
PKI Steps
The steps involved in requesting a digital certificate are as follows:
1. A user requests a digital certificate, and the RA receives the request.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
328 CISSP Cert Guide
After the user has a certificate, that user is considered a trusted entity and is ready to
communicate with other trusted entities. The process for communication between
entities is as follows:
1. User 1 requests User 2’s public key from the certificate repository.
3. User 1 verifies the certificate and extracts User 2’s public key.
4. User 1 encrypts the session key with User 2’s public key and sends the
encrypted session key and User 1’s certificate to User 2.
5. User 2 receives User 1’s certificate and verifies the certificate with a trusted CA.
After this certificate exchange and verification process occurs, the two entities are
able to communicate using encryption.
Cross-Certification
Cross-certification establishes trust relationships between CAs so that the partici-
pating CAs can rely on the other participants’ digital certificates and public keys.
It enables users to validate each other’s certificates when they are actually certified
under different certification hierarchies. A CA for one organization can validate
digital certificates from another organization’s CA when a cross-certification trust
relationship exists.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 329
A key is used differently, depending on its state in the key’s life cycle. Key states are
defined from a system point of view, as opposed to the point of view of a single cryp-
tographic module. The states that an operational or backed-up key may assume are
as follows:
■ Pre-activation state: The key has been generated but has not been authorized
for use. In this state, the key may be used to perform only proof-of-possession
or key confirmation.
■ Active state: The key may be used to cryptographically protect information
(e.g., encrypt plaintext or generate a digital signature), to cryptographically
process previously protected information (e.g., decrypt ciphertext or verify a
digital signature), or both. When a key is active, it may be designated for pro-
tection only, processing only, or both protection and processing, depending on
its type.
■ Suspended state: The use of a key or key pair may be suspended for several
possible reasons; in the case of asymmetric key pairs, both the public and pri-
vate keys are suspended at the same time. One reason for a suspension might
be a possible key compromise, and the suspension has been issued to allow
time to investigate the situation. Another reason might be that the entity that
owns a digital signature key pair is not available (e.g., is on an extended leave
of absence); signatures purportedly signed during the suspension time would
be invalid. A suspended key or key pair may be restored to an active state at a
later time or may be deactivated or destroyed, or may transition to the com-
promised state.
■ Deactivated state: Keys in the deactivated state are not used to apply cryp-
tographic protection, but in some cases, they may be used to process crypto-
graphically protected information. If a key has been revoked (for reasons other
than a compromise), then the key may continue to be used for processing.
Note that keys retrieved from an archive can be considered to be in the deacti-
vated state unless they are compromised.
■ Compromised state: Generally, keys are compromised when they are
released to or determined by an unauthorized entity. A compromised key shall
not be used to apply cryptographic protection to information. However, in
some cases, a compromised key or a public key that corresponds to a com-
promised private key of a key pair may be used to process cryptographically
protected information. For example, a signature may be verified to determine
the integrity of signed data if its signature has been physically protected since
a time before the compromise occurred. This processing shall be done only
under very highly controlled conditions, where the users of the information
are fully aware of the possible consequences.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 331
■ Destroyed state: The key has been destroyed as specified in the destroyed
phase, discussed shortly. Even though the key no longer exists when in this
state, certain key metadata (e.g., key state transition history, key name, type,
cryptoperiod) may be retained.
The cryptographic key management life cycle can be divided into the following four
phases:
1. Pre-operational phase: The keying material is not yet available for normal
cryptographic operations. Keys may not yet be generated or are in the pre-
activation state. System or enterprise attributes are also established during this
phase. During this phase, the following functions occur:
a. User registration
b. System initialization
c. User initialization
d. Key establishment
e. Key registration
2. Operational phase: The keying material is available and in normal use. Keys
are in the active or suspended state. Keys in the active state may be designated
as protect only, process only, or protect and process; keys in the suspended
state can be used for processing only. During this phase, the following func-
tions occur:
a. Normal operational storage
b. Continuity of operations
c. Key change
d. Key derivation
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
332 CISSP Cert Guide
Systems that process valuable information require controls in order to protect the
information from unauthorized disclosure and modification. Cryptographic sys-
tems that contain keys and other cryptographic information are especially critical.
Security professionals should work to ensure that the protection of keying material
provides accountability, audit, and survivability.
Accountability involves the identification of entities and the work they perform
(via logs) that have access to, or control of, cryptographic keys throughout their
life cycles. Accountability can be an effective tool to help prevent key compromises
and to reduce the impact of compromises when they are detected. Although it is
preferred that no humans be able to view keys, as a minimum, the key management
system should account for all individuals who are able to view plaintext cryptographic
keys. In addition, more sophisticated key management systems may account for
all individuals authorized to access or control any cryptographic keys, whether in
plaintext or ciphertext form.
Two types of audits should be performed on key management systems:
■ Security: The security plan and the procedures that are developed to support
the plan should be periodically audited to ensure that they continue to support
the key management policy.
■ Protective: The protective mechanisms employed should be periodically
reassessed with respect to the level of security they currently provide and are
expected to provide in the future. They should also be assessed to determine
whether the mechanisms correctly and effectively support the appropriate
policies. New technology developments and attacks should be considered as
part of a protective audit.
Message Integrity
Integrity is one of the three basic tenets of security. Message integrity ensures that a
message has not been altered by using parity bits, cyclic redundancy checks (CRCs),
or checksums.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 333
The parity bit method adds an extra bit to the data. The parity bit simply indicates
the number of 1s in a digital bit stream. Parity is either odd or even parity. The par-
ity bit is set before the data is transmitted. When the data arrives, the parity bit is
checked against the other data. If the parity bit doesn’t match the data sent, then an
error is sent to the originator.
The CRC method uses polynomial division to determine the CRC value for a file.
The CRC value is usually 16 or 32 bits long. Because CRC is very accurate, the
CRC value will not match up if a single bit is incorrect.
The checksum method adds up the bytes of data being sent and then transmits that
number to be checked later using the same method. The source adds up the values
of the bytes and sends the data and its checksum. The receiving end receives the
information, adds up the bytes in the same way the source did, and gets the check-
sum. The receiver then compares their checksum with the source’s checksum. If the
values match, message integrity is intact. If the values do not match, the data should
be re-sent or replaced. Checksums are also referred to as hash sums because they
typically use hash functions for the computation.
Message integrity is provided by hash functions and message authentication code.
Hashing
Hash functions were explained earlier in this chapter. In the following sections, we
discuss some of the most popular hash functions. Some of them might no longer be
commonly used because more secure alternatives are available.
Security professionals should be familiar with the following hash functions:
■ One-way hash
■ MD2/MD4/MD5/MD6
■ SHA/SHA-2/SHA-3
■ HAVAL
■ RIPEMD-160
■ Tiger
One-Way Hash
A hash function takes a message of variable length and produces a fixed-length
hash value. Hash values, also referred to as message digests, are calculated using the
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
334 CISSP Cert Guide
original message. If the receiver calculates a hash value that is the same, then the
original message is intact. If the receiver calculates a hash value that is different,
then the original message has been altered.
Using a given function H, the following equation must be true to ensure that the
original message, M1, has not been altered or replaced with a new message, M2:
For a one-way hash to be effective, creating two different messages with the same
hash value must be mathematically impossible. Given a hash value, discovering
the original message from which the hash value was obtained must be mathemati-
cally impossible. A one-way hash algorithm is collision free if it provides protection
against creating the same hash value from different messages.
Unlike symmetric and asymmetric algorithms, the hashing algorithm is publicly
known. Hash functions are always performed in one direction. Using it in reverse is
unnecessary.
However, one-way hash functions do have limitations. If an attacker intercepts a
message that contains a hash value, the attacker can alter the original message to
create a second invalid message with a new hash value. If the attacker then sends the
second invalid message to the intended recipient, the intended recipient will have
no way of knowing that they received an incorrect message. When the receiver per-
forms a hash value calculation, the invalid message will look valid because the invalid
message was appended with the attacker’s new hash value, not the original message’s
hash value. To prevent this from occurring, the sender should use message authenti-
cation code (MAC).
Encrypting the hash function with a symmetric key algorithm generates a keyed
MAC. The symmetric key does not encrypt the original message. It is used only to
protect the hash value.
NOTE The basic types of MAC are discussed later in this chapter.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 335
The sender sends the message and hash value to the receiver.
The receiver compares the sender’s hash value with his own hash
value.
If the hash values are the same, the message has not been altered.
If the hash values are different, the message has been altered.
MD2/MD4/MD5/MD6
The MD2 message digest algorithm produces a 128-bit hash value. It performs
18 rounds of computations. Although MD2 is still in use today, it is much slower
than MD4, MD5, and MD6.
The MD4 algorithm also produces a 128-bit hash value. However, it performs only
three rounds of computations. Although MD4 is faster than MD2, its use has signifi-
cantly declined because attacks against it have been so successful.
Like the other MD algorithms, the MD5 algorithm produces a 128-bit hash value.
It performs four rounds of computations. It was originally created because of the
issues with MD4, and it is more complex than MD4. However, MD5 is not collision
free. For this reason, it should not be used for SSL certificates or digital signatures.
The U.S. government requires the usage of SHA-2 instead of MD5. However,
in commercial usage, many software vendors publish the MD5 hash value when
they release software patches so customers can verify the software’s integrity after
download.
The MD6 algorithm produces a variable hash value, performing a variable number
of computations. Although it was originally introduced as a candidate for SHA-3,
it was withdrawn because of early issues the algorithm had with differential attacks.
MD6 has since been re-released with this issue fixed. However, that release was too
late to be accepted as the NIST SHA-3 standard.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
336 CISSP Cert Guide
SHA/SHA-2/SHA-3
Secure Hash Algorithm (SHA) is a family of four algorithms published by the U.S.
NIST. SHA-0, originally referred to as simply SHA because there were no other
“family members,” produces a 160-bit hash value after performing 80 rounds of
computations on 512-bit blocks. SHA-0 was never very popular because collisions
were discovered.
Like SHA-0, SHA-1 produces a 160-bit hash value after performing 80 rounds of
computations on 512-bit blocks. SHA-1 corrected the flaw in SHA-0 that made it
susceptible to attacks.
SHA-2 is actually a family of hash functions, each of which provides different func-
tional limits. The SHA-2 family is as follows:
■ SHA-224: Produces a 224-bit hash value after performing 64 rounds of com-
putations on 512-bit blocks.
■ SHA-256: Produces a 256-bit hash value after performing 64 rounds of com-
putations on 512-bit blocks.
■ SHA-384: Produces a 384-bit hash value after performing 80 rounds of com-
putations on 1,024-bit blocks.
■ SHA-512: Produces a 512-bit hash value after performing 80 rounds of com-
putations on 1,024-bit blocks.
■ SHA-512/224: Produces a 224-bit hash value after performing 80 rounds
of computations on 1,024-bit blocks. The 512 designation here indicates the
internal state size.
■ SHA-512/256: Produces a 256-bit hash value after performing 80 rounds of
computations on 1,024-bit blocks. Once again, the 512 designation indicates
the internal state size.
SHA-3, like SHA-2, is a family of hash functions. SHA-2 has not yet been broken.
The hash value sizes for SHA-3 range from 224 to 512 bits. The block sizes range
from 576 to 1,152 bits. SHA-3 performs 120 rounds of computations, by default.
Keep in mind that SHA-1 and SHA-2 are still widely used today. SHA-3 was not
developed because of some security flaw with the two previous standards but was
instead proposed as an alternative hash function to the others.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 337
HAVAL
HAVAL is a one-way function that produces variable-length hash values, includ-
ing 128 bits, 160 bits, 192 bits, 224 bits, and 256 bits, and uses 1,024-bit blocks.
The number of rounds of computations can be three, four, or five. Collision issues
have been discovered if producing a 128-bit hash value with three rounds of
computations.
RIPEMD-160
Although several variations of the RIPEMD hash function exist, security profession-
als should only worry about RIPEMD-160 for exam purposes. RIPEMD-160 pro-
duces a 160-bit hash value after performing 160 rounds of computations on 512-bit
blocks.
Tiger
Tiger is a hash function that produces 128-, 160-, or 192-bit hash values after
performing 24 rounds of computations on 512-bit blocks, with the most popular
version being the one that produces 192-bit hash values. Unlike MD5, RIPEMD,
SHA-0, and SHA-1, Tiger is not built on the MD4 architecture.
HMAC
A hash MAC (HMAC) is a keyed-hash MAC that involves a hash function with
symmetric key. HMAC provides data integrity and authentication. Any of the previ-
ously listed hash functions can be used with HMAC, with the HMAC name being
appended with the hash function name, as in HMAC-SHA-1. The strength of
HMAC depends on the strength of the hash function, including the hash value size
and the key size.
HMAC’s hash value output size will be the same as the underlying hash function.
HMAC can help to reduce the collision rate of the hash function.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
338 CISSP Cert Guide
3. The sender applies a hash algorithm to the message and obtains a hash value.
4. The sender adds a hash value to the original message, and the sender sends the
new message to the receiver.
5. The receiver receives the message and joins the symmetric key to the message.
6. The receiver applies the hash algorithm to the message and obtains a hash
value.
7. If the hash values are the same, the message has not been altered. If the hash
values are different, the message has been altered.
CBC-MAC
Cipher Block Chaining MAC (CBC-MAC) is a block-cipher MAC that operates in
CBC mode. CBC-MAC provides data integrity and authentication.
The basic steps of a CBC-MAC process are as follows:
1. The sender and receiver agree on which symmetric block cipher to use.
2. The sender encrypts the message with the symmetric block cipher in CBC
mode. The last block is the MAC.
3. The sender adds the MAC to the original message, and the sender sends the
new message to the receiver.
4. The receiver receives the message and encrypts the message with the symmet-
ric block cipher in CBC mode.
5. The receiver obtains the MAC and compares it to the sender’s MAC.
6. If the values are the same, the message has not been altered. If the values are
different, the message has been altered.
CMAC
Cipher-Based MAC (CMAC) operates in the same manner as CBC-MAC but with
much better mathematical functions. CMAC addresses some security issues with
CBC-MAC and is approved to work with AES and 3DES.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 339
Salting
Lookup tables and rainbow tables work because each password is hashed exactly
the same way. If two users have the same password, they have the same hashed pass-
word if random hashes are not used. To prevent attack, security professionals should
ensure that each hash is randomized. Then, when the same password is hashed twice,
the hashes are not the same.
Salting means randomly adding data to a one-way function that “hashes” a password
or passphrase. The primary function of salting is to defend against dictionary attacks
versus a list of password hashes and against precomputed rainbow table attacks.
A security professional should randomize the hashes by appending or prepending
a random string, called a salt, to the password before hashing. To check whether a
password is correct, the attacker needs to know the value of the salt added. The salt
usually can be stored in the user account database, or another secure location, along
with the hash, or as part of the hash string itself.
Attackers do not know in advance what the salt will be, so they cannot precompute a
lookup table or rainbow table. If each user’s password is hashed with a different salt,
a reverse lookup table attack doesn’t work either.
If salts are used, security professionals must ensure that they are not reused and are
not too short. A new random salt must be generated each time an administrator cre-
ates a user account or a user changes their password. A good rule of thumb is to use
a salt that is the same size as the output of the hash function. For example, the out-
put of SHA-256 is 256 bits (32 bytes), so the salt should be at least 32 random bytes.
Salts should be generated using a cryptographically secure pseudo-random number
generator (CSPRNG). As the name suggests, a CSPRNG is designed to provide a
high level of randomness and is completely unpredictable.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
340 CISSP Cert Guide
DSS
The Digital Signature Standard (DSS) is a federal digital security standard that
governs the Digital Security Algorithm (DSA). DSA generates a message digest of
160 bits. The U.S. federal government requires the use of DSA, RSA (discussed ear-
lier in this chapter), or Elliptic Curve DSA (ECDSA) and SHA for digital signatures.
DSA is slower than RSA and provides only digital signatures. RSA provides digital
signatures, encryption, and secure symmetric key distribution.
Non-repudiation
Non-repudiation occurs when a sender is provided with proof of delivery to a
receiver, and a receiver is provided with proof of the sender’s identity. If non-
repudiation is implemented correctly, the sender cannot later deny having sent the
information.
In addition to digital signatures, non-repudiation is also used in digital contracts and
email. Email non-repudiation involves methods such as email tracking.
Applied Cryptography
Encryption can provide different protection based on which level of communication
is being used. The two types of encryption communication levels are link encryption
and end-to-end encryption. In addition, cryptography is used for email and Internet
security. These topics are discussed in detail in the “Communications Cryptography”
section in Chapter 4.
Email Security
Email security methods include the PGP, MIME, and S/MIME email standards that
are popular in today’s world.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 341
Internet Security
Internet security includes remote access; SSL/TLS; HTTP, HTTPS, and S-HTTP;
SET; cookies; SSH; and IPsec and ISAKMP.
Cryptanalytic Attacks
Cryptography attacks are categorized as either passive or active attacks. A passive
attack is usually implemented just to discover information and is much harder to
detect because it is usually carried out by eavesdropping or packet sniffing. Active
attacks involve an attacker actually carrying out steps, like message alteration or file
modification. Cryptography is usually attacked by exploiting the key, algorithm,
execution, data, or people. But most of these attacks are attempting to discover the
key used.
Cryptography attacks that are discussed include the following:
■ Ciphertext-only attack
■ Known plaintext attack
■ Chosen plaintext attack
■ Chosen ciphertext attack
■ Social engineering
■ Brute force
■ Differential cryptanalysis
■ Linear cryptanalysis
■ Algebraic attack
■ Frequency analysis
■ Birthday attack
■ Dictionary attack
■ Replay attack
■ Analytic attack
■ Statistical attack
■ Factoring attack
■ Reverse engineering
■ Meet-in-the-middle attack
■ Ransomware attack
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
342 CISSP Cert Guide
■ Side-channel attack
■ Implementation attack
■ Fault injection
■ Timing attack
■ Pass-the-hash attack
Ciphertext-Only Attack
In a ciphertext-only attack, an attacker uses several encrypted messages (ciphertext)
to figure out the key used in the encryption process. Although it is a very common
type of attack, it is usually not successful because so little is known about the encryp-
tion used.
Social Engineering
Social engineering attacks against cryptographic algorithms do not differ greatly from
social engineering attacks against any other security area. Attackers attempt to trick
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 343
users into giving the attacker the cryptographic key used. Common social engineer-
ing methods include intimidation, enticement, or inducement.
Brute Force
As with a brute-force attack against passwords, a brute-force attack executed against a
cryptographic algorithm uses all possible keys until a key is discovered that success-
fully decrypts the ciphertext. This attack requires considerable time and processing
power and is very difficult to complete.
Differential Cryptanalysis
Differential cryptanalysis measures the execution times and power required by the
cryptographic device. The measurements help to detect the key and algorithm used.
Linear Cryptanalysis
Linear cryptanalysis is a known plaintext attack that uses linear approximation, which
describes the behavior of the block cipher. An attacker is more successful with this
type of attack when more plaintext and matching ciphertext messages are obtained.
Algebraic Attack
Algebraic attacks rely on the algebra used by cryptographic algorithms. If an attacker
exploits known vulnerabilities of the algebra used, looking for those vulnerabilities
can help the attacker to determine the key and algorithm used.
Frequency Analysis
Frequency analysis is an attack that relies on the fact that substitution and transposi-
tion ciphers will result in repeated patterns in ciphertext. Recognizing the patterns
of 8 bits and counting them can allow an attacker to use reverse substitution to
obtain the plaintext message.
Frequency analysis usually involves the creation of a chart that lists all the letters of
the alphabet alongside the number of times that letter occurs. So if the letter Q in
the frequency lists has the highest value, a good possibility exists that this letter is
actually E in the plaintext message because E is the most used letter in the English
language. The ciphertext letter is then replaced in the ciphertext with the plaintext
letter.
Today’s algorithms are considered too complex to be susceptible to this type of
attack.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
344 CISSP Cert Guide
Birthday Attack
A birthday attack uses the premise that finding two messages that result in the
same hash value is easier than matching a message and its hash value. Most hash
algorithms can resist simple birthday attacks.
Dictionary Attack
Similar to a brute-force attack, a dictionary attack uses all the words in a diction-
ary until a key is discovered that successfully decrypts the ciphertext. This attack
requires considerable time and processing power and is very difficult to complete. It
also requires a comprehensive dictionary of words.
Replay Attack
In a replay attack, an attacker sends the same data repeatedly in an attempt to trick
the receiving device. This data is most commonly authentication information.
The best countermeasures against this type of attack are timestamps and sequence
numbers.
Analytic Attack
In analytic attacks, attackers use known structural weaknesses or flaws to determine
the algorithm used. If a particular weakness or flaw can be exploited, then the
possibility of a particular algorithm being used is more likely.
Statistical Attack
Whereas analytic attacks look for structural weaknesses or flaws, statistical attacks
use known statistical weaknesses of an algorithm to aid in the attack.
Factoring Attack
A factoring attack is carried out against the RSA algorithm by using the solutions of
factoring large numbers.
Reverse Engineering
One of the most popular cryptographic attacks, reverse engineering occurs when an
attacker purchases a particular cryptographic product to attempt to reverse engineer
the product to discover any information about the cryptographic algorithm used,
whether the information is the key or the algorithm itself.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 345
Meet-in-the-Middle Attack
In a meet-in-the middle attack, an attacker tries to break the algorithm by encrypt-
ing from one end and decrypting from the other to determine the mathematical
problem used.
Ransomware Attack
In a ransomware attack, a user accidentally installs a program that allows an attacker
to encrypt files or folders on the user’s computer. To obtain access to the files and
folders that are encrypted, the victim must pay a fine to obtain access to their data.
Two of the more recent variants of this type of attack are the CryptoLocker, which
targeted Windows computers and infected email attachments using a Trojan, and
WannaCry, which also targeted Windows computers and demanded payment in
Bitcoin.
Side-Channel Attack
In a side-channel attack, information from the implementation of a computer system
is obtained, rather than exploiting a weakness in the algorithm itself. Areas that are
exploited include the computer’s cache, timing, acoustics, and data remanence. It
usually involves monitoring communication within the different components of the
computer to determine the secret key.
Implementation Attack
An implementation attack, a specific type of side-channel attack, exploits
implementation weaknesses in algorithms, focusing on software code, errors, and
other flaws. This type of attack can be carried out in a physical or logical manner.
Physical attacks target physical leakage of a device, meaning the attacker attempts
to obtain the data from the hard drive or the hard drive itself. Logical attacks try to
observe some parameters of the algorithm.
Fault Injection
Fault injection attacks, which are a type of side-channel attack, are carried out on
crypto-devices. A single fault injected during encryption can reveal the cipher's
secret key. Fault injection attacks on crypto-devices include power supply voltage
variations, clock signal irregularity injections, electro-magnetics disturbances,
overheating, and light exposure.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
346 CISSP Cert Guide
Timing Attack
A timing attack is a type of side-channel attack wherein an attacker attempts to
compromise an algorithm by analyzing the time taken to encrypt or decrypt data.
Timing attacks are easier to carry out if the attacker knows hardware implementa-
tion details and the cryptographic system used.
Pass-the-Hash Attack
A pass-the-hash attack allows an attacker to authenticate to a remote server or
service by using the underlying hash of a user’s password, instead of the plaintext
password itself. This attack requires that an attacker steal the password’s hash, rather
than the plaintext password, and use it for authentication.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 347
■ Online/offline
■ Auditing
■ Ad hoc and structured processes:
■ User initiated on desktop
■ Mapped to system
■ Built into workflow process
Document DRM
Organizations implement DRM to protect confidential or sensitive documents and
data. Commercial DRM products allow organizations to protect documents and
include the capability to restrict and audit access to documents. Some of the permis-
sions that can be restricted using DRM products include reading and modifying
a file, removing and adding watermarks, downloading and saving a file, printing a
file, or even taking screenshots. If a DRM product is implemented, the organization
should ensure that the administrator is properly trained and that policies are in place
to ensure that rights are appropriately granted and revoked.
Music DRM
DRM has been used in the music industry for some time now. Subscription-based
music services, such as Napster, use DRM to revoke a user’s access to downloaded
music after their subscription expires. Although technology companies have peti-
tioned the music industry to allow them to sell music without DRMs, the industry
has been reluctant to do so.
Movie DRM
Although the movie industry has used a variety of DRM schemes over the years, two
main technologies are used for the mass distribution of media:
■ Content Scrambling System (CSS): Uses encryption to enforce playback
and region restrictions on DVDs. This system can be broken using Linux’s
DeCSS tool.
■ Advanced Access Content System (AACS): Protects Blu-ray and HD DVD
content. Hackers have been able to obtain the encryption keys to this system.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
348 CISSP Cert Guide
E-book DRM
E-book DRM is considered to be the most successful DRM deployment. Both
Amazon’s Kindle and Barnes and Noble’s Nook devices implement DRM to protect
electronic forms of books. Both of these companies have released mobile apps that
function like the physical e-book devices.
Today’s implementation uses a decryption key that is installed on the device.
This means that the e-books cannot be easily copied between e-book devices or
applications. Adobe created the Adobe Digital Experience Protection Technol-
ogy (ADEPT) that is used by most e-book readers except Amazon’s Kindle. With
ADEPT, AES is used to encrypt the media content, and RSA encrypts the AES key.
CPTED
Crime Prevention Through Environmental Design (CPTED) refers to designing
a facility from the ground up to support security. It is actually a broad concept that
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 349
can be applied to any project (housing developments, office buildings, and retail
establishments). It addresses the building entrance, landscaping, and interior design.
It aims to create behavioral effects that reduce crime. The three main strategies that
guide CPTED are covered here.
Natural Surveillance
Natural surveillance is the use of physical environmental features to promote vis-
ibility of all areas and thus discourage crime in those areas. The idea is to encourage
the flow of people such that the largest possible percentage of the building is always
populated, because people in an area discourage crime. It also attempts to maximize
the visibility of all areas.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
350 CISSP Cert Guide
Delay Intruders
Another beneficial characteristic of the physical security plan is to add impediments
to entry, such as locks, fences, and barriers. Any procedures that slow, deter, and
monitor the entry of people into the facility can also help. The more delay intruders
encounter, the less likely they are to choose the facility and the more likely they are
to be caught.
Detect Intruders
Systems and procedures should be in place that allow for criminal activity to be
detected. Motion sensors, cameras, and the like are all forms of intruder detection.
Logging all visitors could also be a form of deterrence.
Assess Situation
The plan should identify specific personnel and actions to be taken when an event
occurs. Compiling a list of incident types that indicate an acceptable response,
response time, and contact names might be beneficial. Written plans developed
ahead of time provide a much more effective and consistent response.
Visibility
The amount of visibility desired depends on the organization and the processes
being carried out at the facility. In some cases having high visibility of the location to
help promote the brand or for the convenience of customers is beneficial. In other
cases a lower profile is desired when sensitive operations are taking place. When
this is the case, the likelihood of eavesdropping from outside the facility through
windows should be considered. Considering common areas is also important. If pos-
sible, these areas should not be isolated or darkened. Place them in visible areas with
lighting to discourage crime. Such areas includes hallways, parking lots, and other
shared spaces.
NOTE Perimeter security controls, including lighting, fencing, and perimeter intru-
sion detection, are covered in more depth in Chapter 7.
Accessibility
The ease with which employees and officers can access the facility is a consideration.
What are the traffic conditions that the employees will encounter? If this is a new
facility replacing an old one, is it inconvenient for the bulk of the employees? Do
you risk losing employees over the commute? Is this location convenient to trans-
portation options, such as train stations and airports? If lots of travel is required of
your employees, accessibility could be important. If you often host employees from
other locations on a temporary basis or host business partners, are safe accommoda-
tions nearby?
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
352 CISSP Cert Guide
Construction
The materials used to construct a facility are another critical issue. But the issues to
consider here do not stop at simply the makeup of the walls and ceilings, although
that is crucial. The support systems built into the building are also important and
include the following:
■ Walls
■ Doors
■ Ceilings
■ Windows
■ Flooring
■ HVAC
■ Power source
■ Utilities
■ Fire detection and suppression
Internal Compartments
In many areas of a facility, partitions are used to separate work areas. These
partitions, although appearing to be walls, are not full walls in that they do not
extend all the way to the ceiling. When this construction approach is combined with
a drop ceiling, also common in many buildings, an opportunity exists for someone
to gain access to an adjoining room through the drop ceiling. All rooms that need to
be secured, such as server rooms and wiring closets, should not have these types of
walls.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 353
Doors
A variety of door types and door materials can be used in buildings. They can either
be hollow, which are used inside the building, or solid, typically used at the edge of
the building and in places where additional security is required. Some door types
with which a security professional should be familiar and prepared to select for pro-
tection are
■ Vault doors: Leading into walk-in safes or security rooms
■ Personnel doors: Used by humans to enter the facility
■ Industrial doors: Large doors that allow access to larger vehicles
■ Vehicle access doors: Doors to parking building or lots
■ Bullet-resistant doors: Doors designed to withstand firearms
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
354 CISSP Cert Guide
Mantrap Relay
Request to Exit Switch Door Position Switches
Access
Control
Power Supply
Door #1 Door #2
Locks
Locks are also used in places other than doors, such as protecting cabinets and
securing devices. Types of mechanical locks with which you should be familiar are
■ Warded locks: These have a spring-loaded bolt with a notch in it. The lock has
wards or metal projections inside the lock with which the key will match and
enable opening the lock. A warded lock design is shown in Figure 3-22.
Locking Bolt
Wards
■ Tumbler locks: These have more moving parts than the warded locks, and the
key raises the lock metal piece to the correct height. A tumbler lock design is
shown in Figure 3-23.
■ Combination locks: These require rotating the lock in a pattern that, if correct,
lines up the tumblers, opening the lock. A combination lock design is shown in
Figure 3-24.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
356 CISSP Cert Guide
In the case of device locks, laptops are the main item that must be protected because
they are so easy to steal. Laptops should never be left in the open without being
secured to something solid with a cable lock. These are vinyl-coated steel cables that
connect to the laptop and then lock around a hard-to-move object, such as a table or
desk leg.
Biometrics
The most expensive physical access control to deploy is a biometric device. Biomet-
ric devices rely on human interaction and are covered extensively in Chapter 5.
In areas where regular glass must be used but security is a concern, glass that is
embedded with wire to reduce the likelihood of breaking and entering can be used.
An even stronger option is to supplement the windows with steel bars.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 357
Visitor Control
Some system of identifying visitors and controlling their access to the facility must
be in place. The best system is to have a human present to require all visitors to sign
in before entering. If that option is unfeasible, another option is to provide an entry
point at which visitors are presented with a locked door and a phone that can be
used to call and request access. Either of these methods helps to prevent unauthor-
ized persons from simply entering the building and going where they please.
Another best practice with regard to visitors is to have personnel always accompany
a contractor or visitor to their destination to help ensure they are not going where
they shouldn’t. In low security situations, this practice might not be necessary but is
recommended in high security areas. Finally, log all visitors.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
358 CISSP Cert Guide
Server Room
Some smaller companies implement a server room instead of a secure data cen-
ter. The physical security controls needed for a server room are similar to those
deployed in a secure data center or restricted work area.
Evidence Storage
If an organization has collected evidence that is crucial to an investigation,
the organization must ensure that the evidence is protected from being accessed by
unauthorized users. Only personnel involved in the investigation should have
access to evidence that is stored. Evidence should be stored in a locked room, and
access to the evidence should be logged. When required, evidence should be turned
over to law enforcement at the appropriate time. If backup copies of digital evidence
are retained during the investigation, the backup copies should also be in a secure
storage area with limited personnel access.
Fire Protection
Fire protection has a longer history than many of the topics discussed in this book,
and although the traditional considerations concerning preventing fires and fire
damage still hold true, the presence of sensitive computing equipment requires
different approaches to detection and prevention, which we discuss next.
Fire Detection
Several options are available for fire detection.
Security professionals should be familiar with the following basic types of fire
detection systems:
■ Smoke-activated sensor: Operates using a photoelectric device to detect
variations in light caused by smoke particles.
■ Heat-activated sensor (also called heat-sensing sensor): Operates by detect-
ing temperature changes. These systems can either alert when a predefined
temperature is met or alert when the rate of rise is a certain value.
■ Flame-actuated sensor: Operates by “looking at” the protected area with opti-
cal devices. They generally react faster to a fire than nonoptical devices do.
Fire Suppression
Although fire extinguishers (covered in Chapter 1) are a manual form of fire
suppression, other more automated systems also exist.
Security professionals should be familiar with the following sprinkler system types:
■ Wet pipe extinguisher: This system uses water contained in pipes to extinguish
the fire. In some areas, the water might freeze and burst the pipes, causing
damage. These extinguishers are also not recommended for rooms where
equipment will be damaged by the water.
■ Dry pipe extinguisher: In this system, the water is not held in the pipes but in
a holding tank. The pipes hold pressurized air, which is reduced when fire is
detected, allowing the water to enter the pipe and the sprinklers. This struc-
ture minimizes the chance of an accidental discharge.
■ Preaction extinguisher: This system operates like a dry pipe system except that
the sprinkler head holds a thermal-fusible link that must be melted before the
water is released. This is currently the recommended system for a computer
room.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
360 CISSP Cert Guide
At one time, fire suppression systems used Halon gas, which works well by suppress-
ing combustion through a chemical reaction. However, these systems are no longer
used because they have been found to damage the ozone layer.
Current EPA-approved replacements for Halon include
■ Water
■ Argon
■ NAF-S-III
Another fire suppression system that can be used in computer rooms that will not
damage computers and is safe for humans is FM-200.
Power Supply
The power supply is the lifeblood of the enterprise, its IT systems, and all of its
equipment. Here, we look at common power issues and some of the prevention
mechanisms and mitigation techniques that will allow the company to continue to
operate when power problems arise.
Types of Outages
When discussing power issues, security professionals should be familiar with the fol-
lowing terms:
■ Surge: A prolonged high voltage
■ Brownout: A prolonged drop in power that is below normal voltage
■ Fault: A momentary power outage
■ Blackout: A prolonged power outage
■ Sag: A momentary reduction in the level of power
However, possible power problems go beyond partial or total loss of power. Power
lines can introduce noise and interfere with communications in the network. In
any case where large electric motors or sources of certain types of light, such as
fluorescent lighting, are present, shielded cabling should be used to help prevent
radio frequency interference (RFI) and electromagnetic interference (EMI).
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 361
Preventive Measures
Procedures to prevent static electricity from damaging components should be
observed. Some precautions to take are
■ Use antistatic sprays.
■ Maintain proper humidity levels.
■ Use antistatic mats and wrist bands.
To protect against dirty power (sags and surges) and both partial and total power
outages, the following devices can be deployed:
■ Power conditioners: Go between the wall outlet and the device and smooth out the
fluctuations of power delivered to the device, protecting against sags and surges.
■ Uninterruptible power supplies (UPSs): Go between the wall outlet and the
device and use a battery to provide power if the source from the wall is lost.
UPSs also exist that can provide power to a server room.
HVAC
Heating, ventilation, and air conditioning systems are not just in place for the com-
fort of the employees. The massive amounts of computing equipment deployed by
most enterprises are even more dependent on these systems than humans. Without
the proper environmental conditions, computing equipment won’t complain; it will
just stop working. Computing equipment and infrastructure devices, like routers and
switches, must be protected from the following conditions:
■ Heat: Excessive heat causes reboots and crashes.
■ Humidity: Humidity causes corrosion problems with connections.
■ Low humidity: Dry conditions encourage static electricity, which can damage
equipment.
In summary, the conditions need to be perfect for these devices. It is for this reason
that AC units should be dedicated to the information processing facilities and on a
separate power source than the other HVAC systems.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
362 CISSP Cert Guide
Environmental Alarms
An error that causes a system to be vulnerable because of the environment in which
it is installed is called an environmental error. Considering the various challenges
presented by the environmental demands placed on the facility by the computing
equipment and the costs of failing to address these needs, it behooves the enterprise
to have some system that alerts when environmental conditions are less than desir-
able. An alert system such as a hygrometer, which monitors humidity, should be in
place in areas where sensitive equipment resides. The system should also monitor
temperature. These types of controls are considered physical controls.
Corporate Procedures
Physical security of equipment and media should be designed into the security
policies and procedures of the company. These procedures should address the issues
covered in the sections that follow.
Tamper Protection
Unauthorized persons should not be able to access and change the configuration of
any devices. Ensuring device safety means taking additional measures, such as the
ones in the following sections, to prevent such access. Tampering includes defacing,
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 363
Data Encryption
Encrypting sensitive data stored on devices can help to prevent the exposure of data
in the event of a theft or in the event of inappropriate access of the device. Cryptog-
raphy and encryption concepts are covered extensively earlier in this chapter.
Inventory
Recognizing when items are stolen is impossible if no item count or inventory sys-
tem exists. All equipment should be inventoried, and all relevant information about
each device should be maintained and kept up to date. Maintain this information
both electronically and in hard copy.
Tracking Devices
When the technology is available, small devices can be tracked to help mitigate loss
of both devices and their data, as previously covered. Most smartphones now include
tracking software that allows you to locate these devices after they have been stolen
or lost by using either cell tower tracking or GPS. Deploy this technology when
available and affordable.
Another useful feature available on these same types of devices is a remote wipe fea-
ture. This feature allows sending a signal to a stolen device instructing it to wipe out
the data contained on the device. Finally, these devices typically also come with the
ability to remotely lock the device when misplaced.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
364 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 365
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
366 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 367
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
368 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 369
7. Which 3DES implementation encrypts each block of data three times, each
time with a different key?
a. 3DES-EDE3
b. 3DES-EEE3
c. 3DES-EDE2
d. 3DES-EEE2
10. Which of the following is NOT one of the three main strategies that guide
CPTED?
a. Natural access control
b. Natural surveillance reinforcement
c. Natural territorials reinforcement
d. Natural surveillance
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
370 CISSP Cert Guide
11. What occurs when different encryption keys generate the same ciphertext
from the same plaintext message?
a. Key clustering
b. Cryptanalysis
c. Keyspace
d. Confusion
12. Which encryption system uses a private or secret key that must remain secret
between the two parties?
a. Running key cipher
b. Concealment cipher
c. Asymmetric algorithm
d. Symmetric algorithm
14. Which PKI component contains a list of all the certificates that have been
revoked?
a. CA
b. RA
c. CRL
d. OCSP
15. Which attack executed against a cryptographic algorithm uses all possible keys
until a key is discovered that successfully decrypts the ciphertext?
a. Frequency analysis
b. Reverse engineering
c. Ciphertext-only attack
d. Brute force
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 371
19. Which two states are supported by most processors in a computer system?
a. Supervisor state and problem state
b. Supervisor state and kernel state
c. Problem state and user state
d. Supervisor state and elevated state
20. When supporting a BYOD initiative, from which group do you probably have
most to fear?
a. Hacktivists
b. Careless users
c. Software vendors
d. Mobile device vendors
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
372 CISSP Cert Guide
21. Which term applies to embedded devices that bring with them security con-
cerns because engineers that design these devices do not always worry about
security?
a. BYOD
b. NDA
c. IoT
d. ITSEC
22. Which option best describes the primary concern of NIST SP 800-57?
a. Asymmetric encryption
b. Symmetric encryption
c. Message integrity
d. Key management
23. Which of the following key types requires only integrity security protection?
a. Public signature verification key
b. Private signature key
c. Symmetric authentication key
d. Private authentication key
24. What is the final phase of the cryptographic key management life cycle,
according to NIST SP 800-57?
a. Operational phase
b. Destroyed phase
c. Pre-operational phase
d. Post-operational phase
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 3: Security Architecture and Engineering 373
13. d. RSA is an asymmetric algorithm. All the other algorithms are symmetric
algorithms.
14. c. A certificate revocation list (CRL) contains a list of all the certificates that have
been revoked. A certificate authority (CA) is the entity that creates and signs
digital certificates, maintains the certificates, and revokes them when necessary. A
registration authority (RA) verifies the requestor’s identity, registers the requestor,
and passes the request to the CA. Online Certificate Status Protocol (OCSP) is an
Internet protocol that obtains the revocation status of an X.509 digital certificate.
15. d. A brute-force attack executed against a cryptographic algorithm uses all pos-
sible keys until a key is discovered that successfully decrypts the ciphertext. A
frequency analysis attack relies on the fact that substitution and transposition
ciphers will result in repeated patterns in ciphertext. A reverse engineering attack
occurs when an attacker purchases a particular cryptographic product to attempt
to reverse engineer the product to discover confidential information about the
cryptographic algorithm used. A ciphertext-only attack uses several encrypted
messages (ciphertext) to figure out the key used in the encryption process.
16. c. ISO/IEC 15288:2015 establishes four categories of processes:
■ Agreement processes, including acquisition and supply
■ Organizational project-enabling processes, including infrastructure
management, quality management, and knowledge management
■ Technical management processes, including project planning,
risk management, configuration management, and quality assurance
■ Technical processes, including system requirements definition, system anal-
ysis, implementation, integration, operation, maintenance, and disposal
17. a. Dedicated security mode employs a single classification level.
18. d. The first step in ISO/IEC 27001:2013 is to obtain management support.
19. a. Two processor states are supported by most processors: supervisor state
(or kernel mode) and problem state (or user mode).
20. b. As a security professional, when supporting a BYOD initiative, you
should take into consideration that you probably have more to fear from the
carelessness of the users than you do from hackers.
21. c. Internet of Things (IoT) is the term used for embedded devices and their
security concerns because engineers that design these devices do not always
worry about security.
22. d. Key management is the primary concern of NIST SP 800-57.
23. a. Public signature verification keys require only integrity security protection.
24. b. The destroyed phase is the final phase of the cryptographic key manage-
ment life cycle, according to NIST SP 800-57.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
This page intentionally left blank
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
This chapter covers the following topics:
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
CHAPTER 4
Communication and
Network Security
Sensitive data must be protected from unauthorized access when the data is at
rest (on a hard drive or on a backup) and in transit (moving through a network).
Moreover, sensitive communications of other types such as emails, instant
messages, and phone conversations must also be protected from prying eyes and
ears. Many communication processes send information in a form that can be
read and understood if captured with a protocol analyzer or sniffer.
The Communication and Network Security domain addresses a broad array of
topics including network architecture, components, and secure communication
channels. Out of 100 percent of the exam, this domain carries an average weight
of 13 percent, which is the second highest weight of all the eight domains. So,
pay close attention to the many details in this chapter!
In the world of communication today, you should assume that your communica-
tions are being closely monitored and may be captured without your knowledge
regardless of how unlikely you think that might be. You should also take
steps to protect or encrypt the transmissions so they will be useless to anyone
capturing them. This chapter covers the protection of wired and wireless
transmissions and of the network devices that perform the transmissions, as well
as some networking fundamentals required to understand transmission security.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
378 CISSP Cert Guide
Foundation Topics
OSI Model
A complete understanding of networking requires an understanding of the Open
Systems Interconnection (OSI) model. Created in the 1980s by the International
Organization for Standardization (ISO) as a part of its mission to create a protocol
set to be used as a standard for all vendors, the OSI model breaks the communica-
tion process into layers. Although the ensuing protocol set did not catch on as a
standard (Transmission Control Protocol/Internet Protocol [TCP/IP] was adopted),
the model has guided the development of technology since its creation. It also has
helped generations of students understand the network communication process
between two systems. Finally, it is important to understand that this is a conceptual
model, and therefore, not all technologies fit nicely into just one layer of the
OSI model.
The OSI model breaks up the process into seven layers, or modules. The benefits of
doing this are
■ It breaks up the communication process into layers with standardized
interfaces between the layers, allowing for changes and improvements on one
layer without necessitating changes on other layers.
■ It provides a common framework for hardware and software developers,
fostering interoperability.
This open systems architecture can act as a blueprint or model for developers to
work with. Various protocols operate at different layers of this model. A protocol is
a set of rules; in this case, these are rules for communication between two systems.
Some protocols depend on other protocols for services, and as such, these protocols
operate in concert and allow transmissions to occur, much like the team at the post
office that gets letters delivered. Some people sort, others deliver, and still others
track lost shipments.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 379
The OSI model and the TCP/IP model, explained later, are often both used to
describe the process called packet creation, or encapsulation. Until a packet is created
to hold the data, it cannot be sent on the transmission medium.
With a modular approach, it is possible for a change in a protocol or the addition
of a new protocol to be accomplished without having to rewrite the entire pro-
tocol stack (a term for all the protocols that work together at all layers). The OSI
model has seven layers. The following sections discuss each layer’s function and
its relationship to the layer above and below it in the model. The layers are often
referred to by their number with the numbering starting at the bottom of the model
at Layer 1, the Physical layer.
The process of creating a packet or encapsulation begins at Layer 7, the Application
layer rather than Layer 1, so we discuss the process starting at Layer 7 and work
down the model to Layer 1, the Physical layer, where the packet is sent out on the
transmission medium.
Application Layer
The Application layer (Layer 7) is where the encapsulation process begins. This
layer receives the raw data from the application in use and provides services, such as
file transfer and message exchange to the application (and thus the user). An example
of a protocol that operates at this layer is Hypertext Transfer Protocol (HTTP),
which is used to transfer web pages across the network. Other examples of protocols
that operate at this layer are DNS queries, FTP transfers, and SMTP email
transfers. The Dynamic Host Configuration Protocol (DHCP) and DHCP for
IPv6 (DHCPv6) also operate at this layer.
The user application interfaces with these application protocols through a standard
interface called an application programming interface (API). The Application layer
protocol receives the raw data and places it in a container called a protocol data unit
(PDU). When the process gets down to Layer 4, these PDUs have standard names,
but at Layers 5–7, the PDU is simply referred to as “data.”
Presentation Layer
The information that is developed at Layer 7 is then handed to the Presentation
layer (Layer 6). Each layer makes no changes to the data received from the layer
above it. It simply adds information to the developing packet. In the case of the
Presentation layer, information is added that standardizes the formatting of the
information if required.
Layer 6 is responsible for the manner in which the data from the Application layer
is represented (or presented) to the Application layer on the destination device
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
380 CISSP Cert Guide
Session Layer
As its name suggests, the Session layer (Layer 5) is responsible for initiating,
maintaining, and terminating processes on different systems. The Session layer
is responsible for adding information to the packet that makes a communication
session between a service or application on the source device possible with the same
service or application on the destination device. Do not confuse this process with
the one that establishes a session between the two physical devices. That occurs not
at this layer but at Layers 3 and 4. This session is built and closed after the physical
session between the computers has taken place.
The application or service in use is communicated between the two systems with an
identifier called a port number. This information is passed on to the Transport layer,
which also makes use of these port numbers.
Transport Layer
The protocols that operate at the Transport layer (Layer 4) work to establish
a session between the two physical systems. The service provided can be either
connection-oriented or connectionless, depending on the transport protocol in use.
The “TCP/IP Model” section (TCP/IP being the most common standard network-
ing protocol suite in use) discusses the specific transport protocols used by TCP/IP
in detail.
The Transport layer receives all the information from Layers 7, 6, and 5 and adds
information that identifies the transport protocol in use and the specific port
number that identifies the required Layer 7 protocol. At this layer, the PDU is called
a segment because this layer takes a large transmission and segments it into smaller
pieces for more efficient transmission on the medium.
Network Layer
At the Network layer (Layer 3), information required to route the packet is added.
This information is in the form of a source and destination logical address (meaning
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 381
one that is assigned to a device in some manner and can be changed). In TCP/IP,
this is in terms of a source and destination IP address. An IP address is a number
that uniquely differentiates a host from all other devices on the network. It is based
on a numbering system that makes it possible for computers (and routers) to identify
whether the destination device is on the local network or on a remote network. Any
time a packet needs to be sent to a different network or subnet (IP addressing is
covered later in the chapter), it must be routed and the information required to do
that is added here. At this layer, the PDU is called a packet.
Physical Layer
Finally, the packet (or frame, as it is called at Layer 2) is received by the Physical
layer (Layer 1). Layer 1 is responsible for turning the information into bits (ones
and zeros) and sending it out on the medium. The way in which this is accomplished
can vary according to the media in use. For example, in a wired network, the ones
and zeros are represented as electrical charges. In wireless, they are represented by
altering the radio waves. In an optical network, they are represented with light.
The ability of the same packet to be routed through various media types is a good
example of the independence of the layers. As a PDU travels through different
media types, the physical layer will change, but all the information in Layers 2–7
will not. Similarly, when a frame crosses routers or hops, the MAC addresses change,
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
382 CISSP Cert Guide
but none of the information in Layers 3–7 changes. The upper layers depend on the
lower layers for various services, but the lower layers leave the upper layer informa-
tion unchanged.
Figure 4-1 shows common protocols mapped to the OSI model. The next section
covers another model that perhaps more accurately depicts what happens in a TCP/
IP network. Because TCP/IP is the standard now for transmission, comparing these
two models is useful. Although they have a different number of layers and some of
the layer names are different, they describe the same process of packet creation or
encapsulation.
OSI model
7. Application layer
NNTP • SIP • DNS • FTP •
HTTP • NFS • NTP • SMPP • SMTP * SNMP •
Telnet • DHCP
6. Presentation layer
MIME • TLS • SSL
5. Session layer
Named pipes • NetBIOS • SAP • PPTP • RTP •
SOCKS • TLS/SSL
4. Transport layer
TCP • UDP • SCTP • DCCP
3. Network layer
IP • (IPv4 • IPV6) • ARP • ICMP • IPsec •
IGMP
2. Data Link layer
ATM • SDLC • HDLC •
IEEE 802.2 • L2TP •
IEEE 802.3 • Frame Relay •
PPP • X.25
1. Physical layer
SONET •
DSL • IEEE 802.3 - IEEE 802.11 •
USB • Bluetooth • RS-232 •
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 383
TCP/IP Model
The protocols developed when the OSI model was developed (sometimes referred
to as OSI protocols) did not become the standard for the Internet. The Internet
as we know it today has its roots in a wide-area network (WAN) developed by the
Department of Defense (DoD), with TCP/IP being the protocol developed for that
network. The Internet is a global network of public networks and Internet service
providers (ISPs) throughout the world.
This model bears many similarities to the OSI model, which is not unexpected
because they both describe the process of packet creation or encapsulation. The
difference is that the OSI model breaks the process into seven layers, whereas the
TCP/IP model breaks it into four. If you examine them side by side, however, it
becomes apparent that many of the same functions occur at the same layers, while
the TCP/IP model combines the top three layers of the OSI model into one and the
bottom two layers of the OSI model into one. Figure 4-2 shows the two models next
to one another.
OSI TCP/IP
7 Application
--
6 Presentation 4 Application
5 Session
Transport
--
4 3 Transport
3 Network 2 Internet
--
2 Data Link
1 Link
1 Physical
--
Figure 4-2 OSI and TCP/IP Models
The TCP/IP model has only four layers and is useful to study because it focuses
its attention on TCP/IP. Next, we explore those four layers and their functions and
relationships to one another and to layers in the OSI model.
Application Layer
Although the Application layer in the TCP/IP model has the same name as the top
layer in the OSI model, the Application layer in the TCP/IP model encompasses
all the functions performed in Layers 5–7 in the OSI model. Not all functions
map perfectly because both are simply conceptual models. Within the Application
layer, applications create user data and communicate this data to other processes or
applications on another host. For this reason, it is sometimes also referred to as the
process-to-process layer.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
384 CISSP Cert Guide
Examples of protocols that operate at this layer are SMTP, FTP, SSH, and HTTP.
These protocols are discussed in the section “Protocols and Services,” later in this
chapter. In general, however, these are usually referred to as higher layer protocols
that perform some specific function, whereas protocols in the TCP/IP suite that
operate at the Transport and Internet layers perform location and delivery service on
behalf of these higher layer protocols.
A port number identifies to the receiving device these upper layer protocols and
the programs on whose behalf they function. The number identifies the protocol or
service. Many port numbers have been standardized. For example, Domain Name
System (DNS) is identified with the standard port number 53. The “Common
TCP/UDP Ports” section covers these port numbers in more detail.
Transport Layer
The Transport layers of the OSI model and the TCP/IP model perform the same
function, which is to open and maintain a connection between hosts. This con-
nection must be established before the session between the processes can occur, as
described in the “Application Layer” section, and can be done in TCP/IP in two
ways: connectionless and connection-oriented. A connection-oriented transmission
means that a connection will be established before any data is transferred, whereas in
a connectionless transmission this is not done. One of two different transport layer
protocols is used for each process. If a connection-oriented transport protocol is
required, the Transmission Control Protocol (TCP) is used. If the process is connec-
tionless, the User Datagram Protocol (UDP) is used.
Application developers can choose to use either TCP or UDP as the Transport layer
protocol used with the application. Regardless of which transport protocol is used,
the application or service will be identified to the receiving device by its port num-
ber and the transport protocol (UDP or TCP).
Although TCP provides more functionality and reliability, the overhead required by
this protocol is substantial when compared to UDP. Consequently, a much higher
percentage of the packet consists of the header when using TCP than when using
UDP. This configuration is necessary to provide the required fields that contain the
information needed to provide the additional checks. Figure 4-3 shows a comparison
of the sizes of the two respective headers.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 385
UDP Header
0 16 31
16-bit source port number 16-bit destination port number
8 bytes
16-bit UDP length 16-bit UDP checksum
TCP Header
0 16 31
16-bit source port number 16-bit destination port number
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
386 CISSP Cert Guide
SYN
SYN/ACK
ACK
So what exactly is gained by using the extra overhead to use TCP? The following
are examples of the functionality provided with TCP:
■ Guaranteed delivery: If the receiving host does not specifically acknowledge
receipt of each packet, the sending system will resend the packet.
■ Accurate delivery: A checksum is generated using an algorithm. This algo-
rithm produces a cryptographic hash function that represents a piece of data
or a file. With TCP, if the receiving computer identifies a mismatch in the
hash value that it receives, then it knows that the content of the message has
changed during transmission. Thus, a checksum is critical to ensuring accurate
delivery.
■ Sequencing: In today’s routed networks, the packets might take many differ-
ent routes to arrive and might not arrive in the order in which they were sent.
A sequence number added to each packet allows the receiving host to reas-
semble the entire transmission using these numbers.
■ Flow control: The receiving host has the capability of sending the acknowl-
edgment packets back to signal the sender to slow the transmission if it cannot
process the packets as fast as they are arriving.
Many applications do not require the services provided by TCP or cannot toler-
ate the overhead required by TCP. In these cases, the process will use UDP, which
transmits data on a “best effort” basis with no guarantee of delivery or retransmis-
sion of missing packets. In many cases, some of these functions are provided by the
Application layer protocol itself rather than relying on the Transport layer protocol.
Internet Layer
The Transport layer can neither create a state of connection nor transmit using
UDP until the location and route to the destination are determined, which occurs
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 387
on the Internet layer. The four protocols in the TCP/IP suite that operate at this
layer are
■ Internet Protocol (IP): The protocol responsible for putting the source
and destination IP addresses in the packet and for routing the packet to its
destination.
■ Internet Control Message Protocol (ICMP): The protocol used by the
network devices to send messages regarding the success or failure of commu-
nications and used by humans for troubleshooting. When you use the ping or
traceroute/tracert commands, you are using ICMP.
■ Internet Group Management Protocol (IGMP): The protocol used when
multicasting, which is a form of communication whereby one host sends to a
group of destination hosts rather than a single host (called a unicast transmis-
sion) or to all hosts (called a broadcast transmission). There are three versions
of IGMP. Version 2 adds two query types: general query and group-specific
query. Version 3 adds a membership query.
■ Address Resolution Protocol (ARP): The protocol that resolves the IP
address placed in the packet to a physical address (called a MAC address in
Ethernet).
The relationship between IP and ARP is worthy of more discussion. IP places the
source and destination IP addresses in the header of the packet. As described ear-
lier, when a packet is being routed across a network, the source and destination
IP addresses never change, but the Layer 2 or MAC address pairs change at every
router hop. ARP uses a process called the ARP broadcast to learn the MAC address
of the interface that matches the IP address of the next hop. After it has learned
the address, a new Layer 2 header is created. Again, nothing else in the upper layer
changes in this process, just Layer 2. An IP address is a logical address, whereas a
MAC address is a physical address.
This description raises an important point: mapping ARP to the TCP/IP model.
Although ARP is generally placed on the Internet layer, the information it derives
from this process is placed in the Link layer or Layer 2, the next layer in our
discussion.
Just as the Transport layer added a header to the packet, so does the Internet layer.
One of the improvements made by IPv6 is the streamlining of the IP header.
Although the same information is contained in the header and the header is larger, it
has a much simpler structure. Figure 4-5 shows a comparison of the two.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
388 CISSP Cert Guide
IPv4 Header
0 4 8 12 16 20 24 28 31
Source Address
Destination Address
IPv6 Header
0 4 8 12 16 20 24 28 32 36 40 44 48 52 56 60 63
Version Traffic Class Flow Label Payload Length Next Header Hop Limit
Source Address
Destination Address
Link Layer
The Link layer, also called Network Access layer, of the TCP/IP model displays the
services provided by both the Data Link and the Physical layers in the OSI model.
The source and destination MAC addresses are placed in this layer’s header. A trailer
is also placed on the packet at this layer with information in the trailer that can be
used to verify the integrity of the data.
This layer is also concerned with placing the bits on the medium, as discussed in the
“OSI Model” section, earlier in this chapter. Again, the exact method of implemen-
tation varies with the physical transmission medium. It might be in terms of electri-
cal impulses, light waves, or radio waves.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 389
Data Flow
Data Flow
Data Flow
Link
Data Header
Layer
IP Networking
Now that you understand secure design principles and the OSI and TCP/IP models,
it is time to delve more deeply into IP networking. The Internet Protocol (IP) is the
main communications protocol in the TCP/IP suite and is responsible for relaying
datagrams across network boundaries. The following sections cover common TCP/
UDP ports, logical and physical addressing, network transmission, and network
types.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
390 CISSP Cert Guide
logical, and there are 65,536 possible numbers ranging from 0 to 65,535.
Port numbers are assigned in various ways, based on three ranges:
■ System, or well-known, ports (0–1023)
■ User ports (1024–49151)
■ Dynamic and/or private ports (49152–65535)
System ports are assigned by the Internet Engineering Task Force (IETF) for
standards-track protocols, as per RFC 6335. User ports can be registered with the
Internet Assigned Numbers Authority (IANA) and assigned to the service or appli-
cation using the “Expert Review” process, as per RFC 6335. Source devices use
dynamic ports as source ports when accessing a service or application on another
machine. For example, if computer A is sending an FTP packet, the destination port
will be the well-known port for FTP, and the source will be selected randomly by
the computer from the dynamic range.
The combination of the destination IP address and the destination port number
is called a socket. The relationship between these two values can be understood if
viewed through the analogy of an office address. The office has a street address, but
the address also must contain a suite number because there could be thousands (in
this case, 65,535) of suites in the building. Both are required to get the information
where it should go.
As a security professional, you should be aware of well-known port numbers of
common services. In many instances, firewall rules and access control lists (ACLs)
are written or configured in terms of the port number of what is being allowed or
denied rather than the name of the service or application. Table 4-1 lists some of the
more important port numbers. Some use more than one port.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 391
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
392 CISSP Cert Guide
Here, we discuss both address types with a particular focus on how IP addresses
are used to create separate networks or subnets in the larger network. We also
discuss how IP addresses and MAC addresses are related and used during a network
transmission.
IPv4
IPv4 addresses are 32 bits in length and can be represented in either binary or in
dotted-decimal format. The number of possible IP addresses using 32 bits can be
calculated by raising the number 2 (the number of possible values in the binary
number system) to the 32nd power. The result is 4,294,967,296, which on the
surface appears to be enough IP addresses. But with the explosion of the Internet
and the increasing number of devices that require an IP address, this number has
proven to be insufficient.
Due to the eventual exhaustion of the IPv4 address space, several methods of
preserving public IP addresses (more on that in a bit, but for now these are addresses
that are legal to use on the Internet) have been implemented, including the use
of private addresses and Network Address Translation (NAT), both discussed in
following sections. The ultimate solution lies in the adoption of IPv6, a newer
system that uses 128 bits and allows for enough IP addresses for every device in the
world today and in the future. We discuss IPv6 later.
IP addresses that are written in dotted-decimal format, the format in which humans
usually work with them, have four fields called octets separated by dots or peri-
ods. Each field is called an octet because, with addresses in binary format, 8 bits in
binary represent each decimal number that appears in the octet when it is viewed in
dotted-decimal format. Therefore, in the address 216.5.41.3, four decimal numbers
are separated by dots, where each would be represented by 8 bits if viewed in binary.
The following is the binary version of this same address:
11011000.00000101.00101001.00000011
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 393
www.smartPCtricks.com
When the IPv4 system was first created, there were only three default subnet masks.
They yielded only three sizes of networks, which later proved to be inconvenient
and wasteful of public IP addresses. Eventually, a system called Classless Inter-
Domain Routing (CIDR) was adopted; it uses subnet masks that allow subnets or
subdivisions to be created from the major classful networks possible before CIDR.
CIDR is beyond the scope of the CISSP exam, but it is worth knowing about. You
can find more information about how CIDR works at https://searchnetworking.
techtarget.com/definition/CIDR.
IP Classes
Classful subnetting (pre-CIDR) created five classes of networks. Each class repre-
sented a range of IP addresses. Table 4-2 shows the five classes. Only the first three (A,
B, and C) are used for individual network devices. The other ranges are for special use.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
394 CISSP Cert Guide
The key value that changes when moving from one class to another is the value
of the first octet (the one on the far left). What might not be immediately obvious
is that when moving from one class to another, the dividing line between the host
portion and network portion also changes. This is where the subnet mask value
comes in. When the mask is overlaid with the IP addresses (thus called a mask),
every octet in the subnet mask where there is a 255 is a network portion, and every
octet where there is a 0 is a host portion. Also, each class has a distinctive pattern in
the first two bits of the first octet. For example, any IP address that begins with 01 in
the first bit positions must be in Class A, also indicated in Table 4-2.
The significance of the network portion is that two devices must share the same
values in the network portion to be in the same network. If they do not, they will not
be able to communicate.
NAT
Network Address Translation (NAT) is a service that can be supplied by a router or
by a server. The device that provides the service stands between the local-area net-
work (LAN) and the Internet. When packets need to go to the Internet, the packets
go through the NAT service first. The NAT service changes the private IP address
to a public address that is routable on the Internet. When the response is returned
from the Web, the NAT service receives it, translates the address back to the original
private IP address, and sends it back to the originator.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 395
Internet
Public IP Address
12.13.14.15
Private IP Address
Router 192.168.0.1
Figure 4-9 shows an example of how Network Address Translation works. Here, a
computer on a local-area network wants to request information about the weather
forecast for Dublin, Ireland, and obtain that information from weather.com. The
private IP address for the requesting computer is 192.168.0.3. The request is sent
through the router, and the router converts the client source IP address with its own
IP address.
Internet
Weather.com
192.168.0.3 23.48.47.91
Figure 4-9 Computer with a Private IP Address Makes a Request to a Web Server
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
396 CISSP Cert Guide
Figure 4-10 shows that the request from the client computer to weather.com is
received by the router. Again, the router replaces the client source IP address with
its own IP address of 12.13.14.15. The router also generates a source port number
and replaces the source port in the package with the generated one, which in this
case is 24603.
192.168.0.3:42301 12.13.14.15:24603
to 23.48.47.91:80 to 23.48.47.91:80
Internet
Weather.com
192.168.0.3 23.48.47.91
The router keeps track of this information in the NAT forwarding table. This means
that the router stores information about the client computer request and how that
request was made on the public-facing Internet. Again, the router maintains a table
of active connections, with client IP address and port number so that incoming data
can be redirected to the original client.
The Web server for weather.com receives the request and does not see the IP
address for the host on the network but sees only the static IP address for the router.
The HTML file is then sent to the router (see Figure 4-11). When the router
receives the file, it examines the destination port and looks up the NAT forwarding
table to identify established connections. The router then replaces the IP address
and port number so that the packet can be sent to the requesting client computer.
Translation can be done on a one-to-one basis (one private address to one public
address), but to save IP addresses, usually the NAT service will represent the entire
private network with a single public IP address. This process is called Port Address
Translation (PAT). This name comes from the fact that the NAT service keeps the
private clients separate from one another by recording their private address and the
source port number (usually a unique number) selected when the packets were built.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 397
23.48.47.91:80
12.13.14.15:24603 to 12.13.14.15:24603
to 192.168.0.3:42301
Internet
Weather.com
192.168.0.3 23.48.47.91
Stateful NAT
Stateful NAT (SNAT) implements two or more NAT devices to work together as a
translation group. One member provides network translation of IP address informa-
tion. The other member uses that information to create duplicate translation table
entries. If the primary member that provides network translation fails, the backup
member can then become the primary translator. It is called stateful NAT because it
maintains a table about the communication sessions between internal and external
systems. Figure 4-12 illustrates an example of a SNAT deployment.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
398 CISSP Cert Guide
Public Network
Private Network
APIPA
Automatic Private IP Addressing (APIPA) assigns an IP address to a device if
the device is unable to communicate with the DHCP server and is primarily
implemented in Windows. The range of IP addresses assigned is 169.254.0.1 to
169.254.255.254 with a subnet mask of 255.255.0.0.
When a device is configured with an APIPA address, it is able to communicate only
with other APIPA-configured devices on the same subnet. It is unable to commu-
nicate with non-APIPA devices on the same subnet or with devices on a different
subnet. If a technician notices that a device is configured with an APIPA address, a
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 399
communication problem exists between the device and DHCP, which could range
from a bad network interface card or controller (NIC) or cable to DHCP router or
server failure.
MAC Addressing
All the discussion about addressing thus far has been addressing that is applied at
Layer 3, which is IP addressing. At Layer 2, physical addresses reside. In Ethernet,
these are also called MAC addresses. They are physical addresses because these
48-bit (6 bytes) addresses expressed in hexadecimal are permanently assigned to the
network interfaces of devices. Here is an example of a MAC address:
01-23-45-67-89-ab
As a packet is transferred across a network, at every router hop and then again when
it arrives at the destination network, the source and destination MAC addresses
change. ARP resolves the next hop address to a MAC address using a process called
the ARP broadcast. MAC addresses are unique; at the beginning of the address, each
manufacturer has a different set of values assigned to it, called the organization-
ally unique identifier (OUI). Each manufacturer ensures that it assigns no duplicate
within its OUI. The OUI is the first three bytes of the MAC address.
Network Transmission
Data can be communicated across a variety of media types, using several possible
processes. These communications can also have a number of characteristics that
need to be understood. Next, we discuss some of the most common methods and
their characteristics.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
400 CISSP Cert Guide
Digital signal
Analog signal
Digital signaling, on the other hand, which is the type used in most computer
transmissions, does not have an infinite number of possible values; it has only two:
on and off. A digital signal shown on a graph exhibits a sawtooth pattern, as shown
in Figure 4-13. Digital signals are usually preferable to analog because they are more
reliable and less susceptible to noise on the line. Transporting more information
on the same line at a higher quality over a longer distance than with analog is also
possible.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 401
Asynchronous
Sender Receiver
Synchronous
Data
Sender Receiver
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
402 CISSP Cert Guide
Broadband Baseband
Ch1
Ch2
Frequency
Ch3
Ch4
Ch5
Data Data Data Data Data Data
Ch6 Slot Slot Slot Slot Slot Slot
Time Time
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 403
IPv6
IPv6 was developed to address the issue of the exhaustion of the IPv4 address space
that had only 32 bits. Although private addressing and the use of NAT have helped
to delay the inevitable address exhaustion, the use of NAT introduces its own set
of problems. The IPv6 system uses 128 bits to create a large number of possible
addresses that it is expected to suffice for many, many years.
IPv6 addresses look different than IPv4 addresses because they use a different
format and use the hexadecimal number system, so there are letters and numbers
in them, similar to what you would see in a MAC address. There are eight fields
separated by colons, not dots.
Here is a sample IPv6 address:
2001:00000:4137:9e76:30ab:3035:b541:9693
Many of the security features that were add-ons to IPv4 (such as IPsec) have been
built into IPv6, providing better security. Moreover, while DHCP can be used with
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
404 CISSP Cert Guide
IPv6, IPv6 enables a host to locate its local router, configure itself, and discover the
IP addresses of its neighbors. Finally, broadcast traffic is completely eliminated in
IPv6 and replaced by multicast communications.
Table 4-4 shows the differences between IPv4 and IPv6.
Table 4-4 Differences Between IPv4 and IPv6 (Adapted from NIST SP 800-119)
Property IPv4 IPv6
Address size and network 32 bits, network size 8–30 bits 128 bits, network size 64 bits
size
Packet header size 20–60 bytes 40 bytes
Header-level extension Limited number of small IP Unlimited number of IPv6
options extension headers
Fragmentation Sender or any intermediate Only sender may fragment
router allowed to fragment
Control protocols Mixture of non-IP (ARP), All control protocols based on
ICMP, and other protocols ICMPv6
Minimum allowed MTU 576 bytes 1280 bytes
Path MTU discovery Optional, not widely used Strongly recommended
Address assignment Usually one address per host Usually multiple addresses per
interface
Address types Use of unicast, multicast, and Broadcast addressing no longer
broadcast address types used; use of unicast, multicast,
and anycast address types
Address configuration Devices configured manually Devices configure themselves
or with host configuration independently using stateless
protocols like DHCP address autoconfiguration
(SLAAC) or use DHCP
NIST SP 800-119
NIST Special Publication (SP) 800-119 provides guidelines for the secure deploy-
ment of IPv6. According to this SP, organizations planning the deployment of IPv6
should consider the following during the planning process:
■ IPv6 is a protocol that is not backward compatible with IPv4.
■ In most cases, IPv4 will still be a component of an IT infrastructure. As such,
even after the deployment of IPv6, organizations will require mechanisms for
IPv6 and IPv4 co-existence.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 405
Organizations that have not deployed IPv6 globally should implement the following
recommendations:
■ Disable all IPv6-compatible ports, protocols, and services on all software and
hardware.
■ Begin to acquire familiarity and expertise with IPv6, through laboratory
experimentation and/or limited pilot deployments.
■ Make organization web servers, located outside of the organizational firewall,
accessible via IPv6 connections. This will enable IPv6-only users to access the
servers and aid the organization in acquiring familiarity with some aspects of
IPv6 deployment.
Organizations that are deploying IPv6 should implement the following recommen-
dations to mitigate IPv6 threats:
■ Apply an appropriate mix of different types of IPv6 addressing (privacy
addressing, unique local addressing, sparse allocation, and so on) to limit access
and knowledge of IPv6-addressed environments.
■ Use automated address management tools to avoid manual entry of IPv6
addresses, which is prone to error because of their length.
■ Develop a granular ICMPv6 (ICMP for IPv6) filtering policy for the
enterprise. Ensure that ICMPv6 messages that are essential to IPv6 operation
are allowed but others are blocked.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
406 CISSP Cert Guide
■ Use IPsec to authenticate and provide confidentiality to assets that can be tied
to a scalable trust model (an example is access to Human Resources assets by
internal employees who make use of an organization’s public key infrastructure
[PKI] to establish trust).
■ Identify capabilities and weaknesses of network protection devices in an IPv6
environment.
■ Enable controls that might not have been used in IPv4 due to a lower threat
level during initial deployment (implementing default deny access control
policies, implementing routing protocol security, and so on).
■ Pay close attention to the security aspects of transition mechanisms such as
tunneling protocols.
■ Ensure that IPv6 routers, packet filters, firewalls, and tunnel endpoints enforce
multicast scope boundaries and make sure that Multicast Listener Discovery
(MLD) packets are not inappropriately routable.
■ Be aware that switching from an environment in which NAT provides IP
addresses to unique global IPv6 addresses could trigger a change in the
Federal Information Security Management Act (FISMA) system boundaries.
The following sections on IPv6 are adapted from NIST SP 800-119. For more
information on IPv6 beyond what is provided here, please refer to NIST SP
800-119.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 407
Autoconfiguration
Essentially plug-and-play networking, IPv6 Stateless Address Auto-configuration
is one of the most interesting and potentially valuable addressing features in IPv6.
This feature allows devices on an IPv6 network to configure themselves indepen-
dently using a stateless protocol. In IPv4, hosts are configured manually or with host
configuration protocols like DHCP; with IPv6, autoconfiguration takes this a step
further by defining a method for some devices to configure their IP addresses and
other parameters without the need for a server. Moreover, it also defines a method,
renumbering, whereby the time and effort required to renumber a network by
replacing an old prefix with a new prefix are vastly reduced.
Header Structure
The IPv6 header is much simpler than the IPv4 header and has a fixed length of
40 bytes (as defined in RFC 2460). Even though this header is almost twice as long
as the minimum IPv4 header, much of the header is taken up by two 16-byte IPv6
addresses, leaving only 8 bytes for other header information. This simplified header
allows for improved fast processing of packets and protocol flexibility.
Extension Headers
An IPv4 header can be extended from 20 bytes to a maximum of 60 bytes, but this
option is rarely used because it impedes performance and is often administratively
prohibited for security reasons. IPv6 has a method to handle options, which allows
substantially improved processing and avoids some of the security problems that
IPv4 options generated. IPv6 RFC 2460 defines six extension headers: hop-by-hop
option header, routing header, fragment header, destination options header,
authentication header (AH), and encapsulating security payload (ESP) header. Each
extension header is identified by the Next Header field in the preceding header.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
408 CISSP Cert Guide
Mobility
Mobile IPv6 (MIPv6) is an enhanced protocol supporting roaming for a mobile
node so that it can move from one network to another without losing IP-layer
connectivity (as defined in RFC 3775). Mobile IPv6 uses IPv6’s vast address space
and Neighbor Discovery (RFC 4861) to solve the handover problem at the network
layer and maintain connections to applications and services if a device changes its
temporary IP address. Mobile IPv6 also introduced security concerns, such as route
optimization (RFC 4449), where data flow between the home agent and mobile
node will need to be appropriately secured.
Quality of Service
IP (for the most part) treats all packets alike because they are forwarded with best-
effort treatment and no guarantee for delivery through the network. TCP adds
delivery confirmations but has no options to control parameters such as delay or
bandwidth allocation. Quality of Service (QoS) offers enhanced policy-based net-
working options to prioritize the delivery of information. Existing IPv4 and IPv6
implementations use similar QoS capabilities, such as Differentiated Services and
Integrated Services, to identify and prioritize IP-based communications during peri-
ods of network congestion. Within the IPv6 header, two fields can be used for QoS:
the Traffic Class and Flow Label fields. The Flow Label field and enlarged Traffic
Class field in the main IPv6 header allow more efficient and finer-grained differenti-
ation of various types of traffic. The Flow Label field can contain a label identifying
or prioritizing a certain packet flow, such as Voice over IP (VoIP) or videoconferenc-
ing, both of which are sensitive to timely delivery. IPv6 QoS was developed to help
with traffic shaping, weighted random early detection (WRED), and policing of
IPv6 packets.
Route Aggregation
IPv6 incorporates a hierarchical addressing structure and has a simplified header
allowing for improved routing of information from a source to a destination.
The large amount of address space allows organizations with large numbers of
connections to obtain blocks of contiguous address space.
Contiguous address space allows organizations to aggregate addresses under one
prefix for identification on the Internet. This structured approach to addressing
reduces the amount of information Internet routers must maintain and store
and promotes faster routing of data. This will allow for ISPs to summarize route
advertisements to minimize the size of the IPv6 Internet routing tables.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 409
Efficient Transmission
IPv6 packet fragmentation control occurs at the IPv6 source host, not at an inter-
mediate IPv6 router. With IPv4, a router can fragment a packet when the maximum
transmission unit (MTU) of the next link is smaller than the packet it has to send.
The router does this by slicing a packet to fit into the smaller MTU and sends it out
as a set of fragments. The destination host collects the fragments and reassembles
them. All fragments must arrive for the higher-level protocol to receive the com-
plete packet. Therefore, when one fragment is missing or an error occurs, the entire
transmission has to be redone.
In IPv6, a host uses a procedure called Path Maximum Transmission Unit Discovery
(PMTUD) to learn the path MTU size and eliminate the need for routers to per-
form fragmentation. The IPv6 Fragment Extension Header is used when an IPv6
host wants to fragment a packet, so fragmentation occurs at the source host, not the
router, which allows efficient transmission.
IPv6 Addressing
According to NIST SP 800-119, IPv6 addresses are 128 bits long and are written in
what is called colon-delimited hexadecimal notation. An IPv6 address is composed
of eight distinct numbers representing 16 bits each and written in base-16 (hexa-
decimal or hex) notation. The valid hex digits are 0 through 9 and A through F and
together with the colon separator are the only characters that can be used for writ-
ing an IPv6 address. A comparison of IPv4 and IPv6 addressing conventions is illus-
trated in Figure 4-17.
YYY = 8 Bits
(Resulting in 4,294,967,296 Unique IP Addresses)
XXXX = 16 Bits
2001:0db8:9095:02e5:0216:cbff:feb2:7474
Note that the address contains eight distinct four-place hex values, separated by
colons. Each of these values represents 16 bits, for a total of 128 bits in the entire
address.
IPv6 addresses are divided among the network prefix, the subnet identifier, and the
host identifier portions of the address (see Figure 4-18). The network prefix is the
high-order bits of an IP address, used to identify a specific network and, in some
cases, a specific type of address. The subnet identifier (subnet ID) identifies a link
within a site. The subnet ID is assigned by the local administrator of the site; a
single site can have multiple subnet IDs. This is used as a designator for the network
upon which the host bearing the address is resident. The host identifier (host ID)
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 411
of the address is a unique identifier for the node within the network upon which it
resides. It is identified with a specific interface of the host.
128 Bits
There is no subnet mask in IPv6, although the slash notation used to identify the
network address bits is similar to IPv4’s subnet mask notation. The IPv6 notation
appends the prefix length and is written as a number of bits with a slash, which leads
to the following format: IPv6 address/prefix length. The prefix length specifies how
many of the address’s leftmost bits comprise the network prefix. A sample address
with a 32-bit network prefix is 2001:0db8:9095:02e5:0216:cbff:feb2:7474/32.
Quantities of IPv6 addresses are assigned by the international registry services and
ISPs based in part on the size of the entity receiving the addresses. Large, top-tier
networks may receive IPv6 address allocations with a network prefix of 32 bits as
long as the need is justified (see Figure 4-19). In this case, the first two groupings of
hex values, separated by colons, comprise the network prefix for the assignee of the
addresses. The remaining 96 bits are available to the local administrator primarily
for reallocation of the subnet ID and the host ID. The subnet ID identifies a link
within a site, which can have multiple subnet IDs. The host ID within a network
must be unique and identifies an interface on a subnet for the organization, similar
to an assigned IPv4 address.
32 Bits 96 Bits
48 Bits 80 Bits
Subnets within an organization often have network prefixes of 64 bits (/64), leaving
64 bits for allocation to hosts’ interfaces. The host ID should use a 64-bit interface
identifier that follows EUI-64 (Extended Unique Identifier) format when a global
network prefix is used (001 to 111), except in the case when multicast addresses
(1111 1111) are used. Figure 4-21 depicts an IPv6 address with 64 bits allocated to
the network prefix.
64 Bits 64 Bits
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 413
One to three zeros that appear as the leading digits in any colon-delimited hexa-
decimal grouping may be dropped. This simplifies the address and makes it easier to
read and to write. For example,
2001:0db8:0aba:02e5:0000:0ee9:0000:0444/48
becomes
2001:db8:aba:2e5:0:ee9:0:444/48
It is important to note that trailing zeros may not be dropped because they have
intrinsic place value in the address format.
Further efficiency is gained by combining all-zero portions of the address. Any
colon-delimited portion of an address containing all zeros may be compressed so
that nothing appears between the leading and trailing colons. For example,
2001:0db8:0055:0000:cd23:0000:0000:0205/48
becomes
2001:db8:55:0:cd23::205/48
In this example, the sixth and seventh 16-bit groupings contain all zeros; they were
compressed by eliminating the zeros completely, as well as the colon that divided
the two groupings. Nevertheless, compressing an address by removing one or more
consecutive colons between groups of zeros may be done only once per address. The
fourth 16-bit grouping in the example also contains all zeros, but in the condensed
form of the address, it is represented with a single zero. A choice had to be made as
to which group of zeros was to be compressed. The sample address could be written
2001:db8:55::cd23:0:0:205/48
2001:db8:55:0:cd23::205/48
It is important to note that both of the addresses in the preceding paragraph are
properly formatted, but the latter address is shorter. Compression is just a conven-
tion for writing addresses; it does not affect how an address is used; and it makes no
difference whether compression falls within the network prefix, host identifier, or
across both portions of the address.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
414 CISSP Cert Guide
IPv6 uses the notion of address types for different situations. These different address
types are defined in the following list:
■ Unicast addresses: Addresses that identify one interface on a single node; a
packet with a unicast destination address is delivered to that interface.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 415
Link-local addresses are used for administrative purposes, such as neighbor and
router discovery.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
416 CISSP Cert Guide
■ Site-local: This scope was intended to apply to all IPv6 networks or a single
logical entity, such as the network within an organization. Addresses with this
scope start with FEC0::/10. They were intended not to be globally routable
but potentially routed between subnets within an organization. Site-local
addresses have been deprecated and replaced with unique local addresses.
■ Unique local unicast: This scope is meant for a site, campus, or enterprise’s
internal addressing. It replaces the deprecated site-local concept. Unique local
addresses (ULAs) may be routable within an enterprise. Use of unique local
addresses is not yet widespread.
■ Global: The global scope applies to the entire Internet. These globally unique
addresses are routable across all publicly connected networks.
■ Embedded IPv4 unicast: The IPv6 specification has the ability to leverage
existing IPv4 addressing schemes. The transition to IPv6 has been gradual,
so two special types of addresses have been defined for backward compat-
ibility with IPv4: IPv4-compatible IPv6 addresses (rarely used and deprecated
in RFC 4291) and IPv4-mapped IPv6 addresses. Both allow the protocol to
derive addresses by embedding IPv4 addresses in the body of an IPv6 address.
An IPv4-mapped IPv6 address is used to represent the addresses of IPv4-only
nodes as an IPv6 address, which allows an IPv6 node to use this address to
send a packet to an IPv4-only node.
IPv6 makes use of addresses other than those shown previously. The unspecified
address consists of all zeros (0:0:0:0:0:0:0:0 or simply ::) and may be the source
address of a node soliciting its own IP address from an address assignment author-
ity (such as a DHCPv6 server). IPv6-compliant routers never forward a packet with
an unspecified address. The loopback address is used by a node to send a packet to
itself. The loopback address, 0:0:0:0:0:0:0:1 (or simply ::1), is defined as being inter-
face local.
IPv6-compliant hosts and routers never forward packets with a loopback destination.
Network Types
So far we have discussed network topologies and technologies, so now let’s look at
a third way to describe networks: network type. Network type refers to the scope of
the network. Is it a LAN or a WAN? Is it a part of the internal network, or is it an
extranet? In the following sections, we discuss and differentiate all these network
types.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 417
Client
Router
Firewall
Internet
Client Server 1
Laptop
Tablet Server 2
Mobile Phone
Printer
A 10 Mbps connection might not seem very fast to you, but it is when compared
to a WAN. Even a T1 connection is only 1.544 Mbps. Using this connection as a
yardstick, if a single campus network has a WAN connection between two buildings,
then the two networks are considered two LANs rather than a single LAN. In most
cases, however, networks in a single campus are typically not connected with a WAN
connection, which is why a LAN is usually defined as a network in a single location.
Intranet
Within the boundaries of a single LAN, there can be subdivisions for security pur-
poses. The LAN might be divided into an intranet and an extranet. The intranet is
the internal network of the enterprise. It would be considered a trusted network and
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
418 CISSP Cert Guide
typically houses any sensitive information and systems and should receive maximum
protection with firewalls and strong authentication mechanisms.
Extranet
An extranet is a network logically separate from the intranet where resources that
will be accessed from the outside world are made available. Access might be granted
to customers, business partners, and the public in general. All traffic between this
network and the intranet should be closely monitored and securely controlled.
Nothing of a sensitive nature should be placed in the extranet. Figure 4-23 provides
a comparison between the Internet, extranet, and an intranet.
-Available publicly
Internet worldwide
-Company network
connecting internal and
Extranet external subscribers
-Available from multiple
locations
-Company network that
connects internal
Intranet subscribers
-Available in only one
location
MAN
A metropolitan-area network (MAN) is a type of LAN that encompasses a large
area such as the downtown of a city (see Figure 4-24). In many cases, it is a backbone
that is provided for LANs to hook into. Three technologies are usually used in a
MAN:
■ Fiber Distributed Data Interface (FDDI)
■ Synchronous Optical Networking (SONET)
■ Metro Ethernet
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 419
WAN
Metropolitan-Area
LAN Network
(MAN)
LAN LAN
FDDI and SONET rings, which both rely on fiber cabling, can span large areas,
and businesses can connect to the rings using T1, fractional T1, or T3 connections.
FDDI rings are a double ring with fault tolerance built in. SONET is also self-
healing, meaning it has a double ring with a backup line if a line goes bad.
Metro Ethernet is the use of Ethernet technology over a wide area. It can be pure
Ethernet or a combination of Ethernet and other technologies such as the ones
mentioned in this section. Traditional Ethernet (the type used on a LAN) is less
scalable. It is often combined with Multiprotocol Label Switching (MPLS) technol-
ogy, which is capable of carrying packets of various types, including Ethernet.
Less capable MANs often feed into MANs of higher capacity. Conceptually, the
MAN architecture can be divided into three sections: customer, aggregation, and
core layer. The customer section is the local loop that connects from the customer
to the aggregation network, which then feeds into the high-speed core. The high-
speed core connects the aggregation networks to one another.
WAN
WANs are used to connect LANs and MANs together (see Figure 4-25). Many
technologies can be used for these connections. They vary in capacity and cost, and
access to these networks is purchased from a telecommunications company. The
ultimate WAN is the Internet, the global backbone to which all MANs and LANs
are connected. However, not all WANs connect to the Internet because some are
private, dedicated links to which only the company paying for them has access.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
420 CISSP Cert Guide
Campus
WAN
City (e.g., Internet)
ISP
ISP
Government Enterprise
WLAN
A wireless local-area network (WLAN) allows devices to connect wirelessly to each
other via a wireless access point (WAP) (see Figure 4-26). Multiple WAPs can work
together to extend the range of the WLAN. WLAN technologies are discussed in
more detail later in this chapter.
SAN
A storage-area network (SAN) provides a connection to data storage devices
through a technology like Fibre Channel or iSCSI, both of which are discussed in
more detail later in this chapter.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 421
CAN
A campus-area network (CAN) includes multiple LANs but is smaller than a MAN.
A CAN could be implemented on a hospital or local business campus.
PAN
A personal-area network (PAN) includes devices, such as computers, telephones,
tablets, and mobile phones, that are in close proximity with one another (see
Figure 4-27). PANs are usually implemented using Bluetooth, Z-Wave, Zigbee, and
Infrared Data Association (IrDA).
Digital Camara
Printer
Controller
Notebook
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
422 CISSP Cert Guide
ARP/RARP
Address Resolution Protocol (ARP), one of the protocols in the TCP/IP suite, oper-
ates at Layer 3 of the OSI model. The information it derives is utilized at Layer 2,
however. ARP’s job is to resolve the destination IP address placed in the header by
IP to a Layer 2 or MAC address. Remember, when frames are transmitted on a local
segment, the transfer is done in terms of MAC addresses, not IP addresses, so this
information must be known.
Whenever a packet is sent across the network, at every router hop and again at the
destination subnet, the source and destination MAC address pairs change, but the
source and destination IP addresses do not. The process that ARP uses to perform
this resolution is called an ARP broadcast.
First, an area of memory called the ARP cache is consulted. If the MAC address
has been recently resolved, the mapping will be in the cache, and a broadcast is not
required. If the record has aged out of the cache, ARP sends a broadcast frame to the
local network that all devices will receive. The device that possesses the IP address
responds with its MAC address. Then ARP places the MAC address in the frame
and sends the frame. Figure 4-28 illustrates the ARP broadcast process.
IP-172.16.8.101
MAC=FO-OD-EE-OO-AO-OB
Host #1 Host #2
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 423
Windows Users: To view the ARP cache (table) on your Windows PC, enter cmd
in the Search bar and then press Enter. At the command line prompt, type arp -a
and then press Enter.
macOS Users: To view the ARP cache (table) on your MacBook, go to Applica-
tions > Utilities, and then open the Terminal. At the $ or # prompt, type arp -a and
then press Return.
You should see some results similar to those displayed in Example 4-1.
DHCP/BOOTP
Dynamic Host Configuration Protocol (DHCP) is a service that can be used to
automate the process of assigning an IP configuration to the devices in the network.
A DHCP server uses the bootstrap protocol (BOOTP) to perform its functions.
Manual configuration of an IP address, subnet mask, default gateway, and DNS
server is not only time-consuming but fraught with opportunity for human error.
Using DHCP can not only automate this but can also eliminate network problems
from this human error.
DHCP is a client/server program. All modern operating systems contain a DHCP
client, and the server component can be implemented either on a server or on a
router. When a computer that is configured to be a DHCP client starts, it performs
a precise four-step process to obtain its configuration. Conceptually, the client
broadcasts for the IP address of the DHCP server. All devices receive this broadcast,
but only DHCP servers respond. The device accepts the configuration offered by
the first DHCP server from which it hears. The process uses four packets with dis-
tinctive names (see Figure 4-29). DHCP uses UDP ports 67 and 68. Port 67 sends
data to the server, and port 68 sends data to the client.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
424 CISSP Cert Guide
1 DHCPDiscover
IP address request
DHCPOffer 2
IP address offer
3 DHCPRequest
DHCP client IP address selection DHCP server
DHCPAck 4
IP address
acknowledgment
DNS
Just as DHCP relieves us from having to manually construct the IP configuration
of each system, Domain Name System (DNS) relieves all humans from having to
know the IP address of every computer with which they want to communicate. Ulti-
mately, an IP address must be known to connect to another computer. DNS resolves
a computer name (or in the case of the Web, a domain name) to an IP address.
DNS is another client/server program with the client included in all modern operat-
ing systems. The server part resides on a series of DNS servers located both in the
local network and on the Internet. When a DNS client needs to know the IP address
that goes with a particular computer name or domain name, it queries the local
DNS server. If the local DNS server does not have the resolution, it contacts other
DNS servers on the client’s behalf, learns the IP address, and relays that information
to the DNS client. DNS uses UDP port 53 and TCP port 53. The DNS servers use
TCP port 53 to exchange information, and the DNS clients use UDP port 53 for
queries.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 425
FTPS is not the same as and should not be confused with another secure version of
FTP, SSH File Transfer Protocol (SFTP). This is an extension of the Secure Shell
(SSH) protocol. There have been a number of different versions, with version 6
being the latest. Because it uses SSH for the file transfer, it uses TCP port 22.
Trivial FTP (TFTP) does not use authentication and runs over UDP port 69.
ICMP
Internet Control Message Protocol (ICMP) operates at Layer 3 (Network layer) of
the OSI model and is used by devices to transmit error messages regarding problems
with transmissions. It also is the protocol used when the ping and traceroute
commands are used to troubleshoot network connectivity problems.
ICMP announces network errors and network congestion. It also assists in
troubleshooting and announces timeouts.
ICMP is a protocol that can be leveraged to mount several network attacks based on
its operation, and for this reason many networks choose to block ICMP.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
426 CISSP Cert Guide
IGMP
Internet Group Management Protocol (IGMP) provides multicasting capabilities
to devices. Multicasting allows devices to transmit data to multiple recipients. Many
gaming platforms use IGMP.
IMAP
Internet Message Access Protocol (IMAP) is an Application layer protocol for email
retrieval. Its latest version is IMAP4. It is a client email protocol used to access email
from a server. Unlike POP3, another email client that can only download messages
from the server, IMAP4 allows a user to download a copy and leave a copy on the
server. IMAP4 uses port 143. A secure version also exists, IMAPS (IMAP over SSL),
that uses port 993.
LDAP
Lightweight Directory Access Protocol (LDAP) is a directory query protocol that is
based on the X.500 series of computer networking standards. Vendor implementa-
tions of LDAP include Microsoft’s Active Directory Services, NetIQ’s eDirectory,
and Network Information Service (NIS). By default, LDAP uses TCP/UDP port
389.
LDP
Label Distribution Protocol (LDP) allows routers capable of MPLS to exchange
label mapping information. Two routers with an established session are called LDP
peers, and the exchange of information is bidirectional. For inner label distribution,
targeted LDP (tLDP) is used. LDP and tLDP discovery runs on UDP port 646, and
the session is built on TCP port 646.
NAT
Network Address Translation (NAT) is a service that maps private IP addresses to
public IP addresses. It is discussed below the section “Logical and Physical Address-
ing,” earlier in this chapter.
NetBIOS
Network Basic Input/Output System (NetBIOS) is an API. NetBIOS over TCP/IP
(NetBT) runs on TCP ports 137, 138, and 139. An application programming inter-
face enables a company to allow third-party companies or individuals to have access
to their application data and functionality.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 427
NFS
Network File System (NFS) is a client/server file-sharing protocol used in Unix/
Linux. Version 4 is the most current version of NFS. It operates over TCP port
2049. Secure NFS (SNFS) offers confidentiality using the Digital Encryption
Standard (DES).
PAT
Port Address Translation (PAT) is a specific version of NAT that uses a single public
IP address to represent multiple private IP addresses. Its operation is discussed
below the section “Logical and Physical Addressing,” earlier in this chapter.
POP
Post Office Protocol (POP) is an Application layer email retrieval protocol. POP3 is
the latest version. It allows for downloading messages only and does not allow the
additional functionality provided by IMAP4. POP3 uses port 110. A version that
runs over SSL is also available; it uses port 995.
CIFS/SMB
Common Internet File System (CIFS)/Server Message Block (SMB) is a file-sharing
protocol. It uses TCP port 445.
SMTP
POP and IMAP are client email protocols used for retrieving email, but when email
servers are talking to each other, they use a protocol called Simple Mail Transfer
Protocol (SMTP), a standard Application layer protocol. This is also the protocol
used by clients to send email. SMTP uses port 25, and when it is run over SSL, it
uses port 465.
Enhanced SMTP (ESMTP) allows larger field sizes and extension of existing SMTP
commands.
SNMP
Simple Network Management Protocol (SNMP) is an Application layer protocol
that is used to retrieve information from network devices and to send configuration
changes to those devices. SNMP uses TCP port 162 and UDP ports 161 and 162.
SNMP devices are organized into communities, and the community name must be
known to either access information from or send a change to a device. It also can
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
428 CISSP Cert Guide
be used with a password. SNMP versions 1 and 2 are susceptible to packet sniffing,
and all versions are susceptible to brute-force attacks on the community strings and
password used. The defaults of community string names, which are widely known,
are often left in place. The latest version, SNMPv3, is the most secure.
SSL/TLS
Secure Sockets Layer (SSL) is a Transport layer protocol that provides encryption,
server and client authentication, and message integrity. Netscape developed SSL
to transmit private documents over the Internet. Although SSL implements either
40-bit (SSL 2.0) or 128-bit encryption (SSL 3.0), the 40-bit version is susceptible to
attacks because of its limited key size. SSL allows an application to have encrypted,
authenticated communication across a network. SSL has been deprecated and
replaced by TLS.
Transport Layer Security (TLS) is an open-community standard that provides many
of the same services as SSL. TLS 1.0 is based on SSL 3.0 but is more extensible.
The main goal of TLS is privacy and data integrity between two communicating
applications.
TLS 1.1 was an update to TLS 1.0 that provides protection against cipher-block
chaining (CBC) attacks. TLS 1.2 used MDS-SHA-1 with pseudorandom functions
(PRFs).
TLS 1.2 provides access to advanced cipher suites that support elliptic curve
cryptography (ECC) and block cipher modes. TLS 1.3 is the latest version. TLS 1.3
is enabled on Windows 10 and Windows 11. TLS 1.3 removes support for weaker
elliptic curves. TLS 1.3 is also faster and provides better encryption.
SSL and TLS are most commonly used when data needs to be encrypted while it
is being transmitted (in transit) over a medium from one system to another. When
other protocols include SSL/TLS in their implementation to improve security,
the protocols usually operate over a different port than the standard, nonsecured
version.
Multilayer Protocols
Many protocols, such as FTP and DNS, operate on a single layer of the OSI model.
However, many protocols operate at multiple layers of the OSI model. The best
example is TCP/IP, the networking protocol used on the Internet and on the vast
majority of LANs.
Many of the multilayer protocols were designed as part of proprietary protocols and
have evolved into what they are today. Today multilayer protocols are being used
to control critical infrastructure components, such as power grids and industrial
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 429
control systems (ICSs). Because these critical infrastructure components were not
originally designed for deployment over the Internet, unique challenges have arisen.
It is virtually impossible to deploy antivirus software on an ICS. Many ICSs were
installed without any thought to the physical security of the control system itself.
Unlike in IT systems, delays in ICSs are unacceptable because of the time critical-
ity of responding to emergencies. ICSs often have a lifetime much longer than the
average IT system. Availability of ICSs is usually 24/7/365, whereas an IT system
can tolerate short periods of unavailability in some industries and areas. When you
consider this and other issues, you can easily see why an organization should fully
consider the security implications when deploying an ICS that uses multilayer pro-
tocols. Deploying a vendor-developed protocol is not always the answer because the
protocols developed by the vendor are concerned only with uptime and device con-
trol, without any consideration of security.
Distributed Network Protocol version 3 (DNP3) is a multilayer protocol that is used
between components in process automation systems in electric and water compa-
nies. It was developed for communications between various types of data acquisition
and control equipment. It plays a crucial role in supervisory control and data acqui-
sition (SCADA) systems.
Converged Protocols
IP convergence involves carrying different types of traffic over one network. The
traffic includes voice, video, data, and images. It is based on the Internet Protocol.
When IP convergence is deployed, a single platform is used for all types of traffic,
involving all devices. It supports multimedia applications. Management and flexibil-
ity of the network are greatly improved because there is uniform setup and the abil-
ity to mold communication patterns. QoS can be deployed to allow administrators
to ensure that certain services have a higher priority than others.
Implementation of IP convergence includes FCoE, MPLS, VoIP, and Internet Small
Computer System Interface (iSCSI).
FCoE
Fibre Channel over Ethernet (FCoE) is a protocol that encapsulates Fibre Channel
frames over Ethernet networks, thereby allowing Fibre Channel to use 10-Gigabit
Ethernet networks or higher while preserving the Fibre Channel protocol. FCoE
uses the following ports to communicate among the FCoE devices:
■ Network (N) port: Connects a node to a Fibre Channel switch from the
node. Also referred to as a node port.
■ Fabric (F) port: Connects the Fibre Channel fabric to a node from the switch.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
430 CISSP Cert Guide
■ Loop (L) port: Connects a node to a Fibre Channel loop from the node.
■ Network + loop (NL) port: Connects to both loops and switches from the
node.
■ Fabric + loop (FL) port: Connects to both loops and switches from the
switch.
■ Extender (E) port: Cascades Fibre Channel switches together, thereby
extending the fabric.
■ General (G) port: Emulates other port types.
■ External (EX) port: Connects a Fibre Channel router and a Fibre Channel
switch. The EX port is on the router side, and the E port is on the switch side.
■ Trunking E (TE) port: Allows multiple virtual SAN (VSAN) routing and
provides standard E port functions.
FCoE has a number of benefits, including the following: Technicians need to wire
the server only once, fewer cables and adapters are needed, the I/O uses software
provisioning, interoperation with existing Fibre Channel SANs is possible, and gate-
ways are not used.
MPLS
Multiprotocol Label Switching (MPLS) routes data from one node to the next based
on short path labels rather than long network addresses, avoiding complex lookups
in a routing table. It includes the ability to control how and where traffic is routed,
delivers data transport services across the same network, and improves network
resiliency through MPLS Fast Reroute.
MPLS uses Label Switched Path (LSP), which is a unidirectional tunnel between
routers. An MPLS network may use the following roles:
■ Label edge router (LER): The first router that encapsulates a packet inside
LSP and makes the path selection. This is commonly referred to as the ingress
node.
■ Label switching router (LSR): A router that performs MPLS switching
somewhere along the LSP. This is also referred to as the transit node.
■ Egress node: The last router at the end of an LSP.
When an LSP is terminated, an implicit or explicit null can be used. Implicit nulls
remove the label when it reaches the next-to-last hop. Explicit nulls keep the label to
the last router.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 431
When MPLS is deployed as part of a VPN, the following router roles can be used:
■ Provider (P) router: A backbone router that performs only label switching.
■ Provider edge (PE) router: A router that faces the customer and performs
label popping and imposition. It can terminate multiple services.
■ Customer edge (CE) router: The customer router with which the PE router
communicates.
MPLS uses two command routing protocols: Label Distribution Protocol (LDP)
and ReSerVation Protocol with Traffic Engineering (RSVP-TE). RSVP-TE is much
more complex than LDP. LDP is used more on MPLS VPN, whereas RSVP-TE is
required for traffic engineering.
VoIP
Voice over Internet Protocol (VoIP) includes technologies that deliver voice com-
munications and multimedia sessions over IP networks, such as the Internet. VoIP
is also referred to as IP telephony, Internet telephony, broadband telephony, and
broadband phone service. VoIP can be implemented using a variety of protocols,
including H.323, Session Initiation Protocol (SIP), Media Gateway Control Proto-
col (MGCP), and Real-time Transport Protocol (RTP). NIST SP 800-58 contains
detailed information on the implementation of VoIP.
iSCSI
Internet Small Computer System Interface (iSCSI) allows SCSI commands to be
sent end-to-end over LANs, WANs, or the Internet over TCP. It provides storage
consolidation and disaster recovery. iSCSI has a number of benefits, including the
following: Technicians need to wire the server only once, fewer cables and adapters
are needed, a new operational model is used, and there is broad industry support,
including vendor iSCSI drivers, gateways, and native iSCSI storage arrays.
Wireless Networks
Perhaps the area of the network that keeps more network and system administra-
tors awake at night is the wireless portion of the network. In the early days of 802.11
WLAN deployments, many administrators simply chose not to implement wireless
for fear of the security holes it created. However, it became apparent that not only
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
432 CISSP Cert Guide
did users demand this implementation, but in some cases users were bringing their
own APs (access points) to work and hooking them up, and suddenly there was a
wireless network!
Today WLAN security has evolved to the point that security is no longer a valid
reason to avoid wireless. The following sections offer a look at the protocols used in
wireless, the methods used to convert the data into radio waves, the various topolo-
gies in which WLANs can be deployed, and security measures that should be taken.
FHSS, DSSS, OFDM, VOFDM, FDMA, TDMA, CDMA, OFDMA, and GSM
When data leaves an Ethernet NIC and is sent out on the network, the ones and
zeros that constitute the data are represented with different electric voltages. In
wireless, this information must be represented in radio waves. A number of different
methods exist for performing this operation, which is called modulation. You should
also understand some additional terms to talk intelligently about wireless. We define
a number of terms to provide a background for the discussion found in the following
sections. In particular, we cover techniques used in WLANs and techniques used in
cellular networking.
802.11 Techniques
The following techniques are used in WLANs:
■ Frequency-hopping spread spectrum (FHSS): FHSS and DSSS were a part of
the original 802.11 standard. FHSS is unique in that it changes frequencies or
channels every few seconds in a set pattern that both transmitter and receiver
know. This is not a security measure because the patterns are well known,
although it does make capturing the traffic difficult. It helps avoid interference
by only occasionally using a frequency where the interference is present. Later
amendments to the 802.11 standard did not include this technology. It can
attain up to 2 Mbps.
■ Direct-sequence spread spectrum (DSSS): DSSS and FHSS were a part of the
original 802.11 standard. DSSS is the modulation technique used in 802.11b.
The modulation technique used in wireless had a huge impact on throughput.
In the case of DSSS, it spreads the transmission across the spectrum at the
same time as opposed to hopping from one to another as in FHSS. This allows
it to attain up to 11 Mbps.
■ Orthogonal frequency-division multiplexing (OFDM): OFDM is a more
advanced technique of modulation where a large number of closely spaced
orthogonal subcarrier signals are used to carry the data on several parallel
data streams. It is used in 802.11a, 802.11ac, 802.11ax, 802.11g, and 802.11n.
It makes speed up to 54 Mbps possible. Wi-Fi 6 routers use OFDM. OFDM
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 433
enables an 802.11ax router to send data to and receive data from multiple
devices simultaneously by splitting a transmission channel into several
transmission subchannels.
■ Vectored orthogonal frequency-division multiplexing (VOFDM):
Developed by Cisco, VOFDM uses special diversity to increase noise,
interference, and multipath tolerance.
5G
The introduction of 5G will change lives dramatically, especially for those who live
and work in major cities. 5G will create smart cities, which will be heavily dependent
on IoT, a reality. 5G is the fifth generation of cellular technologies. The 1G cel-
lular service allowed people to talk, and then 2G provided the ability to text (SMS).
With the advent of 3G, people could access the Web on mobile devices. Then came
4G LTE, which increased data speed by about 10-fold. Speed has increased expo-
nentially with the introduction of 5G. Latency is the delay between sending and
receiving data. With 5G, latency has been dramatically reduced. Although 5G-ready
mobile devices are prohibitively expensive for many, 5G will certainly grow in popu-
larity when the carriers make 5G more pervasive.
5G is not just about improving cellular communications. It will also impact many
other technologies. IoT devices will benefit greatly from the change. 5G will be
integrated into cars, thereby making self-driving vehicles more of a reality. 5G
will be important for industrial robotics, where robots will communicate with one
another and drones will be able to coordinate their activities in groups. The technol-
ogy still has obstacles that need to be overcome, such as walls and bad weather. 5G
uses millimeter waves, and therefore, a new infrastructure—with new transmitters
in closer proximity—will need to be built. Thus, major cities will see 5G well before
suburban and rural areas. Hundreds of thousands of new towers will need to be
constructed.
The costs of implementing 5G are huge, and therefore, it is possible that there will
be changes to the structure of the mobile network operators (MNOs). The path
that traffic takes in a network will change with 5G. Two key concepts associated
with 5G are MEC and CUPS. Multi-access Edge Computing (MEC) is a network-
ing protocol, whereby mobile users can establish direct connections, using available
network infrastructure, at the edge of the network, rather than being routed through
the mobile network operator’s core network. Control and User Plane Separation
(CUPS) is a 3GPP specification that facilitates MEC, whereby control functions,
like establishing a connection with another device, take a different route through a
network. The goal of MEC and CUPS is to create more bandwidth for users and
significantly reduce latency by facilitating connections at the network edge, while
moving away from a centralized network. MEC will also benefit virtual reality gam-
ing and self-driving cars.
Another element of 5G is D2D. Device-to-device (D2D) communication is technol-
ogy that enables user equipment (UE) to communicate with one another, with or
without a network infrastructure. The UE can be a mobile device or can be vehicle-
to-vehicle communication. The primary benefit of D2D communication is ultra-low
latency. Another benefit of D2D is the reduction of network capacity issues, thereby
enabling devices to communicate with each other without the need to connect with
a network.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 435
Satellites
Satellites can be used to provide TV service—and have for some time—but now
they can also be used to deliver Internet access to homes and businesses. The con-
nection is two-way rather than one-way as is done with TV service. This is typi-
cally done using microwave technology. In most cases, the downloads come from
the satellite signals, whereas the uploads occur through a ground line. Microwave
technology can also be used for terrestrial transmission, which means ground station
to ground station rather than satellite to ground. Satellite connections are very slow
but are useful in remote locations where no other solution is available.
WLAN Structure
Before we can discuss 802.11 wireless, which has come to be known as WLAN,
we need to discuss the components and the structure of a WLAN. The following
sections cover basic terms and concepts.
Access Point
An access point (AP) is a wireless transmitter and receiver that hooks into the wired
portion of the network and provides an access point to this network for wireless
devices. It can also be referred to as a wireless access point (WAP). In some cases,
they are simply wireless switches, and in other cases, they are also routers. Early
APs were devices with all the functionality built into each device, but increasingly
these “fat” or intelligent APs are being replaced with “thin” APs that are really only
antennas that hook back into a central system called a controller.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
436 CISSP Cert Guide
WLAN Standards
Since its original invention, the 802.11 wireless standard has been amended a num-
ber of times to add features and functionality. Here, we discuss these amendments,
which are sometimes referred to as standards although they really are amendments
to the original standard.
802.11
The original 802.11 standard specified the use of either FHSS or DSSS and
supported operations in the 2.4 GHz frequency range at speeds of 1 Mbps and
2 Mbps.
802.11a
The first amendment to the standard was 802.11a. This standard called for the use
of orthogonal frequency-division multiplexing (OFDM). Because that would require
hardware upgrades to existing equipment, this standard saw limited adoption for
some time. It operates in a different frequency than 802.11 (5 GHz) and by using
OFDM supports speeds up to 54 Mbps.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 437
802.11b
The 802.11b amendment dropped support for FHSS and enabled an increase of
speed to 11 Mbps. It was widely adopted because it both operates on the same
frequency as 802.11 and is backward compatible with it and can coexist in the same
WLAN.
802.11g
The 802.11g amendment added support for OFDM, which made it capable of
54 Mbps. It also operates in the 2.4 GHz frequency, so it is backward compatible
with both 802.11 and 802.11b. Although it is just as fast as 802.11a, one reason many
switched to 802.11a over 802.11g is that the 5 GHz band is much less crowded than
the 2.4 GHz band.
802.11n (Wi-Fi 4)
The 802.11n standard uses several newer concepts to achieve up to 650 Mbps. It
does this using channels that are 40 MHz wide, using multiple antennas that allow
for up to four spatial streams at a time (a feature called multiple input, multiple out-
put [MIMO]). It can be used in both the 2.4 GHz and 5.0 GHz bands but performs
best in a pure 5.0 GHz network because in that case it does not need to implement
mechanisms that allow it to coexist with 802.11b and 802.11g devices. These mecha-
nisms slow the performance. This standard was retroactively named Wi-Fi 4.
802.11ac (Wi-Fi 5)
The 802.11ac standard, like the 802.11a standard, operates on the 5 GHz frequency
(Wi-Fi 5). The most important feature of this standard is its multistation WLAN
throughput of at least 1 Gbps and single-link throughput of 500 Mbps. It provides
this by implementing multi-user multiple-input, multiple-output (MU MIMO)
technologies in which the wireless access points have multiple antennae. The 802.11ac
standard is faster and more scalable than 802.11n. Advantages of 802.11ac include
■ Increased speed
■ Higher speeds over longer distances
■ Less interference
■ Increased number of clients supported by an access point
■ Extended battery life
■ Extended Wi-Fi coverage
■ Reduction of dead spots
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
438 CISSP Cert Guide
802.11ax (Wi-Fi 6)
Wi-Fi 6 (802.11ax) is a standard developed by the Wi-Fi Alliance. Because so many
devices are Internet-enabled today, we need to ensure that Wi-Fi can handle all of
these additional devices. It is not just the addition of more devices that needs to be
considered but also the increase in data with advances in technology. For example,
4K video has double the bit rate of high definition (HD) video. Wi-Fi 6 was a
much-needed upgrade to handle the billions of new mobile and IoT devices—
especially on public networks, where a lot of devices are serviced on a single
network.
Wi-Fi 6 operates on 2.4 GHz or 5 GHz and has a theoretical maximum throughput
of 10.53 Gbps, but in reality there is about a 30 percent increase in speed.
Quadrature amplitude modulation (QAM) is a modulation scheme in digital
telecommunication systems, like Wi-Fi. Data is transmitted wirelessly by modulat-
ing radio waves. Wi-Fi 6 is 1024-QAM and can transmit 10 bits at a time, which is
2 bits more than Wi-Fi 5. Thus, QAM increases the performance associated with
Wi-Fi 6 by pushing out more bits in each transmission.
Wi-Fi 6 routers have a label with “Wi-Fi 6 Certified” on them. Wi-Fi 6 routers can
deliver up to 12 simultaneous Wi-Fi streams, which reduces latency. Wi-Fi 6 routers
use orthogonal frequency-division multiple access (OFDMA) technology. OFDMA
enables an 802.11ax router to send and receive data to multiple devices simultane-
ously by splitting a transmission channel into a number of transmission subchannels.
802.11be (Wi-Fi 7)
Wi-Fi 7 (802.11be) will have throughput greater than 30 Gbps and have low
latency. This protocol will support Extremely High Throughput (EHT) devices,
while targeting newer technologies, such as augmented reality (AR), virtual reality,
and cloud computing. Wi-Fi 7 will work on three frequency bands—2.4 GHz,
5 GHz, and 6 GHz—to take advantage of an additional 1200 MHz of spectrum in
countries where it is allowed. Wi-Fi 7 will increase the QAM modulation order to
4096 QAM to reach the highest data rate.
Bluetooth
Bluetooth is developed and maintained by the Bluetooth Special Interest Group
(Bluetooth.com). This wireless technology is used to create personal-area networks
(PANs); these are simply short-range connections that are between devices and
peripherals, such as headphones. Bluetooth versions 1.0 and 2.0 operate in the
2.4 GHz frequency at speeds of 1 Mbps to 3 Mbps at a distance of up to 10 meters.
Bluetooth 3.0 and 4.0 can operate at speeds of 24 Mbps. In January 2020,
Bluetooth 5.2 was announced. This version introduced a feature called Isochronous
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 439
Infrared
Infrared is a short-distance wireless process that uses light rather than radio waves—
in this case, infrared light. It is used for short connections between devices that both
have an infrared port. It operates up to 5 meters at speeds up to 4 Mbps and requires
a direct line of sight between the devices. There is one infrared mode or protocol
that can introduce security issues. The Infrared Transfer Picture (IrTran-P) protocol
is used in digital cameras and other digital image capture devices. All incoming files
sent over IrTran-P are automatically accepted. Because incoming files might contain
harmful programs, users should ensure that the files originate from a trustworthy
source.
Zigbee
Zigbee is an IEEE 802.15.4-based specification that is used to create personal-area
networks with small, low-power digital radios, such as for home automation, medical
device data collection, and other low-power, low-bandwidth needs. Zigbee is capable
of up to 250 Kbps and operates in the 2.4 GHz band.
WLAN Security
To safely implement 802.11 wireless technologies, you must understand all the
methods used to secure a WLAN. Here, we discuss the most important measures,
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
440 CISSP Cert Guide
including some measures that, although they are often referred to as security
measures, provide no real security whatsoever.
WEP
Wired Equivalent Privacy (WEP) was the first security measure used with 802.11.
It was specified as the algorithm in the original specification. It can be used to both
authenticate a device and encrypt the information between the AP and the device.
The problem with WEP is that it implements the RC4 encryption algorithm in a
way that allows hackers to crack the encryption. It also was found that the mecha-
nism designed to guarantee the integrity of data (that the data has not changed) was
inadequate and that it was possible for the data to be changed and for these changes
to go undetected.
When WEP is implemented with a secret key or password that is configured on the
AP, any station will need that password to connect. Above and beyond the problem
with the implementation of the RC4 algorithm, it is never good security for all
devices to share the same password.
WPA
To address the widespread concern with the vulnerabilities of WEP, the Wi-Fi
Alliance, a group of manufacturers that promotes interoperability, created an
alternative mechanism called Wi-Fi Protected Access (WPA) that was designed to
improve on WEP. There are four types of WPA, but first let’s talk about how the
original version improves over WEP.
First, WPA uses the Temporal Key Integrity Protocol (TKIP) for encryption, which
generates a new key for each packet. Second, the integrity check used with WEP can
detect any changes to the data. WPA uses a message integrity check algorithm called
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 441
Michael to verify the integrity of the packets. There are two versions of
WPA (covered in the section “Personal Versus Enterprise”).
Some legacy devices might support only WPA. You should always check with a
device’s manufacturer to find out whether a security patch has been released that
allows for WPA2 support.
WPA2
WPA2 is an improvement over WPA. WPA2 uses Counter Cipher Mode with Block
Chaining Message Authentication Code Protocol (CCMP) based on Advanced
Encryption Standard (AES), rather than TKIP. AES is a much stronger method and
is required for Federal Information Processing Standards (FIPS)-compliant trans-
missions. There are also two versions of WPA2 (covered in the next section).
WPA3
WPA3 was introduced in 2018 to address security deficiencies associated with
WPA2. One of the security enhancements with WPA3 was to reduce the risks
associated with brute-force attacks. Previously, WEP and WPA/WPA2 allowed for
continuous password attempts. This protocol also facilitates encryption on a per user
basis so that the encryption protocol varies for each connection. WPA3 uses 128-bit
encryption for WPA3 personal and 192-bit encryption for WPA3 enterprise.
Like previous protocols, WPA3 has been hacked. WPA3 relies on a more secure
handshake than its predecessors, a handshake protocol that is known as Dragonfly.
Dragonfly protects Wi-Fi networks against offline dictionary attacks.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
442 CISSP Cert Guide
802.1X
802.1X is a port access protocol that protects networks via authentication. It is used
widely in wireless environments. When 802.1X authentication is used, the access
point opens a virtual port for communication. If authorization is unsuccessful, the
virtual port is unavailable, and communication is blocked.
There are three basic entities during 802.1X authentication:
■ Supplicant: A software client running on the Wi-Fi workstation
■ Authenticator: The wireless access point
■ Authentication server (AS): A server that contains an authentication
database, usually a RADIUS server
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 443
SSID Broadcast
Issues related to the SSID broadcast are covered in the section “WLAN Structure,”
earlier in this chapter.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
444 CISSP Cert Guide
MAC Filter
Another commonly discussed security measure is to create a list of allowed MAC
addresses on the AP. When this is done, only the devices with MAC addresses on the
list can make a connection to the AP. Although, on the surface, this approach might
seem like a good security measure, in fact hackers can easily use a sniffer to learn the
MAC addresses of devices that have successfully authenticated. Then, by changing
the MAC address on their devices to one that is on the list, they can gain entry.
MAC filters can also be configured to deny access to certain devices. The limiting
factor of this configuration is that only the devices with the denied MAC addresses
are specifically denied access. All other connections will be allowed.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 445
When deploying a new WAP, an administrator should keep the following guidelines
in mind:
■ Deploy in a central location to all the devices that need wireless access.
■ Avoid deploying a WAP near a solid obstruction.
■ Avoid deploying a WAP near a reflective or metal surface.
■ Avoid deploying a WAP near electrical equipment.
■ Adjust the WAP’s power level to decrease the coverage radius. (Why is this
important? To avoid attackers recognizing the network, attackers creating a
possible rogue AP, and so on.)
Antenna Types
Wireless antennas in WAPs come in two main types: omnidirectional and direc-
tional. Omnidirectional antennas can send data in all directions that are perpendicu-
lar to the line of the antenna. Directional antennas can send data in one primary
direction. Yagi, parabolic, and backfire antennas are all directional antennas.
Administrators need to understand the type of antenna included in a WAP to ensure
that it is deployed in such a manner as to optimize the signal and coverage radius.
Communications Cryptography
Encryption can provide different protection based on which level of communication
is being used. The two types of encryption communication levels are link encryption
and end-to-end encryption.
Link Encryption
Link encryption encrypts all the data that is transmitted over a link. In this type of
communication, the only portion of the packet that is not encrypted is the data-link
control information, which is needed to ensure that devices transmit the data prop-
erly. All the information is encrypted, with each router or other device decrypting its
header information so that routing can occur and then re-encrypting before sending
the information to the next device.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
446 CISSP Cert Guide
If the sending party needs to ensure that data security and privacy are maintained
over a public communication link, then link encryption should be used. This method
is often used to protect email communication or when banks or other institutions
that have confidential data must send that data over the Internet.
Link encryption protects against packet sniffers and other forms of eavesdropping
and occurs at the Data Link and Physical layers of the OSI model. Advantages of
link encryption include: All the data is encrypted, and no user interaction is needed
for it to be used. Disadvantages of link encryption include: Each device that the data
must be transmitted through must receive the key, key changes must be transmitted
to each device on the route, and packets are decrypted at each device.
End-to-End Encryption
End-to-end encryption encrypts less of the packet information than link encryption.
In end-to-end encryption, packet routing information, as well as packet headers and
addresses, are not encrypted. When there is no encryption for routing, headers, or
addresses, it allows potential hackers to intercept communications and obtain more
information through packet sniffing.
But end-to-end encryption has several advantages. A user usually initiates end-to-end
encryption, which allows the user to select exactly what gets encrypted and how. This
type of encryption affects the performance of each device along the route less than
link encryption because not every device has to perform encryption/decryption to
determine how to route the packet. An example of end-to-end encryption is IPsec.
Email Security
Email has become an integral part of almost everyone’s life, particularly as it relates
to their business communication. But many email implementations provide very
little security natively without the incorporation of encryption, digital signatures,
or keys. For example, email authenticity and confidentiality are provided by sign-
ing the message using the sender’s private key and encrypting the message with the
receiver’s public key.
In the following sections, we briefly discuss the PGP, MIME, and S/MIME email
standards that are popular in today’s world and also give a brief description of quan-
tum cryptography.
PGP
Pretty Good Privacy (PGP) provides email encryption over the Internet and uses
different encryption technologies based on the needs of the organization. PGP can
provide confidentiality, integrity, and authenticity based on which encryption meth-
ods are used.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 447
PGP provides key management using RSA. PGP uses a web of trust to manage the
keys. By sharing public keys, users create this web of trust, instead of relying on a
certificate authority (CA). The public keys of all the users are stored on each user’s
computer in a key ring file. Within that file, each user is assigned a level of trust.
The users within the web vouch for each other. So if User 1 and User 2 have a trust
relationship and User 1 and User 3 have a trust relationship, User 1 can recom-
mend the other two users to each other. Users can choose the level of trust initially
assigned to a user but can change that level later if circumstances warrant a change.
But compromise of a user’s public key in the PGP system means that the user must
contact everyone with whom he has shared his key to ensure that this key is removed
from the key ring file.
PGP provides data encryption for confidentiality using the International Data
Encryption Algorithm (IDEA). However, other encryption algorithms can be used.
Implementing PGP with MD5 provides data integrity. Public certificates with PGP
provide authentication.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
448 CISSP Cert Guide
Quantum Cryptography
Quantum cryptography is a method of encryption that combines quantum physics
and cryptography and offers the possibility of factoring the products of large prime
numbers. Quantum cryptography provides strong encryption and eavesdropping
detection.
This type of encryption would be an excellent choice for any organization that
transmits top-secret data, including the U.S. government.
Internet Security
The World Wide Web is a collection of HTTP servers that manage websites and
their services. The Internet is a network that includes all the physical devices and
protocols over which web traffic is transmitted. The web browser that is used allows
users to read web pages via HTTP. Browsers can natively read many protocols. Any
protocols not natively supported by the web browser can only be read by installing a
plug-in or application viewer, thereby expanding the browser’s role.
In our discussion of Internet security, we cover the following topics:
■ Remote access
■ HTTP, HTTPS, and S-HTTP
■ SET
■ Cookies
■ SSH
■ IPsec
Remote Access
Remote access applications allow users to access an organization’s resources from a
remote connection. These remote connections can be direct dial-in connections but
more commonly use the Internet as the network over which the data is transmitted.
If an organization allows remote access to internal resources, the organization must
ensure that the data is protected using encryption when the data is being transmitted
between the remote access client and remote access server. Remote access servers
can require encrypted connections with remote access clients, which means that any
connection attempt that does not use encryption will be denied.
Remote Desktop Connection (RDC), also referred to as Remote Desktop, is Micro-
soft’s implementation that allows a user with proper identification to log in to a
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 449
remote computer. RDC operates using the Remote Desktop Protocol (RDP), which
operates over port 3389.
Cookies
Cookies are small text files that are stored on a user’s hard drive or memory. These
files usually store information about the user’s Internet browsing or shopping habits.
Because a website’s servers actually determine how cookies are used, malicious sites
can use cookies to discover a large amount of private information about a user.
Although the information retained in cookies on the hard drive usually does not
include any confidential information, attackers can still use it to obtain informa-
tion about a user that can help the attackers develop a better targeted attack. For
example, if the cookies reveal to an attacker that a user accesses a particular bank’s
public website on a daily basis, that action may indicate that a user has an account at
that bank, resulting in the attacker’s attempting a phishing attack using an email that
looks to come from the user’s legitimate bank.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
450 CISSP Cert Guide
SSH
Secure Shell (SSH) is an application and protocol that is used to remotely log in
to another computer using a secure tunnel. After the secure channel is established
after a session key is exchanged, all communication between the two computers is
encrypted over the secure channel. Although SSH and Telnet provide much of the
same functionalities, SSH is considered the secure alternative to Telnet. By default,
SSH uses port 22.
IPsec
IPsec is covered in detail earlier in this chapter.
Hardware
When securing network components, security professionals must consider all net-
work devices as part of a comprehensive security solution. The devices include patch
panels, multiplexers, hubs, switches and VLANs, routers, gateways, firewalls, proxy
servers, PBXs, honeypots, IDSs, and IPSs. An understanding of network routing,
including all routing protocols, is also vital. The following sections discuss all these
components.
Network Devices
Network devices operate at all layers of the OSI model. The layer at which they
operate reveals quite a bit of information about their level of intelligence and about
the type of information used by each device. Here, we cover common devices and
their respective roles in the overall picture.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 451
Patch Panel
Patch panels operate at the Physical layer (Layer 1) of the OSI model and simply
function as a central termination point for all the cables running through the walls
from wall outlets, which in turn are connected to computers with cables. The cables
running through the walls to the patch panel are permanently connected to the
panel. Short cables called patch cables are then used to connect each panel port to a
switch or hub. The main thing to be concerned with regarding patch panels is their
physical security. They should be placed in a locked room or closet.
Multiplexer
A multiplexer is a Physical layer (Layer 1 of OSI) device that combines several input
information signals into one output signal, which carries several communication
channels, by means of some multiplexing technique. Conversely, a demultiplexer
takes a single input signal that carries many channels and separates those over mul-
tiple output signals. The same physical medium can be shared in a number of differ-
ent ways: on the basis of frequencies used (frequency-division multiplexing or FDM)
or by using time slots (time-division multiplexing or TDM).
Telco Concentrator
A telco concentrator is a type of multiplexer that combines multiple channels onto
a single transmission medium so that all the individual channels are active simul-
taneously. For example, ISPs use concentrators to combine their multiple dial-up
connections into faster T-1 lines. Concentrators are also used in LANs to combine
network transmissions from a cluster of nodes. Telco concentrators are Layer 1
devices.
VPN Concentrator
A virtual private network (VPN) concentrator provides secure creation of VPN
connections and delivery of messages between VPN nodes. It is a type of router
device built specifically for creating and managing VPN communication infrastruc-
tures. It works at the Network layer (Layer 3).
Hub
A hub is a Physical layer (Layer 1) device that functions as a junction point for
devices in a star topology. It is considered a Physical layer device because it has no
intelligence. When a hub receives traffic, it broadcasts that traffic out of every port
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
452 CISSP Cert Guide
because it lacks intelligence to make any decisions about where the destination is
located or what is included in the traffic.
Although this broadcast results in more collisions and poor performance, from a
security standpoint, the problem is that the hub broadcasts all traffic to all ports. A
sniffer connected to any port will be able to sniff all traffic. The operation of a hub is
shown in Figure 4-30. When a switch is used, that is not the case (switches are
covered shortly).
1 2 3 4 5 6 7
Repeater
A repeater is a device that extends the distance of a network. Because the signal
strength is reduced over distance due to various electrical and physical interferences,
a repeater is recommended if you need to extend a network over a distance or area
that is more than the recommended maximum for the cable type.
Bridge
Bridges are Layer 2 devices that filter traffic between network segments based on
MAC addresses. Bridges prevent frames that go only to the local network from
being transmitted outside the local network. But they forward all network broad-
casts. They can connect LANs that use different media, such as connecting a twisted
pair (TP) network to a fiber optic network. To provide security, bridges should
implement some form of Link layer encryption.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 453
Switch
Switches are similar to bridges; they are intelligent and operate at Layer 2 of the
OSI model. They map to Layer 2 because they make switching decisions based on
MAC addresses, which reside at Layer 2. This process is called transparent bridging.
Figure 4-31 shows this process.
1 2 3 4
Source MAC A
Destination MAC D
Switches improve performance over hubs because they eliminate collisions. Each
switch port is in its own collision domain, whereas all ports of a hub are in the same
collision domain. From a security standpoint, switches are more secure in that a
sniffer connected to any single port will be able to capture only traffic destined for
or originating from that port.
Switches are more expensive, faster, and harder to implement than bridges and hubs.
Both bridges and switches provide better performance than hubs.
Some switches, however, can act as both routers and switches, and in that case they
are called Layer 3 switches because they route and switch.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
454 CISSP Cert Guide
a single data stream can be routed when the first packet arrives, and then the rest of
the packets in the stream can be fast switched, resulting in better performance.
Layer 4 switches go a step further by providing additional routing above Layer 3 by
using the port numbers found in the Transport layer header to make routing deci-
sions. The largest benefit of Layer 4 switching is the ability to prioritize data traffic
by application, which means QoS can be defined for each user.
VLANs
Enterprise-level switches can be used to create virtual local-area networks
(VLANs). These are logical subdivisions of a switch that segregate ports from one
another as if they were in different LANs. These VLANs can also span multiple
switches, meaning that devices connected to switches in different parts of a network
can be placed in the same VLAN regardless of physical location.
VLANs offer another way to add a layer of separation between sensitive devices and
the rest of the network. For example, if only two devices should be able to connect
to the HR server, the two devices and the HR server could be placed in a VLAN
separate from the other VLANs. Traffic between VLANs can occur only through
a router. Routers can be used to implement ACLs that control the traffic allowed
between VLANs.
Router
Routers operate at Layer 3 (Network layer) when we are discussing the routing
function in isolation. As previously discussed, certain devices can combine routing
functionality with switching and Layer 4 filtering. However, because routing uses
Layer 3 information (IP addresses) to make decisions, it is a Layer 3 function.
Routers use a routing table that tells the router in which direction to send traffic
destined for a particular network. Although routers can be configured with routes
to individual computers, typically they route toward networks, not individual
computers. When the packet arrives at a particular router that is directly connected
to the destination network, that router performs an ARP broadcast to learn the
MAC address of the computer and send the packets as frames at Layer 2.
Routers also perform an important security function because it is on routers that
ACLs are typically configured. ACLs are ordered sets of rules that control the traffic
that is permitted or denied the use of a path through the router. These access rules
can operate at Layer 3 of the OSI, where decisions on the basis of IP addresses are
made, or else at Layer 4, where only certain types of traffic are allowed. An ACL
typically references a port number of the service or application that is allowed or
denied.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 455
Boundary routers communicate with external hosts so that external hosts are able to
connect to internal hosts. Internal routers communicate with internal hosts so that
they can connect to other internal hosts. The security configuration of boundary
routers is more vital to help filter external traffic and to prevent unwanted commu-
nication from reaching the internal network.
Gateway
The term gateway doesn’t refer to a particular device but rather to any device that
performs some sort of translation or acts as a control point to entry and exit.
An example of a device performing as a gateway would be an email server. It
receives email from all types of email servers (Exchange, IBM Notes, Micro Focus
GroupWise) and performs any translation of formats that is necessary between these
different implementations.
Another example would be a network access server (NAS) that controls access to a
network. This device would be considered a gateway in that all traffic might need
to be authenticated before entry is allowed. This type of server might even examine
the computers themselves for the latest security patches and updates before entry is
allowed.
Firewalls
The network device that perhaps is most connected with the idea of security is the
firewall. Firewalls can be software programs that are installed over server operating
systems, or they can be appliances that have their own operating system. In either
case, their job is to inspect and control the type of traffic allowed.
Firewalls can be classified on the basis of their type and their architecture. They can
also be physical devices or exist in a virtualized environment. Here, we look at them
from all angles.
Firewall Types
When we discuss types of firewalls, we are focusing on the differences in the way
they operate. Some firewalls make a more thorough inspection of traffic than others.
Usually, there is trade-off in the performance of the firewall and the type of inspec-
tion that it performs. A deep inspection of the contents of each packet results in the
firewall having a detrimental effect on throughput, whereas a more cursory look at
each packet has somewhat less of an impact on performance. It is for this reason that
we should select what traffic to inspect wisely, keeping this trade-off in mind.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
456 CISSP Cert Guide
Packet filtering firewalls are the least detrimental to throughput because they
inspect only the header of the packet for allowed IP addresses or port numbers.
Although even performing this function will slow traffic, it involves looking only at
the beginning of the packet and making a quick decision to allow or block traffic.
Although packet filtering firewalls serve an important function, they may fail to
prevent many attack types. They cannot prevent IP spoofing, attacks that are spe-
cific to an application, attacks that depend on packet fragmentation, or attacks that
take advantage of the TCP handshake. More advanced inspection firewall types are
required to stop these attacks.
Stateful firewalls are those that are aware of the proper functioning of the TCP
handshake, keep track of the state of all connections with respect to this process, and
can recognize when packets are trying to enter the network that don’t make sense in
the context of the TCP handshake. We discussed how the TCP handshake occurs in
the “Transport Layer” sections, earlier in this chapter.
To review that process, a packet that has both the SYN flag and the ACK flag set
should never arrive at a firewall for delivery unless it is part of an existing handshake
process, and it should be in response to a packet sent from inside the network with
the SYN flag set. This is the type of packet that the stateful firewall would disallow.
It also can recognize other attack types that attempt to misuse this process. It does
this by maintaining a state table about all current connections and the status of each
connection process. This information allows it to recognize any traffic that doesn’t
make sense with the current state of the connection. Of course, maintaining this
table and referencing the table cause this firewall type to have more effect on perfor-
mance than a packet filtering firewall.
Proxy firewalls actually stand between each connection from the outside to the
inside and make the connection on behalf of the endpoints. Therefore, there is no
direct connection. The proxy firewall acts as a relay between the two endpoints, as
displayed in Figure 4-32. Proxy firewalls can operate at two different layers of the
OSI model. Both are discussed shortly.
Internet
Proxy Firewall
Server
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 457
Circuit-level proxies operate at the Session layer (Layer 5) of the OSI model. They
make decisions based on the protocol header and Session layer information. Because
they do not do deep packet inspection (at Layer 7, or the Application layer, of the
OSI model), they are considered application-independent and can be used for wide
ranges of Layer 7 protocol types.
A Socket Secure (SOCKS) firewall is an example of a circuit-level firewall. It
requires a SOCKS client on the computers. Many vendors have integrated their
software with SOCKS to make using this type of firewall easier. SOCKS routes net-
work packets through a proxy server. SOCKS v5 added authentication to the pro-
cess. A SOCKS firewall works at the Session layer (Layer 5).
Application-level proxies perform deep packet inspection. This type of firewall
understands the details of the communication process at Layer 7 for the application
of interest. An application-level firewall maintains a different proxy function for
each protocol. For example, for HTTP the proxy will be able to read and filter traf-
fic based on specific HTTP commands. Operating at this layer requires each packet
to be completely opened and closed, making this firewall the most impactful on
performance.
Dynamic packet filtering, rather than describing a different type of firewall,
describes functionality that a firewall might or might not possess. When internal
computers attempt to establish a session with a remote computer, it places both a
source and destination port number in the packet. For example, if the computer is
making a request of a web server, because HTTP uses port 80, the destination port
will be 80.
The source computer selects the source port at random from the numbers avail-
able above the well-known port numbers, or above 1023. Because predicting what
that random number will be is impossible, creating a firewall rule that anticipates
and allows traffic back through the firewall on that random port is impossible. A
dynamic packet filtering firewall will keep track of that source port and dynamically
add a new access control rule to the list to allow return traffic to that port.
A kernel proxy firewall is an example of a fifth-generation firewall. It inspects the
packet at every layer of the OSI model but does not introduce the performance hit
that an Application layer firewall will because it does this at the kernel layer. It also
follows the proxy model in that it stands between the two systems and creates con-
nections on their behalf.
Unified threat management (UTM) provides multiple layers of security, and its
functionality includes content filtering, web filtering, and antivirus (see Figure 4-33).
UTM devices are marketed as network security appliances, which can be network
hardware appliances, virtual appliances, or cloud services. Unified threat manage-
ment can include intrusion detection and intrusion prevention technologies. For
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
458 CISSP Cert Guide
example, they may detect an attack based on malware signatures or other anomalies.
UTM also supports virtual private network functionality. In terms of web filtering
for content, some UTMs can scan websites for security vulnerabilities that may be
harmful to the requesting computer.
UTM
IPS Anti-Spyware
Firewall Architecture
Firewall architecture refers to the way in which the firewall or firewalls are deployed
in the network to form a system of protection. Here, we look at the various ways
firewalls can be deployed and what the names of these various configurations are.
Although bastion hosts are included in this discussion regarding firewalls, a bastion
host might or might not be a firewall. The term actually refers to the position of
a device. If it is exposed directly to the Internet or to any untrusted network, it is
called a bastion host. All standard hardening procedures are especially important
for these exposed devices. Any unnecessary services should be stopped, all unneeded
ports should be closed, and all security patches must be up to date. These procedures
are said to reduce the attack surface. If a bastion host is deployed, it is the only host
on the internal network that is exposed to the Internet or untrusted networks. If the
bastion host is deployed separately from the firewall, it is placed outside the firewall
or on the public side of the demilitarized zone (DMZ). The bastion host filters all
incoming traffic. Firewalls and routers can be configured to be bastion hosts.
A dual-homed firewall, also referred to as a dual-homed host, has two network
interfaces via the installation of two NICs, each on a separate network. In many
cases, automatic routing between these interfaces is turned off. The firewall software
allows or denies traffic between the two interfaces based on the firewall rules config-
ured by the administrator. The danger of relying on a single dual-homed firewall is
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 459
that there is a single point of failure. If this device is compromised, the network can
also be compromised sooner or later. If it suffers a denial-of-service (DoS) attack, no
traffic will pass. Neither is a good situation.
In some cases, a firewall may be multihomed. One popular type is the three-legged
firewall. This configuration has three interfaces: one connected to the untrusted
network, one to the internal network, and one to the DMZ. A DMZ, also referred
to as a screened subnet, is a portion of the network where systems are placed that
will be accessed regularly from the untrusted network. These might be web servers
or an email server, for example. The firewall can then be configured to control the
traffic that flows between the three networks, being somewhat careful with traffic
destined for the DMZ and then treating traffic to the internal network with much
more suspicion.
Although the firewalls discussed thus far typically connect directly to the untrusted
network (at least one interface does), a screened host is a firewall that is between the
final router and the internal network. When traffic comes into the router and is for-
warded to the firewall, it will be inspected before going into the internal network.
Taking this concept a step further is a screened subnet. In this case, two firewalls are
used, and traffic must be inspected at both firewalls to enter the internal network. It
is called a screened subnet because there will be a subnet between the two firewalls
that can act as a DMZ for resources from the outside world.
In the real world, the discussed approaches are mixed and matched to meet require-
ments, so you might find elements of all these architectural concepts being applied
to a specific situation.
Proxy Server
Proxy servers can be appliances, or they can be software that is installed on a server
operating system. These servers act like a proxy firewall in that they create the web
connection between systems on their behalf, but they can typically allow and disal-
low traffic on a more granular basis. For example, a proxy server might allow the
Sales group to go to certain websites while not allowing the Data Entry group access
to the same sites. The functionality of proxy servers can extend beyond HTTP to
other traffic types, such as FTP and others.
Proxy servers can provide an additional beneficial function called web caching. When
a proxy server is configured to provide web caching, it saves a copy of all web pages
that have been delivered to internal computers in a web cache. If any user requests
the same page later, the proxy server has a local copy and need not spend the time
and effort to retrieve it from the Internet. This function greatly improves web per-
formance for frequently requested pages.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
460 CISSP Cert Guide
PBX
A private branch exchange (PBX) is a private telephone switch that resides on the
customer premises. It has a direct connection to the telecommunication provider’s
switch. It performs call routing within the internal phone system. This is how a
company can have two “outside” lines but 50 internal phones. The call comes in on
one of the two outside lines, and the PBX routes it to the proper extension. Some-
times the system converts analog to digital, but not always.
The security considerations with these devices revolve around their default con-
figurations. They typically are configured with default administrator passwords that
should be changed, and they often contain backdoor connections that can be used by
vendor support personnel to connect in and help with problems. These backdoors
are usually well known and should be disabled until they are needed.
There are different types of PBX fraud. In one scenario, a hacker calls a number
in a company and gains access to an employee’s voicemail by successfully guessing
the user’s PIN. The fraudster then uses the call forwarding feature to forward calls
to a premium telephone number that the attacker has set up earlier. The fraudster
then continually calls that same number to rack up charges from calls forwarded to
a premium number. Because the company manages the PBX and not the telecom
provider, the company can be liable for tens of thousands in charges to the premium
number. PBX is a legacy term and today has been replaced by terms like VoIP (Voice
over Internet Protocol) instead.
Honeypot
Honeypots are systems that are configured to be attractive to hackers and lure them
into spending time attacking them while information is gathered about the attack. In
some cases, entire networks called honeynets are attractively configured for this pur-
pose. These types of approaches should be undertaken only by companies with the
skill to properly deploy and monitor them.
Care should be taken that the honeypots and honeynets do not provide direct con-
nections to any important systems and to prevent providing hackers with a jumping-
off point to other areas of the good network. The ultimate purpose of honeypot
systems is to divert hackers from more valuable resources and to gather as much
information about an attack as possible. The related term tarpit is a type of honey-
pot designed to provide a very slow connection to hackers so that the attack can be
analyzed.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 461
IDS
An intrusion detection system (IDS) is a system responsible for detecting
unauthorized access or attacks against systems and networks. It can verify, itemize,
and characterize threats from outside and inside the network. Most IDSs are pro-
grammed to react certain ways in specific situations. Event notifications and alerts
are crucial to an IDS. They inform administrators and security professionals when
and where attacks are detected.
The most common way to classify an IDS is based on its information source:
network-based or host-based.
A network-based IDS (NIDS) is the most common IDS and monitors network
traffic on a local network segment. To monitor traffic on the network segment, the
NIC must be operating in promiscuous mode. An NIDS can monitor only the
network traffic. It cannot monitor any internal activity that occurs within a system,
such as an attack against a system that is carried out by logging on to the system’s
local terminal. An NIDS is affected by a switched network because generally an
NIDS monitors only a single network segment.
A Network Node Intrusion Detection System (NNIDS) is used to monitor traffic
between a network and a host. One example of an NNIDS would be used for moni-
toring traffic connected to a VPN.
A host-based IDS (HIDS) monitors traffic on a single system. Its primary respon-
sibility is to protect the system on which it is installed. An HIDS uses information
from the operating system audit trails and system logs. The detection capabilities of
an HIDS are limited by how complete the audit logs and system logs are.
IDS implementations are further divided into the following categories:
■ Signature-based: This type of IDS analyzes traffic and compares it to attack
or state patterns, called signatures, that reside within the IDS database. It is
also referred to as a misuse-detection system. Although this type of IDS is
popular, it can only recognize attacks as compared with its database and is only
as effective as the signatures provided. Frequent updates are necessary. The
two main types of signature-based IDSs are
■ Pattern-matching: The IDS compares traffic to a database of attack
patterns. The IDS carries out specific steps when it detects traffic that
matches an attack pattern.
■ Stateful-matching: The IDS records the initial operating system state.
Any changes to the system state that specifically violate the defined rules
result in an alert or notification being sent.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
462 CISSP Cert Guide
An application-based IDS is a specialized IDS that analyzes transaction log files for
a single application. This type of IDS is usually provided as part of the application or
can be purchased as an add-on.
When implementing and managing IDSs, administrators must understand the dif-
ference between a false positive and a false negative. A false positive occurs when an
IDS identifies an activity as an attack but the activity is acceptable behavior. A false
negative occurs when the IDS does not identify malicious activity. Although a false
positive is a false alarm, a false negative is a dangerous state because the security
professional may not be aware that an attack already took place or is currently taking
place.
Tools that can complement an IDS include vulnerability analysis systems, honeypots,
and padded cells. As described earlier, honeypots are systems that are configured
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 463
with reduced security to entice attackers so that administrators can learn about
attack techniques. Padded cells are special hosts to which an attacker is transferred
during an attack.
IPS
An intrusion prevention system (IPS) is a system responsible for preventing attacks.
When an attack begins, an IPS takes actions to prevent and contain the attack. An
IPS can be network- or host-based, like an IDS. Although an IPS can be signature-
or anomaly-based, it can also use a rate-based metric that analyzes the volume of
traffic as well as the type of traffic.
In most cases, implementing an IPS is more costly than an IDS because of the added
security of preventing attacks versus simply detecting attacks. In addition, running
an IPS can cause greater performance load than running an IDS.
Mobile Devices
Mobile devices—including laptops, tablets, smartphones, e-readers, and wearable
technology devices—have quickly become the most widely used devices. An organiza-
tion should adopt a formal mobile device security policy and a bring-your-own-device
(BYOD) security policy if personal devices will be permitted. The organization may
also want to consider deploying a network access control (NAC) server to ensure that
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
464 CISSP Cert Guide
any devices that join the network meet minimum security requirements and quaran-
tine any devices that do not meet minimum security requirements.
NIST SP 800-124 Revision 1 provides guidelines for managing the security of
mobile devices in the enterprise. According to NIST SP 800-124 Rev. 1, organiza-
tions should implement the following guidelines to improve the security of their
mobile devices:
■ Organizations should have a mobile device security policy. It should define
which types of the organization’s resources may be accessed via mobile
devices, which types of mobile devices are permitted to access the organiza-
tion’s resources, the degree of access that various classes of mobile devices
may have—for example, organization-issued devices versus personally owned
(BYOD) devices—and how provisioning should be handled. It should also
cover how the organization’s centralized mobile device management serv-
ers are administered, how policies in those servers are updated, and all other
requirements for mobile device management technologies. The mobile device
security policy should be documented in the system security plan. To the
extent feasible and appropriate, the mobile device security policy should be
consistent with and complement security policy for nonmobile systems.
■ Organizations should develop system threat models for mobile devices and
the resources that are accessed through the mobile devices. Mobile devices
often need additional protection because their nature generally places them at
higher exposure to threats than other client devices (for example, desktop and
laptop devices used only within the organization’s facilities and on the orga-
nization’s networks). Before designing and deploying mobile device solutions,
organizations should develop system threat models. Threat modeling helps
organizations to identify security requirements and to design the mobile device
solution to incorporate the controls needed to meet the security requirements.
Threat modeling involves identifying resources of interest and the feasible
threats, vulnerabilities, and security controls related to these resources, then
quantifying the likelihood of successful attacks and their impacts, and finally
analyzing this information to determine where security controls need to be
improved or added.
■ Organizations deploying mobile devices should consider the merits of each
provided security service, determine which services are needed for their
environment, and then design and acquire one or more solutions that collec-
tively provide the necessary services. Most organizations do not need all of the
possible security services provided by mobile device solutions. Categories of
services to be considered include the following:
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 465
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
466 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 467
Data communication and storage restrictions for mobile device security include the
following:
■ Strongly encrypt data communications between the mobile device and the
organization.
■ Strongly encrypt stored data on both built-in storage and removable media
storage.
■ Wipe the device (to scrub its stored data) before reissuing it to another user,
retiring the device, and so on.
■ Remotely wipe the device (to scrub its stored data) if it is suspected that the
device has been lost, stolen, or otherwise fallen into untrusted hands and is at
risk of having its data recovered by an untrusted party.
■ A device often can also be configured to wipe itself after a certain number of
incorrect authentication attempts.
User and device authentication restrictions for mobile device security include the
following:
■ Require a device password/passcode and/or other authentication (e.g., token-
based authentication, network-based device authentication, domain authenti-
cation) before accessing the organization’s resources.
■ If device account lockout is enabled or the device password/passcode is
forgotten, an administrator can reset it remotely to restore access to the device.
■ Have the device automatically lock itself after it is idle for a period
(e.g., 5 minutes).
■ Under the direction of an administrator, remotely lock the device if it is
suspected that the device has been left in an unlocked state in an unsecured
location.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
468 CISSP Cert Guide
■ Restrict the permissions (e.g., camera access, location access) assigned to each
application.
■ Install, update, and remove applications. Safeguard the mechanisms used to
perform these actions.
■ Restrict the use of operating system and application synchronization services
(e.g., local device synchronization, remote synchronization services, and
websites).
■ Verify digital signatures on applications to ensure that only applications from
trusted entities are installed on the device and that code has not been modified.
■ Distribute the organization’s applications from a dedicated mobile application
store.
Network Routing
Routing occurs at Layer 3 of the OSI model, which is also the layer at which IP
operates and where the source and destination IP addresses are placed in the packet.
Routers are devices that transfer traffic between systems in different IP networks.
When computers are in different IP networks, they cannot communicate unless a
router is available to route the packets to the other networks.
Routers keep information about the paths to other networks in a routing table.
These tables can be populated in several ways. Administrators manually enter these
routes, or dynamic routing protocols allow the routers running the same protocol
to exchange routing tables and routing information. Manual configuration, also
called static routing, has the advantage of avoiding the additional traffic created by
dynamic routing protocols and allows for precise control of routing behavior, but it
requires manual intervention when link failures occur. Dynamic routing protocols
create traffic but are able to react to link outages and reroute traffic without manual
intervention.
From a security standpoint, routing protocols introduce the possibility that routing
update traffic might be captured, allowing hackers to gain valuable information
about the layout of the network. Moreover, Cisco devices (perhaps the most widely
used) also use a proprietary Layer 2 protocol, by default, called Cisco Discovery
Protocol (CDP) that they use to inform each other about their capabilities. If the
CDP packets are captured, additional information can be obtained that can be
helpful to mapping the network in advance of an attack.
In the following sections, we compare and contrast routing protocols.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 469
RIP
Routing Information Protocol (RIP) is a standards-based distance vector protocol
that has two versions: RIPv1 and RIPv2. It operates at Layer 3 (Network layer).
Both use hop count as a metric and share their entire routing tables every 30 seconds.
Although RIP is the simplest to configure, it has a maximum hop count of 15, so it is
useful only in very small networks. The biggest difference between the two versions
is that RIPv1 can only perform classful routing, whereas RIPv2 can route in a net-
work where CIDR has been implemented.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
470 CISSP Cert Guide
OSPF
Open Shortest Path First (OSPF) is a standards-based link state protocol. It uses
a metric called cost that is calculated based on many considerations. It operates at
Layer 3 (Network layer). OSPF makes much more sophisticated routing decisions
than a distance vector routing protocol such as RIP. To take full of advantage of
OSPF, a much deeper knowledge of routing and OSPF itself is required. It can scale
successfully to very large networks because it has no minimum hop count.
OSPFv2 allows routers to communicate with other routers regarding the routes
they know. Link state advertisements (LSAs) are used to communicate the routes
between the routers.
IGRP
Interior Gateway Routing Protocol (IGRP) is an obsolete classful Cisco-proprietary
routing protocol that is not likely used in the real world because of its inability to
operate in an environment where CIDR has been implemented. It has been replaced
with the classless version Enhanced IGRP (EIGRP), discussed next.
EIGRP
Enhanced IGRP (EIGRP) is a classless Cisco-proprietary routing protocol that is
considered a hybrid or advanced distance vector protocol. It exhibits some charac-
teristics of both link state and distance vector operations. It also has no limitations
on hop count and is much simpler to implement than OSPF. It does, however,
require that all routers be Cisco.
VRRP
When a router goes down, all hosts that use that router for routing will be unable to
send traffic to other networks. Virtual Router Redundancy Protocol (VRRP) is not
really a routing protocol but rather is used to provide multiple gateways to clients
for fault tolerance in the case of a router going down. All hosts in a network are set
with the IP address of the virtual router as their default gateway. Multiple physical
routers are mapped to this address, so there will be an available router even if one
goes down.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 471
IS-IS
Intermediate System to Intermediate System (IS-IS) is a complex interior routing
protocol that is based on OSI protocols rather than IP. It is a link state protocol. The
TCP/IP implementation is called Integrated IS-IS. OSPF has more functionality,
but IS-IS creates less traffic than OSPF and is much less widely implemented than
OSPF.
BGP
Border Gateway Protocol (BGP) is an exterior routing protocol considered to be a
path vector protocol. It routes between autonomous systems (ASs) or gateway hosts
and is used on the Internet. It has a rich set of attributes that administrators can
manipulate to control path selection and to control the exact way in which traffic
enters and exits the AS. However, it is one of the most complex to understand and
configure. BGP is an Application layer (Layer 7 of OSI) protocol.
Transmission Media
The transmission media used on a network is the cabling that is used to transmit
network traffic. Each of the different transmission media has a maximum speed,
maximum distance, different security issues, and different environment. In the fol-
lowing sections, we discuss the cabling, network topologies, network technologies,
and WAN technologies that are covered in the CISSP exam.
Cabling
Cabling resides at the physical layer of the OSI model and simply provides a
medium by which data can be transferred. The vast majority of data is transferred
across cables of various types, including coaxial, fiber optic, and twisted pair. Some
of these cables represent the data in terms of electrical voltages, whereas fiber cables
manipulate light to represent the data. Here, we discuss each type.
Cables can be compared to one another using several criteria. One of the criteria
that is important with networking is the cable’s susceptibility to attenuation. Attenu-
ation occurs when the signal meets resistance as it travels through the cable. This
weakens the signal, and at some point, the signal is no longer strong enough either
to reach the destination or read properly at the destination. For this reason, all
cables have a maximum length for a good signal strength. This is true regardless of
whether the cable is fiber optic or electrical.
Another important point of comparison between cable types is their data rate, which
describes how much data can be sent through the cable per second. This area has
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
472 CISSP Cert Guide
seen great improvement over the years, going from rates of 10 Mbps in a LAN to
1000 Mbps and even 10 Gbps in today’s networks (and even higher rates in data
centers).
Another consideration when selecting a cable type is the ease of installation. Some
cable types are easier than others to install, and fiber optic cabling requires a special
skill set to install, raising its price of installation.
Finally (and most importantly for this discussion) is the security of the cable. Cables
can leak or radiate information. Hackers can also tap into them if they have physical
access to the cables. Just as the cable types can vary in allowable length and capacity,
they can also vary in their susceptibility to these types of data losses.
Coaxial
One of the earliest cable types to be used for networking was coaxial, the same basic
type of cable that brought cable TV to millions of homes. Although coaxial cabling
is still used, due to its low capacity and the adoption of other cable types, its use is
almost obsolete now in LANs.
Coaxial cabling comes in two types or thicknesses. The thicker type, called Thicknet,
has the official name 10BASE-5. This naming system, used for other cable types as
well, imparts several facts about the cable. In the case of 10BASE-5, it means that it
is capable of transferring 10 Mbps and can go roughly 1,640 feet. Thicknet uses two
types of connectors: a vampire tap (named thusly because it has a spike that pierces
the cable) and N-connectors.
Thinnet, or 10BASE-2, also operates at 10 Mbps. When it was named, it was antici-
pated to be capable of running 200 feet, but this distance was later reduced to 185
feet. Both types are used in a bus topology (more on topologies in the section “Net-
work Topologies,” later in this chapter). Thinnet uses two types of connectors: BNC
connectors and T-connectors.
Coaxial has an outer cylindrical covering that surrounds either a solid core wire
(Thicknet) or a braided core (Thinnet). This type of cabling has been replaced over
time with more capable twisted pair and fiber optic cabling. Coaxial cabling can be
tapped, so physical access to this cabling should be restricted or prevented if possi-
ble. It should be out of sight if it is used. Figure 4-34 shows the structure of a coaxial
cable.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 473
Plastic Jacket
Dielectric Insulator
Metallic Shield
Center Core
Twisted Pair
The most common type of network cabling found today is called twisted pair
cabling. It has this name because inside the cable are four pairs of smaller wires that
are braided or twisted. This twisting is designed to eliminate a phenomenon called
crosstalk, which occurs when wires that are inside a cable interfere with one another.
The number of wire pairs that are used depends on the implementation. In some
implementations, only two pairs are used, and in others, all four wire pairs are used.
Figure 4-35 shows the structure of a twisted pair cable.
1 Conductor
Insulator
Cable Jacket
2
PAIRS
3
Twisted pair cabling comes in shielded (STP) and unshielded (UTP) versions. Noth-
ing is gained from the shielding except protection from radio frequency interfer-
ence (RFI) and electromagnetic interference (EMI). RFI is interference from radio
sources in the area, whereas EMI is interference from power lines. A common type
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
474 CISSP Cert Guide
of EMI is called common mode noise, which is interference that appears on both
signal leads (signal and circuit return) or the terminals of a measuring circuit and
ground. If neither EMI nor RFI is a problem, nothing is gained by using STP, and it
costs more.
The same naming system used with coaxial and fiber is used with twisted pair. The
following are the major types of twisted pair:
■ 10BASE-T: Operates at 10 Mbps
■ 100BASE-T: Also called Fast Ethernet; operates at 100 Mbps
■ 1000BASE-T: Also called Gigabit Ethernet; operates at 1000 Mbps
■ 10GBASE-T: Operates at 10 Gbps
Fiber Optic
Fiber optic cabling uses a source of light that shoots down an inner glass or plastic
core of the cable. This core is covered by cladding that causes light to be confined to
the core of the fiber. It is often used as the network backbone and may even be seen
in home Internet, phone, and cable TV implementations. Figure 4-36 shows the
structure of a fiber optic cable.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 475
Cladding
Outside
jacket
Core
Fiber optic cabling manipulates light such that it can be interpreted as binary data
ones and zeros. Because it is not electrically based, it is totally impervious to EMI,
RFI, and crosstalk. Moreover, although not impossible, tapping or eavesdropping on
a fiber cable is much more difficult. In most cases, attempting to tap into it results in
a failure of the cable, which then becomes quite apparent to all.
Fiber comes in single- and multimode formats. The single mode uses a single beam
of light provided by a laser, goes the farthest of the two, and is the most expensive.
Multimode uses several beams of light at the same time, uses LEDs, will not go as
far, and is less expensive. Either type goes much farther than electrical cabling in a
single run and also typically provides more capacity. Fiber cabling has its drawbacks,
however. It is the most expensive to purchase and the most expensive to install.
Table 4-9 shows some selected fiber specifications and their theoretical maximum
distances.
Network Topologies
Networks can be described by their logical topology (the data path used) and by
their physical topology (the way in which devices are connected to one another). In
most cases (but not all), the logical topology and the physical topology will be the
same. Next, we discuss both logical and physical network topologies.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
476 CISSP Cert Guide
Ring
A physical ring topology is one in which the devices are daisy-chained one to
another in a circle or ring. If the network is also a logical ring, the data circles the
ring from one device to another. Two technologies use this topology: FDDI and
Token Ring. Both of these technologies are discussed in detail in the section
“Network Technologies.” Figure 4-37 shows a typical ring topology.
One of the drawbacks of the ring topology is that if a break occurs in the line, all
systems will be affected because the ring will be broken. As described in the section
“Network Technologies,” an FDDI network addresses this issue with a double ring
for fault tolerance.
Bus
The bus topology was the earliest Ethernet topology used. In this topology, all
devices are connected to a single line that has two definitive endpoints. The bus
network does not loop back and form a ring. This topology is broadcast-based, which
can be a security issue in that a sniffer or protocol analyzer connected at any point in
the network bus will be capable of capturing all traffic. From a fault tolerance stand-
point, the bus topology suffers the same danger as a ring. If a break occurs anywhere
in the line, all devices are affected. Moreover, a requirement specific to this topology
is that each end of the bus must be terminated. This requirement prevents signals
from “bouncing” back on the line, causing collisions. (More on collisions later, but
collisions require the collided packets to be sent again, lowering overall throughput.)
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 477
If this termination is not done properly, the network will not function correctly.
Figure 4-38 shows a bus topology.
Backbone Cable
Terminator Terminator
Node
Star
The star topology is the most common in use today. In this topology, all devices are
connected to a central device (either a hub or a switch). One of the advantages of
this topology is that if a connection to any single device breaks, only that device is
affected and no others. The downside of this topology is that a single point of
failure (the hub or switch) exists. If the hub or switch fails, all devices are affected.
Figure 4-39 shows a star topology.
Switch
Mesh
Although the mesh topology is the most fault tolerant of any discussed thus far, it
is also the most expensive to deploy. In this topology, all devices are connected to
all other devices. This provides complete fault tolerance but also requires multiple
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
478 CISSP Cert Guide
interfaces and cables on each device. For that reason, it is deployed only in rare cir-
cumstances where such an expense is warranted. Figure 4-40 shows a mesh topology.
Hybrid
In many cases, an organization’s network is a combination of these network topolo-
gies, or a hybrid network. For example, one section might be a star that connects to
a bus network or a ring network. Figure 4-41 shows an example of a hybrid network.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 479
Network Technologies
Just as a network can be connected in various topologies, different technologies have
been implemented over the years that run over those topologies. These technologies
operate at Layer 2 of the OSI model, and their details of operation are specified in
various standards by the Institute of Electrical and Electronics Engineers (IEEE).
Some of these technologies are designed for LAN applications, whereas others are
meant to be used in a WAN. Next, we look at the main LAN technologies and some
of the processes that these technologies use to arbitrate access to the network.
Ethernet 802.3
The IEEE specified the details of Ethernet in the 802.3 standard. Prior to this
standardization, Ethernet existed in several earlier forms, the most common of
which was called Ethernet II or DIX Ethernet (DIX stands for the three companies
that collaborated on its creation, DEC, Intel, and Xerox).
As discussed in the section on the OSI model, the PDU created at Layer 2 is called
a frame. Because Ethernet is a Layer 2 protocol, the individual Ethernet packets are
referred to as frames. There are small differences in the frame structures of Ethernet
II and 802.3, although they are compatible in the same network. Figure 4-42 shows
a comparison of the two frames. The significant difference is that during the IEEE
standardization process, the Ethernet Type field was changed to a (data) length field
in the 802.3 standard. For purposes of identifying the data type, another field called
the 802.2 header was inserted to contain that information.
Ethernet
Destination Source
Preamble Type DATA FCS
Address Address
8 6 6 2 46-1500 4 4
IEEE 802.3
S Destination Source 802.2
Preamble O Length DATA FCS
F Address Address Header
7 1 6 6 2 46-1500 4
Field lengths are in bytes
Ethernet has been implemented on coaxial, fiber, and twisted pair wiring. Table 4-10
lists some of the more common Ethernet implementations.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
480 CISSP Cert Guide
NOTE Despite the fact that 1000BASE-T and 1000BASE-X are faster, 100BASE-
TX is called Fast Ethernet. Also, both 1000BASE-T and 1000BASE-X are usually
referred to as Gigabit Ethernet.
Ethernet calls for devices to share the medium on a frame-by-frame basis. It arbi-
trates access to the media using a process called Carrier Sense Multiple Access/
Collision Detection (CSMA/CD). This process is discussed in detail in the section
“CSMA/CD Versus CSMA/CA,” where it is contrasted with the method used in
802.11 wireless networks.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 481
Lobe MAU
1 2 3 4
1 4
2 3
B C
B C
FDDI
Another Layer 2 protocol that uses a ring topology is Fiber Distributed Data Inter-
face (FDDI). Unlike Token Ring, it is both a physical and a logical ring. It is actually
a double ring, each going in a different direction to provide fault tolerance. It also
is implemented with fiber cabling. In many cases, it is used for a network backbone
and is then connected to other network types, such as Ethernet, forming a hybrid
network. It is also used in metropolitan-area networks (MANs) because it can be
deployed up to 100 kilometers.
Figure 4-44 shows an example of an FDDI ring.
Primary Ring
Secondary
Ring
Contention Methods
Regardless of the Layer 2 protocol in use, some method must be used to arbitrate
the use of the shared media. Four basic processes have been employed to act as the
traffic cop, so to speak:
■ CSMA/CD
■ CSMA/CA
■ Token passing
■ Polling
In the following sections, we compare and contrast each and provide examples of
technologies that use each.
Collision Domains
A collision domain is any segment of the network where the possibility exists for
two or more devices’ signals to collide. In a bus topology, that would constitute the
entire network because the entire bus is a shared medium. In a star topology, the
scope of the collision domain or domains depends on the central connecting device.
Central connecting devices include hubs and switches. Hubs and switches are dis-
cussed in more detail in the section “Network Devices,” but here we need to discuss
their differences with respect to collision domains.
A hub is an unintelligent junction box into which all devices plug. All the ports in
the hub are in the same collision domain because when a hub receives a frame, the
hub broadcasts the frame out all ports. So logically, the network is still a bus.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 483
A star topology with a switch in the center does not operate this way. A switch has
the intelligence to record the MAC address of each device on every port. After all
the devices’ MAC addresses are recorded, the switch sends a frame only to the port
on which the destination device resides. Because each device’s traffic is then segre-
gated from any other device’s traffic, each device is considered to be in its own colli-
sion domain.
This segregation provided by switches has both performance and security ben-
efits. From a performance perspective, it greatly reduces the number of collisions,
thereby significantly increasing overall throughput in the network. From a security
standpoint, it means that a sniffer connected to a port in the switch will capture only
traffic destined for that port, not all traffic. Compare this security to a hub-centric
network. When a hub is in the center of a star network, a sniffer will capture all traf-
fic regardless of the port to which it is connected because all ports are in the same
collision domain.
In Figure 4-45, a switch has several devices and a hub connected to it with each
collision domain marked to show how the two devices create collision domains.
Note that each port on the switch is a collision domain, whereas the entire hub is a
single collision domain.
Collision Domain
Collision Domains
Hub
Switch
Collision Domain
Collision Domain
Collision
Domain
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
484 CISSP Cert Guide
CSMA/CD
In 802.3 networks, a mechanism called Carrier Sense Multiple Access/Collision
Detection (CSMA/CD) is used when a shared medium is in use to recover from
inevitable collisions. This process is a step-by-step mechanism that each station
follows every time it needs to send a single frame. The steps to the process are as
follows:
1. When a device needs to transmit, it checks the wire for existing traffic. This
process is called carrier sense.
2. If the wire is clear, the device transmits and continues to perform carrier sense.
3. If a collision is detected, both devices issue a jam signal to all the other devices,
which indicates to them to not transmit. Then both devices increment a
retransmission counter. This is a cumulative total of the number of times this
frame has been transmitted and a collision occurred. There is a maximum
number at which it aborts the transmission of the frame.
4. Both devices calculate a random amount of time (called a random back-off)
and wait that amount of time before transmitting again.
5. In most cases, because both devices choose random amounts of time to wait,
another collision will not occur. If it does, the procedure repeats.
CSMA/CA
In 802.11 wireless networks, CSMA/CD cannot be used as an arbitration method
because unlike when using bounded media, the devices cannot detect a collision.
The method used is called Carrier Sense Multiple Access/Collision Avoidance
(CSMA/CA). This process is much more laborious because each station must
acknowledge each frame that is transmitted.
The “Wireless Networks” section covers 802.11 network operations in more
detail, but for the purposes of understanding CSMA/CA, we must at least lay some
groundwork. The typical wireless network contains an access point (AP) and at least
one or more wireless stations. In this type of network (called an infrastructure mode
wireless network), traffic never traverses directly between stations but is always
relayed through the AP. The steps in CSMA/CA are as follows:
1. Station A has a frame to send to Station B. It checks for traffic in two ways.
First, it performs carrier sense, which means it listens to see whether any radio
waves are being received on its transmitter. Second, after the transmission is
sent, it will continue to monitor the network for possible collisions.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 485
As you can see, these processes create a lot of overhead but are required to prevent
collisions in a wireless network.
Token Passing
Both FDDI and Token Ring networks use a process called token passing. In this
process, a special packet called a token is passed around the network. A station
cannot send until the token comes around and is empty. Using this process, no col-
lisions occur because two devices are never allowed to send at the same time. The
problem with this process is that the possibility exists for a single device to gain
control of the token and monopolize the entire network.
Polling
The final contention method to discuss is polling. In this system, a primary device
polls every other device to see whether it needs to transmit. In this way, known as
round robin, each device gets a transmit opportunity. This method is common in the
mainframe environment.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
486 CISSP Cert Guide
WAN Technologies
Many different technologies have evolved for delivering WAN access to a LAN.
They differ in capacity, availability, and, of course, cost. In the following sections, we
compare the various technologies.
T Lines
T-carriers are dedicated lines to which the subscriber has private access and does
not share with another customer. Customers can purchase an entire T1, or they can
purchase a part of a T1 called a fractional T1. T1 lines consist of 24 channels, each
capable of 64 Kbps. This means a T1 has a total capacity of 1.544 Mbps. The T1 is
split into channels through a process called time-division multiplexing (TDM).
The drawback of a T1 is that the customer is buying the full capacity of the number
of channels purchased, and any capacity left unused is wasted. This inflexibility and
the high cost have made this option less appealing than it was at one time. The cost
is a function of not only the number of channels but the distance of the line as well.
T-carriers also come in larger increments. Table 4-11 shows a summary of T-carriers
and their capacity.
E Lines
In Europe, a similar technology to T-carrier lines exists called E-carriers. With
this technology, 30 channels are bundled rather than 24. These technologies are
not compatible, and the available sizes are a bit different. Table 4-12 shows some
selected increments of E-carriers.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 487
OC Lines (SONET)
Synchronous Optical Networking (SONET) uses fiber-based links that operate over
lines measured in optical carrier (OC) transmission rates. These lines are defined
by an integer value of the basic unit of rate. The basic OC-1 rate is 55.84 Mbps,
and all other rates are multiples of that. For example, an OC-3 yields 155.52 Mbps.
Table 4-13 shows some of these rates. A company might use the smaller increments,
whereas a service provider would use the larger pipes.
CSU/DSU
A discussion of WAN connections would not be complete without discussing a
device that many customers connect to for their WAN connection. A channel
service unit/data service unit (CSU/DSU) connects a LAN to a WAN. This device
performs a translation of the information from a format that is acceptable on the
LAN to one that can be transmitted over the WAN connection.
The CSU/DSU is considered a data communications equipment (DCE) device, and
it provides an interface for the router, which is considered a data terminal equip-
ment (DTE) device. The CSU/DSU will most likely be owned by the telco, but not
always, and in some cases this functionality might be built into the interface of the
router, making a separate device unnecessary.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
488 CISSP Cert Guide
Frame Relay
Frame Relay is a Layer 2 protocol used for WAN connections. Therefore, when
Ethernet traffic must traverse a Frame Relay link, the Layer 2 header of the packet
will be completely re-created to conform to Frame Relay. When the Frame Relay
frame arrives at the destination, a new Ethernet Layer 2 header will be placed on the
packet for that portion of the network.
When Frame Relay connections are provisioned, the customer pays for a minimum
amount of bandwidth called the Committed Information Rate (CIR). That will
be the floor of performance. However, because Frame Relay is a packet-switched
network using Frame Relay switches, the actual performance will vary based on
conditions. Customers are sharing the network rather than having a dedicated line,
such as a T1 or Integrated Services Digital Network (ISDN) line. So in many cases,
the actual performance will exceed the CIR.
ATM
Asynchronous Transfer Mode (ATM) is a cell-switching technology. It transfers
fixed-size cells of 53 bytes rather than packets, and after a path is established, it
uses the same path for the entire communication. The use of a fixed path makes
performance more predictable, making it a good option for voice and video, which
need such predictability. Where IP networks depend on the source and destination
devices to ensure data is properly transmitted, this responsibility falls on the
shoulders of the devices between the two in the ATM world.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 489
ATM is used mostly by carriers and service providers for their backbones, but some
companies have implemented their own ATM backbones and ATM switches. This
allows them to make an ATM connection to the carrier, which can save money over
a connection with a T link because the ATM connection cost will be based on usage,
unlike the fixed cost of the T1.
X.25
X.25 is somewhat like Frame Relay in that traffic moves through a packet-switching
network. It charges by bandwidth used. The data is divided into 128-byte High-
Level Data Link Control (HDLC) frames. It is, however, an older technology
created in a time when noisy transmission lines were a big concern. Therefore, it has
many built-in error-checking mechanisms that make it very inefficient.
Point-to-Point Protocol
Point-to-Point-Protocol (PPP) is a Layer 2 protocol that performs framing and
encapsulation of data across point-to-point connections. These are connections to
the ISP where only the customer device and the ISP device reside on either end.
It can encapsulate several different LAN protocols such as TCP/IP. It does this by
using a Network Core Protocol (NCP) for each of the LAN protocols in use.
Along with the use of multiple NCPs, it uses a single Link Control Protocol (LCP)
to establish the connection. PPP provides the ability to authenticate the connection
between the devices using either Password Authentication Protocol (PAP) or Chal-
lenge Handshake Authentication Protocol (CHAP). Whereas PAP transmits the cre-
dentials in cleartext, CHAP does not send the credentials across the line and is much
safer.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
490 CISSP Cert Guide
The HSSI interface is found on both routers and multiplexers and provides a con-
nection to services such as Frame Relay and ATM. It operates at speeds up to 52
Mbps.
VoIP
Although voice over the PSTN is circuit-switched, voice can also be encapsulated
in packets and sent across packet-switching networks. When this is done over an IP
network, it is called Voice over IP (VoIP). Where circuit-switching networks use the
Signaling System 7 (SS7) protocol to set up, control, and disconnect a call, VoIP
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 491
uses Session Initiation Protocol (SIP) to break up the call sessions. In VoIP imple-
mentations, QoS is implemented to ensure that certain traffic (especially voice) is
given preferential treatment over the network.
SIP is an Application layer protocol that can operate over either TCP or UDP.
Addressing is in terms of IP addresses, and the voice traffic uses the same network
used for regular data. Because latency is always possible on these networks, protocols
have been implemented to reduce the impact because this type of traffic is much
more affected by delay. Applications such as voice and video need to have protocols
and devices that can provide an isochronous network. Isochronous networks guar-
antee continuous bandwidth without interruption. They do not use an internal clock
source or start and stop bits. All bits are of equal importance and are anticipated to
occur at regular intervals.
VoIP is also prone to attacks and can be secured by taking the following measures:
■ Create a separate VLAN or subnet for the IP phones and prevent access to this
VLAN by other computers.
■ Deploy a VoIP-aware firewall at the perimeter.
■ Ensure that all passwords related to VoIP are strong.
■ Secure the Network layer with IPsec.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
492 CISSP Cert Guide
1 Access requested
Microsoft 3
2 Health state sent to NPS
NPS (RADIUS)
2 Not Policy 5
compliant
3 NPS evaluates against Remediation
local health policies Restricted Servers
Network e.g., Path
Quarantine/Remediation
If you examine step 5 in the process shown in Figure 4-46, you see that a device
that fails examination is placed in a restricted network until it can be remediated. A
remediation server addresses the problems discovered on the device. It may remove
the malware, install missing operating system updates, or update virus definitions.
When the remediation process is complete, the device is granted full access to the
network.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 493
Firewalls/Proxies
Firewalls and proxies can be used as part of NAC deployment. Firewalls enforce
security rules by filtering incoming traffic by source address, destination address, or
service. It is important that the rules be configured correctly to ensure that access
to the network is not granted to malicious traffic or users. Proxies act as media-
tors between trusted and untrusted clients or servers. When proxies are deployed,
it appears that all packets sent to the untrusted clients or servers originate with the
proxies, thereby allowing all internal hosts to hide behind one public IP address.
NOTE Firewalls and proxies are discussed in more detail earlier in this chapter, in
the “Hardware” section.
Endpoint Security
Endpoint security is a field of security that attempts to protect individual systems in
a network by staying in constant contact with these individual systems from a central
location. It typically works on a client/server model in that each system will have
software that communicates with the software on the central server. The functional-
ity provided can vary.
In its simplest form, this functionality includes monitoring and automatic updat-
ing and configuration of security patches and personal firewall settings. In more
advanced systems, it might include an examination of the system each time it con-
nects to the network. This examination would ensure that all security patches are up
to date, and in even more advanced scenarios it could automatically provide reme-
diation to the computer. In either case, the computer would not be allowed to con-
nect to the network until the problem is resolved, either manually or automatically.
Other measures include using device or drive encryption, enabling remote manage-
ment capabilities (such as remote wiping and remote location), and implementing
device ownership policies and agreements so that the organization can manage or
seize the device.
NIST SP 800-128 discusses implementing endpoint protection platforms (EPPs).
According to NIST SP 800-128, personal computers are a fundamental part of
any organization’s information system. They are an important source of connect-
ing end users to networks and information systems, and are also a major source of
vulnerabilities and a frequent target of attackers looking to penetrate a network.
User behavior is difficult to control and hard to predict, and user actions, whether
it is clicking on a link that executes malware or changing a security setting to
improve the usability of their PC, frequently allow exploitation of vulnerabilities.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
494 CISSP Cert Guide
Security professionals may also want to read NIST SP 800-111, which provides
guidance to storage encryption technologies for end-user devices. In addition, NIST
provides checklists for implementing different operating systems according to the
United States Government Configuration Baseline (USGCB).
Content-Distribution Networks
A content-distribution network (CDN), also referred to as a content delivery net-
work, is a distributed network of servers that is usually located in multiple data cen-
ters connected over the Internet. The content contained on the CDN can include
text, graphics, applications, streaming media, and other content that is critical to
users. CDNs are highly scalable to allow owners to quickly adjust to the demands of
the end users. CDN examples include Microsoft Azure CDN, Netflix video stream-
ing, and Amazon CloudFront.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 495
CDNs use caching to distribute the static content to the CDN. When a request
is sent, the geographically closest point of presence (POP) to the requestor pro-
vides the cached static content. During the transaction, the POP queries the server
for updated content. When content that has not been cached on local servers is
requested, the CDN will request the content from the origin server and save a
cached copy.
Voice
Voice communication channels include PSTN, POTS, and PBX systems that are
used to manage most voice communications over telecommunications networks.
POTS systems use analog communication, whereas PSTN was originally analog but
has transitioned to use mostly digital communication.
Analog communication supports voice quality and basic phone features, including
phone transfer. Digital communication goes beyond analog to support music on
hold, VoIP integration, and alarms. In addition, digital systems do not rely on the
copper wiring used by analog systems.
Multimedia Collaboration
In today’s modern enterprises, the sharing of multimedia during both web presenta-
tions or meetings and instant messaging programs has exploded. Note that not all
collaboration tools and products are created equally in regard to the security. Many
were built with an emphasis on ease of use rather than security. This is a key issue to
consider when choosing a product. For both the presenter and the recipient, the fol-
lowing security requirements should be met:
■ Data confidentiality
■ Origin authentication
■ Identity confidentiality
■ Data integrity
■ Non-repudiation of receipt
■ Repudiation of transmission
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
496 CISSP Cert Guide
■ Non-repudiation of transmission
■ Availability to present
■ Availability to receive
Peer-to-peer (P2P) applications are used more frequently today. However, many
organizations are concerned about their use because it is very easy to share intel-
lectual property over these applications. P2P applications are often used to violate
intellectual property laws. Because P2P applications are associated with piracy and
copyright violations, organizations should include these applications in their security
policies. Because these applications can be used as a means to gain entry to an orga-
nization’s network, it is usually best to implement policies and rules to prevent P2P
applications.
Instant Messaging
While instant messaging applications make communicating with each other much
easier, they can also include features that many organizations consider security
risks. Instant message applications usually use peer-to-peer systems, server-oriented
systems, or brokered systems. The organization would have to allow the use of the
appropriate instant messaging protocol for the application that the organization
implements. Protocols that are used include Extensible Messaging and Presence
Protocol (XMPP) and Internet Relay Chat (IRC).
Keep in mind that user identification is easily falsified in instant messaging applica-
tions. All messages are sent in cleartext, including any file transfer operations. Many
instant messaging applications also allow scripting, which means that users can easily
be tricked into executing a command that they think is a valid part of the applica-
tion but that is a malicious script inserted by an attacker. Finally, social engineering
attacks and spam over instant messaging (SPIM) are popular because users can easily
be tricked into divulging information to others they perceive to be valid users.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 497
Remote Access
As the world becomes more virtual, remote access technologies are becoming
increasingly important to organizations. These technologies allow personnel to
work from virtually anywhere in the world, provided that they have some means of
connecting to the Internet or other network. In the following sections, we discuss
remote connection technologies, VPN screen scrapers, virtual applications/desktops,
and telecommuting.
Dial-up
A dial-up connection is one that uses the PSTN. If it is initiated over an analog
phone line, it requires a modem that converts the digital data to analog on the
sending end with a modem on the receiving end converting it back to digital. These
lines operate up to 56 Kbps.
Dial-up connections can use either Serial Line Internet Protocol (SLIP) or PPP
at Layer 2. SLIP is an older protocol that has been made obsolete by PPP. PPP
provides authentication and multilink capability. The caller is authenticated by the
remote access server. This authentication process can be centralized by using either
a TACACS+ or RADIUS server. These servers are discussed more fully later.
Some basic security measures that should be in place when using dial-up are
■ Have the remote access server call back the initiating caller at a preset num-
ber. Do not allow call forwarding because it can be used to thwart this security
measure.
■ Modems should be set to answer after a set number of rings to thwart war
dialers (more on them later).
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
498 CISSP Cert Guide
■ Consolidate the modems in one place for physical security, and disable
modems not in use.
■ Use the strongest possible authentication mechanisms.
If the connection is done over a digital line, it can use ISDN. It also must be dialed
up to make the connection but offers much more capability, and the entire process is
all digital.
ISDN
Integrated Services Digital Network (ISDN) is sometimes referred to as digital
dial-up. The really big difference between ISDN and analog dial-up is the perfor-
mance. ISDN can be provisioned in two ways:
■ Basic Rate Interface (BRI): Provides three channels—two B channels that
provide 64 Kbps each and a D channel that is 16 Kbps, for a total of 144 Kbps.
■ Primary Rate Interface (PRI): Can provide up to 23 B channels and a
D channel for a total of 1.544 Mbps.
Although ISDN is typically now used only as a backup connection solution and
many consider ISDN to be a dedicated connection and thus safe, attacks can be
mounted against ISDN connections, including
■ Physical attacks: These are attacks by persons who are able to physically
get to network equipment. With regard to ISDN, shared telecom closets can
provide an AP. Physical security measures to follow are described in Chapter 7,
“Security Operations.”
■ Router attacks: If a router can be convinced to accept an ISDN call from a
rogue router, it might allow an attacker access to the network. Routers should
be configured to authenticate with one another before accepting call requests.
DSL
Digital Subscriber Line (DSL) is a popular option that provides a high-speed con-
nection from a home or small office to the ISP. Although it uses the existing phone
lines, it is an always-on connection. By using different frequencies than the voice
transmissions over the same copper lines, talking on the phone and using the data
network (Internet) at the same time are possible.
DSL also is many times faster than ISDN or dial-up. It comes in several variants,
some of which offer the same speed uploading and downloading (which is called
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 499
symmetric service) while most offer better download performance than upload
performance (called asymmetric service). Some possible versions are
■ Symmetric DSL (SDSL): Usually provides from 192 Kbps to 1.1 Gbps in
both directions. It is usually used by businesses.
■ Asymmetric DSL (ADSL): Usually provides uploads from 128 Kbps to
384 Kbps and downloads up to 768 Kbps. It is usually used in homes.
■ High Bit-Rate DSL (HDSL): Provides T1 speeds.
■ Very High Bit-Rate DSL (VDSL): Is capable of supporting high-definition
TV (HDTV) and VoIP.
Unlike cable connections, DSL connections are dedicated links, but there are still
security issues to consider. The PCs and other devices that are used to access the
DSL line should be set with the following options in Internet Options:
■ Check for publisher’s certificate revocation.
■ Enable memory protection to help mitigate online attacks.
■ Enable SmartScreen Filter.
■ Use SSL 3.0.
■ Use TLS 1.1 or higher.
■ Warn about certificate address mismatch.
■ Warn if POST submittal is redirected to a zone that does not permit posts.
Another issue with DSL is the fact that it is always connected and the device
typically keeps the same or a static IP address. A static IP address provides a fixed
target for the attacker. Therefore, taking measures such as implementing a NAT
helps hide the true IP address of the device to the outside world.
Cable
Getting connections to the ISP using the same cabling system used to deliver cable
TV is also possible. Cable modems can provide 250 Mbps and higher over the
coaxial cabling used for cable TV. Cable modems conform to the Data-Over-Cable
Service Interface Specifications (DOCSIS) standard. DOCSIS 4.0 has a maximum
downstream capacity of 10 Gbps and a maximum downstream capacity of up to
6 Gbps.
A security and performance concern with cable modems is that each customer is
on a shared line with neighbors. This means performance varies with the time of
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
500 CISSP Cert Guide
day and congestion and the data is traveling over a shared medium. For this reason,
many cable companies now encrypt these transmissions.
Broadband cable requires a cable modem at the customer’s location and a cable
modem termination system at the cable company facility, typically a cable television
headend. The two are connected via coaxial cable or a hybrid fiber coaxial (HFC)
plant. They can typically operate up to 160 kilometers between the modem and the
termination system. Downstream bit rates to the customer vary but generally run
in the 300 Mbps area and higher. Upstream traffic to the provider usually only pro-
vides up to 20 Mbps.
VPN
Virtual private network (VPN) connections are those that use an untrusted carrier
network but provide protection of the information through strong authentication
protocols and encryption mechanisms. Although we typically use the most untrusted
network, the Internet, as the classic example, and most VPNs do travel through the
Internet, they can be used with interior networks as well whenever traffic needs to
be protected from prying eyes.
When discussing VPN connections, many new to the subject become confused by
the number and type of protocols involved. Let’s break down which protocols are
required, which are optional, and how they all play together. Recall how the pro-
cess of encapsulation works. Earlier we discussed this concept when we talked of
packet creation, and in that context, we applied it to how one layer of the OSI model
“wraps around,” or encapsulates, the other data already created at the other layers.
In VPN operations, entire protocols wrap around other protocols (a process called
encapsulation). They include
■ A LAN protocol (required)
■ A remote access or line protocol (required)
■ An authentication protocol (optional)
■ An encryption protocol (optional)
Let’s start with the original packet before it is sent across the VPN. This is a LAN
packet, probably a TCP/IP packet. The change that will be made to this packet is
that it will be wrapped in a line or remote access protocol. This protocol’s only job is
to carry the TCP/IP packet still fully intact across the line and then, just like a ferry
boat drops a car at the other side of a river, it de-encapsulates the original packet and
delivers it to the destination LAN unchanged.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 501
Several of these remote access or line protocols are available. Among them are
■ Point-to-Point-Tunneling Protocol (PPTP)
■ Layer 2 Tunneling Protocol (L2TP)
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
502 CISSP Cert Guide
IPsec is a framework, which means it does not specify many of the components used
with it. These components must be identified in the configuration, and they must
match for the two ends to successfully create the required security association (SA)
that must be in place before any data is transferred. The selections that must be
made are
■ The encryption algorithm (encrypts the data)
■ The hashing algorithm (ensures the data has not been altered and verifies its
origin)
■ The mode (tunnel or transport)
■ The protocol (AH, ESP, or both)
All these settings must match on both ends of the connection. It is not possible for
the systems to make these selections on the fly. They must be preconfigured cor-
rectly to match.
When the tunnel is configured in tunnel mode, the tunnel exists only between the
two gateways, and all traffic that passes through the tunnel is protected. This is nor-
mally used to protect all traffic between two offices. The SA is between the gateways
between the offices. This is the type of connection that would be called a site-to-site
VPN.
The SA between the two endpoints is made up of the security parameter index (SPI)
and the AH/ESP combination. The SPI, a value contained in each IPsec header,
helps the devices maintain the relationship between each SA (of which there could
be several happening at once) and the security parameters (also called the transform
set) used for each SA. SA is a simplex (or one-way channel); if two endpoints need to
communicate in both directions, they need two different SAs.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 503
With respect to authenticating the connection, the keys can be preshared or derived
from a PKI. A PKI creates a public/private key pair that is associated with individual
users and computers that use a certificate. These key pairs are used in the place of pre-
shared keys in that case. Certificates that are not derived from a PKI can also be used.
In transport mode, the SA is either between two end stations or between an end sta-
tion and a gateway or remote access server. In this mode, the tunnel extends from
computer to computer or from computer to gateway. This is the type of connection
that would be for a remote access VPN. This is but one application of IPsec. It is
also used in other applications such as a General Packet Radio Service (GPRS), a
VPN solution for devices using a 3G or 4G cell phone network.
When the communication is from gateway to gateway or host to gateway, either
transport or tunnel mode can be used. If the communication is computer to com-
puter, the tunnel must be in transport mode. If the tunnel is configured in transport
mode from gateway to host, the gateway must operate as a host.
The most effective attack against IPsec VPNs is a man-in-the-middle attack. In this
attack, the attacker proceeds through the security negotiation phase until the key
negotiation when the victim reveals its identity. In a well-implemented system, the
attacker will fail when the attacker cannot likewise prove their identity.
At one time, each of these access devices would perform the authentication process
locally on the device. The administrators would need to ensure that all remote
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
504 CISSP Cert Guide
access policies and settings were consistent across them all. When a password
required changing, it had to be done on all devices.
Remote Authentication Dial-In User Service (RADIUS) and Terminal Access
Controller Access Control System Plus (TACACS+) are networking protocols that
provide centralized authentication and authorization. These services can be run at a
central location, and all the access devices (AP, remote access, VPN, and so on) can
be made clients of the server. Whenever authentication occurs, the TACACS+ or
RADIUS server performs the authentication and authorization. This setup provides
one location to manage the remote access policies and passwords for the network.
Another advantage of using these systems is that the audit and access information
(logs) are not kept on the access server.
TACACS and TACACS+ are Cisco-proprietary services that operate in Cisco
devices, whereas RADIUS is an RFC standard defined. Cisco has implemented
several versions of TACACS over time. It went from TACACS to XTACACS to
the latest version, TACACS+. The latest version provides authentication, account-
ing, and authorization, which is why it is sometimes referred to as an AAA service.
TACACS+ employs tokens for two-factor, dynamic password authentication. It also
allows users to change their passwords.
RADIUS is designed to provide a framework that includes three components: a sup-
plicant, an authenticator, and a RADIUS server. The supplicant is the device seeking
authentication. The authenticator is the device to which the supplicant is attempt-
ing to connect (AP, switch, remote access server), and the RADIUS server is the
authentication server. With regard to RADIUS, the device seeking entry is not the
RADIUS client. The authenticating server is the RADIUS server, and the authenti-
cator (AP, switch, remote access server) is the RADIUS client.
In some cases, a RADIUS server can be the client of another RADIUS server. In
that case, the RADIUS server acts as a proxy client for its RADIUS clients.
Diameter is another authentication protocol based on RADIUS and is not compat-
ible with RADIUS. Diameter has a much larger set of attribute/value pairs (AVPs)
than RADIUS, allowing more functionality and services to communicate, but has
not been widely adopted.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 505
Telnet
Telnet is a remote access protocol used to connect to a device for the purpose of exe-
cuting commands on the device. It can be used to access servers, routers, switches,
and many other devices for the purpose of managing them. Telnet is not considered
a secure remote management protocol because, like another protocol used with
Unix-based systems, rlogin, it transmits all information including the authentica-
tion process in cleartext. Alternatives such as SSH have been adopted to perform
the same function while providing encryption. Telnet and rlogin connections are
connection-oriented, so they use TCP as the transport protocol.
Remote Log-in (rlogin), Remote Shell (rsh), and Remote Copy (rcp)
The rlogin/rsh/rcp family of protocols allows users to connect remotely, execute
commands, and copy data to Unix-based computers. Authentication is based on
the host or IP address. If an organization needs to allow this access, SSHv2 should
be implemented with these protocols.
TLS/SSL
Transport Layer Security/Secure Sockets Layer (TLS/SSL) is another option for
creating secure connections to servers. It works at the Application layer of the OSI
model. It is used mainly to protect HTTP traffic or web servers. Its functionality is
embedded in most browsers, and its use typically requires no action on the part of
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
506 CISSP Cert Guide
TLS and SSL are similar but not the same. TLS 1.0 and higher are based on the
SSL 3.0 specification, but they are not operationally compatible. Both implement
confidentiality, authentication, and integrity above the Transport layer. The server
is always authenticated, and optionally, the client also can be. SSL v2 must be used
for client-side authentication. When SSL is configured, a session key length must
be designated. The two options are 40-bit and 128-bit. SSL prevents man-in-the
middle attacks by using self-signed certificates to authenticate the server public key.
Virtual Application/Desktop
Although virtualization is becoming increasingly popular, organizations do not
always consider securing the communication channels used by virtualization appli-
cations. With virtualization, remote users are able to execute desktop commands as
if they were sitting at the virtual computer to which they are connecting. Security
professionals should research all virtual application options to ensure that the appli-
cation chosen provides the organization with all the capabilities needed while at the
same time ensuring that the selected solution provides the appropriate level of secu-
rity. When using virtualization, security professionals should ensure that the same
security measures that are implemented on the host computer are also implemented
on each virtual machine. For example, antivirus software should be installed on the
host computer and on each virtual machine running on the computer.
Telecommuting/Teleworking
Organizations have had to adapt their work environments to meet the ever-changing
needs of the technologically advancing world. Many organizations today have
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 507
trouble recruiting the talent they need to fill available positions. COVID-19 also
prompted more telecommuting. Consequently, telecommuting or working remotely
is increasingly being used to help with recruitment, ensure that skilled employees
are employed, and keep employees safe.
Organizations must ensure that remote workers are fully trained in all security poli-
cies, particularly policies regarding VPN access and confidential information access
and storage. It is also suggested that you implement remote wiping capabilities and
full device encryption on any organization-issued devices. Finally, users must under-
stand the implications of accessing organizational resources from public places.
Data Communications
In securing communication networks, organizations must understand the impor-
tance of protecting data communications. Data communication involves any digital
transmission of data over a network and is discussed throughout this book.
Virtualized Networks
In securing communication networks, organizations must understand the effects of
virtualized networks on security. In this section, we cover SDN, VSAN, guest oper-
ating systems, and port isolation.
SDN
Software-defined networking (SDN) accelerates software deployment and delivery,
thereby reducing IT costs through policy-enabled workflow automation. It enables
cloud architectures by providing automated, on-demand application delivery and
mobility at scale.
SDN allows for the physical separation of the network control plane from the for-
warding plane, and the control plane can control several devices. Administrators can
therefore separate traditional network traffic, both wired and wireless, into three
components: raw data, method of transmission, and data purpose. An SDN includes
three architecture layers:
■ Infrastructure layer: Includes switches, routers, and data and the data for-
warding process. Also referred to as the data plane.
■ Control layer: Includes device intelligence that determines traffic flow. Also
referred to as the control plane.
■ Application layer: Includes network services, utilities, and applications. Also
referred to as the application plane.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
508 CISSP Cert Guide
Because of these layers, hardware that is handling the network traffic does not need
to direct the traffic.
SDN may be particularly helpful with cloud and virtualization by allowing them to
be more efficient, reliable, and simplified.
Virtual SAN
A virtual storage area network (VSAN) is a software-defined storage method that
allows pooling of storage capabilities and instant and automatic provisioning of vir-
tual machine storage. This is a method of software-defined storage (SDS). It usually
includes dynamic tiering, QoS, caching, replication, and cloning. Data availability
is ensured through the software, not by implementing redundant hardware. Admin-
istrators are able to define policies that allow the software to determine the best
placement of data. By including intelligent data placement, software-based control-
lers, and software RAID, a VSAN can provide better data protection and availability
than traditional hardware-only options.
Network Attacks
Before security professionals can address network security threats, they must be
aware of the threats, understand how they work, and know the measures to take to
prevent the attacks from succeeding. The following sections cover a wide variety
of attack types along with measures that should be taken to prevent them from
occurring.
Cabling
Although it’s true that a cabled network is easier to secure from eavesdropping than
a wireless network, security professionals must still be aware of some security issues.
They should also understand some general behaviors of cabling that affect perfor-
mance and ultimately can affect availability. As discussed previously, maintaining
availability to the network is also one of the goals of CIA. Therefore, performance
characteristics of cabling that can impact availability are also discussed.
Noise
Noise is a term used to cover several types of interference that can be introduced to
the cable and cause problems. In general, noise is defined as any unwanted informa-
tion. Noise can be from large electrical motors, other computers, lighting, and other
sources. This noise combines with the data signals (packets) on the line and distorts
the signal. When even a single bit in a transmission is misread (read as a 1 when it
should be a 0 or vice versa), corrupted data is received, and retransmissions must
occur. Retransmissions lead to lower throughput and in some cases no throughput
whatsoever.
In any case, where noise becomes a problem, the simplest way to mitigate the prob-
lem is to use shielded cabling. In cases where the noise is still present, locating the
specific source and taking measures to remove it (or at least the interference it is
generating) from the environment might be necessary.
Attenuation
Attenuation is the weakening of the signal as it travels down the cable and meets
resistance. In the discussion on cabling earlier in this chapter, you learned that all
cables have a recommended maximum length. When a cable that is longer than its
recommended length is used, attenuation weakens the signal to the point it cannot
be read correctly, resulting in the same problem that is the end result of noise. The
data must be sent again, lowering throughput.
The solution to this problem is in design. Follow the cable length recommendations
listed in the section on cables earlier in this chapter with any type of cabling. This
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
510 CISSP Cert Guide
includes coaxial, twisted pair, and fiber optic. All types have maximum lengths that
should not be exceeded without risking attenuation.
Crosstalk
Crosstalk is a behavior that can occur whenever individual wires within a cable are
run parallel to one another. Crosstalk occurs when the signals from the two wires
(or more) interfere with one another and distort the transmission. Cables, such as
twisted pair cables, would suffer from this if the cables were not twisted as they are.
The twisting prevents the crosstalk from occurring.
Eavesdropping
Although cabling is a bounded media and much easier to secure than wireless,
eavesdropping can still occur. All cabling that depends on electrical voltages, such as
coaxial and twisted pair, can be tapped or monitored with the right equipment. The
least susceptible to eavesdropping (although not completely immune) is fiber optic
cabling because it doesn’t use electrical voltages, but rather light waves. In any situ-
ation where eavesdropping is a concern, using fiber optic cabling can be a measure
that will at least drastically raise the difficulty of eavesdropping. The real solution is
ensuring physical security of the cabling. The cable runs should not be open, visible,
and available to attackers.
Non-Blind Spoofing
A non-blind spoofing attack occurs when an attacker is on the same subnet as the
victim. This attack sniffs the sequence and acknowledgment numbers and uses them
to hijack the session.
To prevent these attacks, security professionals may want to consider the following
measures:
■ Using ingress filtering on packets to filter the inbound traffic
■ Deploying protocols through a number sequence that is used to create a secure
connection to other systems
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 511
■ Configuring the network to reject packets from the network that claim to
originate from a local address
■ Enabling encryption sessions at the router if allowing outside connections
from trusted hosts
Blind Spoofing
In a blind spoofing attack, the sequence and acknowledgment numbers cannot be
attained. Packets are sent to the target to obtain a sampling of the sequence num-
bers so that the attacker can generate a valid sequence number for the attack. This
approach usually works best on older systems because they use an exact formula for
determining sequence numbers. However, most of today’s modern operating systems
use random sequence number generation.
The mitigations listed for non-blind spoofing attacks also apply to blind spoofing
attacks.
Man-in-the-Middle Attack
A man-in-the-middle (MITM) attack intercepts legitimate traffic between two
entities. The attacker can control information flow and can eliminate or alter the
communication between the two parties. Both non-blind spoofing and blind spoof-
ing are types of MITM attacks.
Some MITM attacks can be mitigated by encrypting the messages. Other defenses
include using secure DNS extensions, PKI, stronger mutual authentication, and sec-
ond secure channel verification.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
512 CISSP Cert Guide
ARP Attack
Within a VLAN, ARP poisoning attacks are used to fool routers into learning the
identities of counterfeited devices. An attacker then poses as that device and per-
forms an MITM attack. Prevention of this attack is best carried out by blocking
direct communication at Layer 2 between the attacker and attacked device or by
using ARP inspection or some similar mechanism in the devices.
ICMP Attacks
Earlier in this chapter we described the Internet Control Message Protocol (ICMP),
one of the protocols in the TCP/IP suite. Devices use this protocol to send error
messages to sending devices when transmission problems occur and also when either
the ping command or the traceroute command is used for troubleshooting. Like
many tools and utilities that were created for good purposes, this protocol can also
be used by attackers who take advantage of its functionality.
In the following sections, we cover ICMP-based attacks. One of the ways to pre-
vent ICMP-based attacks is to disallow its use by blocking the protocol number
for ICMP, which is 1. Many firewall products also have the capability to block only
certain types of ICMP messages as opposed to prohibiting its use entirely. We also
discuss some of these problematic ICMP message types here.
Ping of Death
A ping of death is an attack that takes advantage of the normal behavior of devices
that receive oversized ICMP packets. ICMP packets are normally a predictable
65,536 bytes in length. Hackers have learned how to insert additional data into
ICMP packets. A ping of death attack sends several of these oversized packets,
which can cause the victim system to be unstable at the least and possibly freeze up.
That results in a denial-of-service attack because it makes the target system less able
or even unable to perform its normal function in the network.
Smurf
The smurf attack is a denial-of-service attack that uses a type of ping packet
called an ICMP ECHO REQUEST. This attack is an example of a distributed
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 513
denial-of-service (DDoS) attack in that the perpetrator enlists the aid of other
machines in the network.
When a system receives an ICMP ECHO REQUEST packet, it attempts to answer
this request with an ICMP ECHO REPLY packet (usually four times by default).
Normally, this reply is sent to a single sending system. In this attack, the ECHO
REQUEST has its destination address set to the network broadcast address of the
network in which the target system resides, and the source address is set to the tar-
get system. When every system in the network replies to the request, it overwhelms
the target device, causing it to freeze or crash.
Fraggle
Although not really an ICMP attack because it uses UDP, the fraggle attack is a
DDoS attack with the same goal and method as the smurf attack. In this attack, an
attacker sends a large amount of UDP echo traffic to an IP broadcast address, all of
it having a fake source address, which will, of course, be the target system. When all
systems in the network reply, the target is overwhelmed.
ICMP Redirect
One of the many types of error messages that ICMP uses is called an ICMP redi-
rect or an ICMP packet type 5. ICMP redirects are used by routers to specify better
routing paths out of one network. When ICMP does this, it changes the path that
the packet will take.
By crafting ICMP redirect packets, the attacker alters the route table of the host that
receives the redirect message. This alteration changes the way packets are routed
in the network to the attacker’s advantage. After its routing table is altered, the host
will continue to use the path for 10 minutes. For this reason, ICMP redirect packets
might be one of the types you might want to disallow on the firewall.
Ping Scanning
ICMP can be used to scan the network for live or active IP addresses. This attack,
known as ping scanning, basically pings every IP address and keeps track of which
IP addresses respond to the ping. This attack is usually accompanied or followed by
a port scan, covered later in this chapter.
Traceroute Exploitation
Traceroute is used to determine the path that a packet travels between a source and
destination. Attackers can use traceroute to map a network to better understand
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
514 CISSP Cert Guide
packet routing. They can also use traceroute with Nmap, as discussed later in this
chapter, to determine firewall rules.
DNS Attacks
As mentioned in the discussion of DNS earlier in this chapter, DNS resolves com-
puter and domain names to IP addresses. It is a vital service to the network, and
for that reason, multiple DNS servers are always recommended for fault tolerance.
DNS servers are a favorite target of DoS and DDoS attacks because of the mayhem
caused by taking them down or causing the DNS servers to malfunction.
DNS servers also can be used to divert traffic to the attacker by altering DNS
records. In the following sections, we cover all types of DNS attacks, along with
practices that can eliminate or mitigate the effect of these attacks.
DoS
DNS servers are a favorite target of denial-of-service (DoS) attacks. The reason is
that the loss of DNS service in the network typically brings the network to a halt
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 515
because many network services depend on its functioning. Any of the assorted types
of DoS attacks discussed in this book can be targeted to DNS servers. For example,
a ping of death might be the attack of choice.
DDoS
Any of the assorted DoS attacks can be amplified by the attacker by recruiting other
devices to assist in the attack. Some examples of these attacks are the smurf and frag-
gle attacks (covered earlier). A distributed denial-of-service (DDoS) attack occurs
when more than one system or device floods the bandwidth of a targeted system or
network.
In some cases, the attacker might have used malware to install software on thousands
of computers (called zombies) to which commands are sent at a given time, instruct-
ing all the devices to launch the attack. Not only does this amplify the attack, but
it also helps to hide the source of the attack because it appears to come from many
places at once.
DNSSEC
One of the newer approaches to preventing DNS attacks is a stronger authentica-
tion mechanism called Domain Name System Security Extensions (DNSSEC).
Many current implementations of DNS software contain this functionality. It
uses digital signatures to validate the source of all messages to ensure they are not
spoofed.
The problem with DNSSEC illustrates the classic trade-off between security and
simplicity. To deploy DNSSEC, a PKI must be built and maintained to issue, vali-
date, and renew the public/private key pairs and certificates that must be issued to all
the DNS servers. (PKI is covered more fully in Chapter 3.) Moreover, for complete
security of DNS, all the DNS servers on the Internet would also need to participate,
which complicates the situation further. The work on this continues today.
URL Hiding
An alternate and in some ways simpler way for an attacker to divert traffic to a fake
website is a method called URL hiding. This attack takes advantage of the ability to
embed URLs in web pages and email. The attacker might refer to the correct name
of the website in the text of the web page or email, but when inserting the URL that
goes with the link, the attacker inserts the URL for the fake site. The best protection
against this issue is to ask users to not click links on unknown or untrusted websites.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
516 CISSP Cert Guide
Domain Grabbing
Domain grabbing occurs when individuals register a domain name of a well-known
company before the company has the chance to do so. Then later the individuals
hold the name hostage until the company becomes willing to pay to get the domain
name. In some cases, these same individuals monitor the renewal times for well-
known websites and register the name before the company has a chance to perform
the renewal. Some practices that can help to prevent this situation are to register
domain names for longer periods of time and to register all permutations of the cho-
sen domain name (misspellings and so on).
Cybersquatting
When domain names are registered with no intent to use them but with intent to
hold them hostage (as described in the preceding section), it is called cybersquatting.
The same practices to prevent domain grabbing are called for to prevent the com-
pany from becoming a victim of cybersquatting.
Email Attacks
One of the most popular avenues for attacks is a tool people must use every day—
email. In the following sections, we cover several attacks that use email as the
vehicle. In most cases, the best way to prevent these attacks is user training and
awareness because many of these attacks are based on poor security practices on the
part of the user.
Email Spoofing
Email spoofing is the process of sending an email that appears to come from one
source when it really comes from another. It is made possible by altering the fields
of email headers such as From, Return Path, and Reply-to. Its purpose is to convince
the receiver to trust the message and reply to it with some sensitive information that
the receiver would not have shared unless it was a trusted message.
Often this spoofing is one step in an attack designed to harvest usernames and
passwords for banking or financial sites. This attack can be mitigated in several ways.
One is SMTP authentication, which, when enabled, disallows the sending of an
email by a user who cannot authenticate with the sending server.
Another possible mitigation technique is to implement a Sender Policy Framework
(SPF). An SPF is an email validation system that works by using DNS to deter-
mine whether an email sent by someone has been sent by a host sanctioned by that
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 517
The Message-ID is a unique hash that represents the underlying email message.
This ID is defined by the IETF in RFC 2822. The Sender Policy Framework (SPF)
is used to check whether a specific IP address is authorized to send mail from a spe-
cific domain (RFC 7208). The DKIM (DomainKeys Identified Mail) refers to a pair
of cryptographic keys that are used to sign an outgoing message, while validating
incoming messages (RFC 6376). DMARC (Domain-based Message Authentication,
Reporting & Conformance) provides the sender with an option that lets the recipi-
ent know if the email was protected by SPF or DKIM. ARC (Authenticated Receive
Chain) is a standard, created in 2016, that helps to improve how DKIM and SPF
results are passed from one mail server to the next during forwarding.
Spear Phishing
Phishing is a social engineering attack where a recipient is convinced to click a link
in an email that appears to go to a trusted site but in fact goes to the hacker’s site.
This attack is used to harvest usernames and passwords.
Spear phishing is the process of foisting this attack on a specific person, such as a
company manager or human resources manager rather than a random set of people.
The attack might be made more convincing by learning details about the person
through social media that the email might reference to boost its appearance of
legitimacy.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
518 CISSP Cert Guide
Whaling
Just as spear phishing is a subset of phishing, whaling is a subset of spear phishing. It
targets a single person, and in the case of whaling, that person is someone of signifi-
cance or importance. It might be a CEO, CFO, CSO, COO, or CTO, for example.
The attack is based on the assumption that these people have more sensitive infor-
mation to divulge.
Spam
No one enjoys how email boxes fill up every day with unsolicited emails, usually
trying to sell something. In many cases, users cause themselves to receive this email
by not paying close attention to all the details when buying something or visiting a
site. When email is sent out on a mass basis that is not requested, it is called spam.
Spam is more than an annoyance because it can clog email boxes and cause email
servers to spend resources delivering it. Sending spam is illegal, so many spammers
try to hide the source of the spam by relaying through other corporations’ email
servers. Not only does this practice hide the true source of the email, but it can
cause the relaying company to get in trouble.
Today’s email servers can deny relaying to any email servers that are not specified.
This solution can prevent an organization’s email system from being used as a spam-
ming mechanism. This type of relaying should be disallowed on the organization’s
email servers. In addition, spam filters can be implemented on personal email, such
as web-based email clients.
Wireless Attacks
Wireless attacks are some of the hardest to prevent because of the nature of the
medium. If you want to make radio transmissions available to users, you must make
them available to anyone else in the area. Moreover, there is no way to determine
when someone is capturing radio waves! You might be able to prevent someone
from connecting to or becoming a wireless client on the network, but you cannot
stop them from using a wireless sniffer to capture the packets. In the following sec-
tions, we cover some of the more common attacks and also discuss some mitigation
techniques.
Wardriving
Wardriving is the process of riding around with a wireless device connected to a
high-power antenna searching for WLANs. It could be for the purpose of obtaining
free Internet access, or it could be to identify any open networks vulnerable to an
attack.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 519
Warchalking
Warchalking is a practice that typically accompanies wardriving. When a wardriver
locates a WLAN, that attacker indicates in chalk on a sidewalk or building the SSID
and the types of security used on the network. This activity has gone mostly online
now because many sites are dedicated to compiling lists of found WLANs and their
locations.
Remote Attacks
Although all attacks, such as DoS attacks, DNS poisoning, port scanning, and ICMP
attacks, are remote in the sense that they can be launched from outside the network,
remote attacks can also be focused on remote access systems such as VPN servers or
dial-up servers. As security practices have evolved, these types of attacks have some-
what diminished.
Wardialing is not the threat that it once was simply because organizations don’t use
modems and modem banks as much as they used to. In this attack, software pro-
grams attempt to dial large lists of phone numbers for the purpose of identifying
numbers attached to modems. When a person or fax machine answers, it records
that fact, and when a modem answers, it attempts to make a connection. If this con-
nection is successful, the hacker now has an entryway into the network.
Other Attacks
In these final sections of the chapter, we cover some other attacks that might not fall
into any of the other categories discussed thus far.
Session Hijacking
In a session hijacking attack, the hacker attempts to place himself in the middle of
an active conversation between two computers for the purpose of taking over the
session of one of the two computers, thus receiving all data sent to that computer.
Juggernaut and the Hunt Project allow the attacker to spy on the TCP session
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
520 CISSP Cert Guide
between the computers. Then the hacker uses some sort of DoS attack to remove
one of the two computers from the network while spoofing the IP address of that
computer and replacing that computer in the conversation. This results in the
hacker receiving all traffic that was originally intended for the computer that suf-
fered the DoS attack.
Port Scanning
ICMP can also be used to scan the network for unused or open ports. Open ports
indicate services that might be running and listening on a device that might be sus-
ceptible to being used for an attack. This attack basically pings every address and
port number combination and keeps track of which ports are open on each device
as the pings are answered by open ports with listening services and not answered by
closed ports.
Nmap is one of the most popular port scanning tools used today. Security profes-
sionals must understand NULL, FIN, and XMAS scans performed by Nmap. Any
packet not containing SYN, RST, or ACK bits will return a response if the port is
closed. If the port is open, a response will not be sent. A NULL scan does not send
any bits. A FIN scan sets the FIN bit. An XMAS scan sets the FIN, PSH, and URG
flags. Two advantages of these scan types are that they can sneak through certain
nonstateful firewalls and packet filtering routers, and they are stealthier than even a
SYN scan.
Organizations can perform their own port scanning or use a third-party security
consultant to identify vulnerabilities. Using port scanning tools can also inform an
organization which ports are open and should be closed because they are unneeded.
An effective firewall can also prevent unauthorized access. The firewall can control
ports, indicate how these ports can be viewed, and identify when port scanning
occurs.
Teardrop
A teardrop attack is a type of fragmentation attack. The maximum transmission unit
(MTU) of a section of the network might cause a packet to be broken up or frag-
mented, which requires the fragments to be reassembled when received. The hacker
sends malformed fragments of packets that, when reassembled by the receiver, cause
the receiver to crash or become unstable.
IP Address Spoofing
IP address spoofing is one of the techniques used by hackers to hide their trail or to
masquerade as another computer. The hacker alters the IP address as it appears in
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 521
the packet. This can sometimes allow the packet to get through an ACL that is based
on IP addresses. It also can be used to make a connection to a system that only trusts
certain IP addresses or ranges of IP addresses.
Zero-Day
A zero-day exploit refers to a software vulnerability for which no patch currently
exists because that vulnerability is yet to be identified by the developer. A zero-day
attack refers to an attack that utilizes a zero-day exploit.
Ransomware
Ransomware is malicious software that uses cryptography to perpetually encrypt and
block access to a user’s data unless a ransom is paid. The attacker holds the decryp-
tion key that is required to unlock the data. Most attackers request payment in the
form of crypto currency, such as Bitcoin, to make tracking the attackers difficult.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
522 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 523
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
524 CISSP Cert Guide
ping of death attack; ping scanning; plain old telephone service (POTS); Point-
to-Point Protocol (PPP); Point-to-Point Tunneling Protocol (PPTP); polling;
Port Address Translation (PAT); port isolation; port scan; Post Office Proto-
col (POP); Presentation layer (Layer 6); Primary Rate Interface (PRI); private
branch exchange (PBX); private IP addresses; proxy firewall; public switched
telephone network (PSTN); radio frequency interference (RFI); remote access;
Remote Authentication Dial-In User Service (RADIUS); reverse ARP (RARP);
ring; router; Routing Information Protocol (RIP); screen scraper; screened host;
screened subnet; SSH File Transfer Protocol (SFTP); secure HTTP (S-HTTP);
Sender Policy Framework (SPF); Serial Line Internet Protocol (SLIP); service
set identifier (SSID); session hijacking attack; Session Initiation Protocol (SIP);
Session layer (Layer 5); Signaling System 7 (SS7); Simple Mail Transfer Pro-
tocol (SMTP); Simple Network Management Protocol (SNMP); single-mode
fiber; smurf attack; Socket Secure (SOCKS) firewall; software-defined network-
ing (SDN); spam; spear phishing; star topology; stateful firewalls; stateful NAT
(SNAT); static NAT; storage-area network (SAN); supplicant; Switched Multi-
megabit Data Service (SMDS); switches; SYN ACK attack; Synchronous Optical
Networking (SONET); synchronous transmission; T-carrier; TCP three-way
handshake; teardrop; Telnet; Terminal Access Controller Access-Control System
Plus (TACACS+); Thicknet; Thinnet; three-legged firewall; time-division multi-
plexing (TDM); token passing; Token Ring; Transport layer (Layer 4); Transport
Layer Security/Secure Sockets Layer (TLS/SSL); twisted pair; unicast; unified
threat management (UTM); URL hiding; Very High Bit-Rate DSL (VDSL); vir-
tual local-area network (VLAN); virtual private network (VPN); Virtual Router
Redundancy Protocol (VRRP); virtual storage-area network (VSAN); Voice over
5G (Vo5G); Voice over IP (VoIP); Voice over LTE (VoLTE); Voice over New
Radio (VoNR); war chalking; war driving; whaling; wide-area network (WAN);
Wi-Fi 4; Wi-Fi 5; Wi-Fi 6; Wi-Fi 7; Wi-Fi Protected Access (WPA); Wired
Equivalent Privacy (WEP); wireless access in vehicle environments (WAVE);
wireless local-area network (WLAN); WPA2; X.25
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 525
2. Which layers of the OSI model are equivalent to the Link layer of the TCP/IP
model? (Choose two.)
a. Data Link
b. Physical
c. Session
d. Application
e. Presentation
3. Which of the following represents the range of port numbers that is referred
to as “well-known” port numbers?
a. 49152–65535
b. 0–1023
c. 1024–49151
d. All above 500
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
526 CISSP Cert Guide
10. Which of the following transmission types uses stop and start bits in its
communication?
a. Asynchronous
b. Unicast
c. Multicast
d. Synchronous
11. Which protocol encapsulates Fibre Channel frames over Ethernet networks?
a. MPLS
b. FCoE
c. iSCSI
d. VoIP
14. Which of the following is a multilayer protocol that is used between compo-
nents in process automation systems in electric and water companies?
a. DNP3
b. VoIP
c. WPA
d. WPA2
16. Which of the following is a service that goes beyond authentication of the user
and examines the state of the computer that the user is introducing to the net-
work when making a remote access or VPN (virtual private network) connec-
tion to the network?
a. NAC
b. SNAT
c. LDP
d. RARP
17. Which of the following assigns an IP address to a device if the device is unable
to communicate with the DHCP server in a Windows-based network?
a. NFC
b. Dynamic NAT
c. APIPA
d. Mobile IPv6
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
528 CISSP Cert Guide
18. Which of the following is a field of security that attempts to protect individual
systems in a network by staying in constant contact with them from a central
location?
a. IP convergence
b. Remote access
c. Static NAT
d. Endpoint security
19. Which of the following accelerates software deployment and delivery, thereby
reducing IT costs through policy-enabled workflow automation?
a. Virtual storage-area network (VSAN)
b. Internet Group Management Protocol (IGMP)
c. Transport Layer Security/Secure Sockets Layer (TLS/SSL)
d. Software defined networking (SDN)
21. Which entity is a wireless access point considered during the 802.1X authenti-
cation process?
a. Supplicant
b. Authenticator
c. Authentication server
d. Multimedia collaborator
22. During a routine network security audit, you suspect the presence of several
rogue access points. What should you do first to identify if and where any
rogue wireless access points (WAPs) have been deployed on the network?
a. Adjust the power levels on all valid WAPs to decrease the coverage radius.
b. Replace all valid WAP directional antennas with omnidirectional antennas.
c. Perform a wireless site survey.
d. Ensure that all valid WAPs are using WPA2.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 529
24. What type of attack occurs when more than one system or device floods the
bandwidth of a targeted system or network?
a. Domain Name System Security Extensions (DNSSEC)
b. Domain grabbing
c. Cybersquatting
d. Distributed denial of service (DDoS)
25. What type of attack is occurring when the attacker intercepts legitimate traffic
between two entities?
a. Man-in-the-middle (MITM)
b. Smurf
c. Bluejacking
d. Bluesnarfing
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
530 CISSP Cert Guide
Class Range
Class A 10.0.0.0–10.255.255.255
Class B 172.16.0.0–172.31.255.255
Class C 192.168.0.0–192.168.255.255
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 531
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
532 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 4: Communication and Network Security 533
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
This chapter covers the following topics:
■ Access Control Process: Concepts discussed include the steps of the access
control process.
■ Physical and Logical Access to Assets: Concepts discussed include
access control administration, information access, systems access, device
access, facilities access, and application access.
■ Identification and Authentication Concepts: Concepts discussed include
knowledge factors, ownership factors, characteristic factors, location factors, time
factors, single- versus multifactor authentication, and device authentication.
■ Identification and Authentication Implementation: Concepts discussed
include separation of duties, least privilege/need-to-know, default to no
access, directory services, single sign-on, federated identity management
(IdM), session management, registration proof and registration of identity,
credential management systems, Remote Authentication Dial-In User Ser-
vice (RADIUS), Terminal Access Controller Access Control System Plus
(TACACS+), accountability, and just-in-time (JIT).
■ Identity as a Service (IDaaS) Implementation: Concepts discussed
include the considerations when implementing IDaaS.
■ Third-Party Identity Services Integration: This section details how
to integrate third-party identity services in an enterprise, including
on-premises, cloud, federated, and hybrid identity services.
■ Authorization Mechanisms: This section covers permissions, rights, and
privileges; access control models; and access control policies.
■ Provisioning Life Cycle: This section describes the provisioning life cycle;
identity and account management; user, system, and service account access review;
account transfers; account revocation; role definition; and privilege escalation.
■ Access Control Threats: Concepts discussed include password threats,
social engineering threats, DoS/DDoS, buffer overflow, mobile code, mali-
cious software, spoofing, sniffing and eavesdropping, emanating, backdoor/
trapdoor, access aggregation, and advanced persistent threat (APT).
■ Prevent or Mitigate Access Control Threats: This section describes ways
to prevent or mitigate access control threats.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
CHAPTER 5
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
536 CISSP Cert Guide
Foundation Topics
2. Identify users.
Identify Resources
This first step in the access control process involves identifying all resources in the
IT infrastructure by deciding which entities need to be protected. When identifying
these resources, you must also consider how the resources will be accessed. You can
use the following questions as a starting point during resource identification:
■ Will this information be accessed by members of the general public?
■ Should access to this information be restricted to employees only?
■ Should access to this information be restricted to a smaller subset of
employees?
Keep in mind that data, applications, services, servers, and network devices are all
considered resources. Resources are any organizational asset that users can access or
request access to. In access control, resources are often referred to as objects, and the
requesting service or person as a subject.
Identify Users
After identifying the resources, an organization should identify the users who need
access to the resources. The organization may also identify devices and services that
will need access to resources. A typical security professional must manage multiple
levels of users who require access to organizational resources. During this step, only
identifying the users, devices, and services is important. The level of access these
users will be given will be analyzed further in the next step. In access control, users,
devices, and services are often referred to as subjects.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 537
As part of this step, you must analyze and understand the users’ needs and then mea-
sure the validity of those needs against organizational needs, policies, legal issues,
data sensitivity, and risk.
Remember that any access control strategy and the system deployed to enforce it
should avoid complexity. The more complex an access control system is, the harder
that system is to manage. In addition, anticipating security issues that could occur
in more complex systems is much harder. As a security professional, you must bal-
ance the organization’s security needs and policies with the needs of the users. If a
security mechanism that you implement causes too much difficulty for the user, the
user might engage in practices that subvert the mechanisms that you implement.
For example, if you implement a password policy that requires a very long, complex
password, users might find remembering their passwords to be difficult. Users might
then write their passwords on sticky notes that are attached to their monitor or
keyboard.
NOTE Physical and logical access controls are covered in more depth in Chapter 1,
“Security and Risk Management.”
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
538 CISSP Cert Guide
Centralized
In centralized access control, a central department or personnel oversee the access
for all organizational resources. This administration method ensures that user access
is controlled in a consistent manner across the entire enterprise and applies to every
single employee, including the CEO. However, centralized access control can be
slow because all access requests have to be processed by the central entity. Any hack
or disruption in the central entity’s security can also disrupt the entire organization.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 539
Decentralized
In decentralized access control, personnel closest to the resources, such as depart-
ment managers and data owners, oversee the access control for individual resources.
This administration method ensures that those who know the data control the
access rights to the data. However, decentralized access control can be hard to
manage because there is no single entity responsible for configuring access rights.
Decentralized access control thereby loses the uniformity and fairness of security.
Some companies may implement a hybrid approach that includes both centralized
and decentralized access control. In this deployment model, centralized administra-
tion is used for basic access, but granular access to individual assets, such as data on a
departmental server, is handled by the data owner as decentralized access.
Information
To fully protect information that is stored on an organization’s network, servers,
or other devices, security professionals must provide both physical and logical
access controls. The physical access controls, such as placing devices in a locked
room, protect the devices on which the information resides. The logical access
controls—such as deploying data or drive encryption, transport encryption, ACLs,
and firewalls—protect the data from unauthorized access.
The value of the information being protected will likely determine the controls that
an organization is willing to deploy. For example, regular correspondence on a cli-
ent computer will likely not require the same controls as financial data stored on a
server. For the client computer, the organization may simply deploy a local software
firewall and appropriate ACL permissions on the local folders and files. For the
server, the organization may need to deploy more complex measures, including drive
encryption, transport encryption, ACLs, and other measures.
Systems
To fully protect the systems that the organization uses, including client and server
computers, security professionals may rely on both physical and logical access con-
trols. However, some systems, like client computers, may be deployed in such a
manner that only minimal physical controls are used. If a user is granted access to
a building, that user may find client computers being used in nonsecure cubicles
throughout the building. For these systems, a security professional must ensure that
the appropriate authentication mechanisms are deployed. If confidential information
is stored on the client computers, data encryption should also be deployed. But only
the organization can best determine which controls to deploy on individual client
computers.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
540 CISSP Cert Guide
Devices
As with systems, physical access to devices is best provided by placing the devices in
a secure room. Logical access to devices is provided by implementing the appropri-
ate ACL or rule list, authentication, and encryption, as well as securing any remote
interfaces that are used to manage the device. In addition, security professionals should
ensure that the default accounts and passwords are changed or disabled on all devices.
For any IT professionals that need to access the device, a user account should be
configured for the professional with the appropriate level of access needed. If a
remote interface is used, make sure to enable encryption, such as SSL, to ensure that
communication via the remote interface is not intercepted and read. Security profes-
sionals should closely monitor vendor announcements for any devices to ensure that
the devices are kept up to date with the latest security patches and firmware updates.
Facilities
With facilities, the primary concern is physical access, which can be provided using
locks, fencing, bollards, guards, and closed-circuit television (CCTV). Many orga-
nizations think that such measures are enough. But with today’s advanced industrial
control systems and the Internet of Things (IoT), organizations must also consider
any devices involved in facility security. If an organization has an alarm/security
system that allows remote viewing access from the Internet, the appropriate logical
controls must be in place to prevent a malicious user from accessing the system and
changing its settings or from using the system to gain inside information about the
facility layout and day-to-day operations. If the organization uses an industrial con-
trol system (ICS), logical controls should also be a priority. Security professionals
must work with organizations to ensure that physical and logical controls are imple-
mented appropriately to ensure that the entire facility is protected.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 541
Applications
Applications are installed digitally on devices. Logical access involves controlling
who can digitally access or install applications on a device. For organizations, these
applications may require that security professionals use IAM solutions to permit
or deny access to users and roles. Permission may be limited to using the application
or may be as expansive as allowing the users to install applications. These applica-
tions may use enterprise IAM or an in-application mechanism. Security profession-
als may need to use group policies to control the ability to install the applications on
Windows devices. Physical access to applications is a slightly different matter. Some
applications are installed via digital media. Security professionals should ensure that
the media is stored in a secured location, such as a locked filing cabinet. Physical
access to an application can also be obtained by gaining physical access to a device
on which the application is installed. Devices should be configured to enter sleep or
standby mode after a certain amount of user inactivity. In addition, users should be
trained to digitally lock their devices when they leave their desks. This would ensure
that an unauthorized user is not able to access the application.
Security professionals should help establish the appropriate physical and logical
controls for all applications.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
542 CISSP Cert Guide
NIST SP 800-63
NIST Special Publication (SP) 800-63 provides a suite of technical requirements
for federal agencies implementing digital identity services, including an overview
of identity frameworks; using authenticators, credentials, and assertions in digital
systems. In July 2017, NIST finalized the four-volume SP 800-63 entitled “Digital
Identity Guidelines.” The four volumes in this SP are as follows:
■ SP 800-63 Digital Identity Guidelines: Provides the risk assessment meth-
odology and an overview of general identity frameworks, using authenticators,
credentials, and assertions together in a digital system, and a risk-based process
of selecting assurance levels. SP 800-63 contains both normative and informa-
tive material.
■ SP 800-63A Enrollment and Identity Proofing: Addresses how applicants
can prove their identities and become enrolled as valid subjects within an iden-
tity system. It provides requirements for processes by which applicants can
both proof and enroll at one of three different levels of risk mitigation in both
remote and physically present scenarios. SP 800-63A contains both normative
and informative material.
■ SP 800-63B Authentication and Life Cycle Management: Addresses how
an individual can securely authenticate to a credential service provider (CSP)
to access a digital service or set of digital services. This volume also describes
the process of binding an authenticator to an identity. SP 800-63B contains
both normative and informative material.
■ SP 800-63C Federation and Assertions: Provides requirements on the
use of federated identity architectures and assertions to convey the results of
authentication processes and relevant identity information to an agency appli-
cation. Furthermore, this volume offers privacy-enhancing techniques to share
information about a valid, authenticated subject, and describes methods that
allow for strong multifactor authentication (MFA) while the subject remains
pseudonymous to the digital service. SP 800-63C contains both normative and
informative material.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 543
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
544 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 545
Users should be encouraged to make their passwords as lengthy as they want, within
reason. Since the size of a hashed password is independent of its length, there is no
reason not to permit the use of lengthy passwords (or passphrases) if the user wishes.
Extremely long passwords (perhaps megabytes in length) could conceivably require
excessive processing time to hash, so it is reasonable to have some limit.
Composition rules are commonly used in an attempt to increase the difficulty of
guessing user-chosen passwords. Research has shown, however, that users respond
in very predictable ways to the requirements imposed by composition rules. For
example, a user who might have chosen the word “password” as a password may
choose “Password1” if required to include an uppercase letter and a number, or
“Password1!” if a symbol is also required.
Users also express frustration when attempts to create complex passwords are
rejected by online services. Many services reject passwords with spaces and various
special characters. In some cases, not accepting certain special characters might be
an effort to avoid attacks, like SQL injection, that use the characters as reserved
words in SQL programming language. But a properly hashed password would not
be sent intact to a database in any case, so such precautions are unnecessary. Users
should also be able to include space characters to allow the use of phrases. Spaces
themselves, however, add little to the complexity of passwords and may introduce
usability issues (e.g., the undetected use of two spaces rather than one), so it may be
beneficial to remove repeated spaces in typed passwords prior to verification.
Most users’ password choices can be somewhat predictable depending on their hob-
bies and social interactions, so attackers are likely to guess passwords that have been
successful in the past. They include dictionary words and passwords from previ-
ous breaches, such as the “Password1!” discussed in the previous example. For this
reason, it is recommended that passwords chosen by users be compared against a
“black list” of unacceptable passwords that the organization has adopted and docu-
mented. This list should include passwords from previous breach corpuses, diction-
ary words, and specific words (such as the name of the service itself) that users are
likely to choose. Because user choice of passwords will also be governed by a mini-
mum length requirement, this dictionary need only include entries meeting that
requirement.
Highly complex memorized secrets introduce a new potential vulnerability: they are
less likely to be memorable, and it is more likely that they will be written down or
stored electronically in an unsafe manner. Although these practices are not necessar-
ily vulnerable, statistically some methods of recording such secrets will be. Prevent-
ing such a vulnerability is an additional motivation not to require excessively long or
complex memorized secrets.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
546 CISSP Cert Guide
Another factor that determines the strength of memorized secrets is the process
by which they are generated. Secrets that are randomly chosen (in most cases by
the verifier and are uniformly distributed) will be more difficult to guess or brute-
force attack than user-chosen secrets meeting the same length and complexity
requirements.
NOTE Originally, there were three factors (something you know, something you
have, and something you are). They were referred to as Type I, Type II, and Type
III factors, respectively. However, modern technology has forced the security field
to recently recognize two additional factors: somewhere you are and the time of
authentication.
Knowledge Factors
As briefly described in the preceding section, knowledge factor authentication is
authentication that is provided based on something that a person knows. Although
the most popular form of authentication used by this category is password authen-
tication, other knowledge factors can be used, including date of birth, mother’s
maiden name, key combination, or PIN.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
548 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 549
NOTE An older term that you might need to be familiar with is clipping level. A clip-
ping level is a configured baseline threshold above which violations will be recorded.
For example, an organization might want to start recording any unsuccessful login
attempts after the first one, with account lockout occurring after five failed attempts.
This concept is referred to as rate limiting in NIST SP 800-63, which is discussed
later in this chapter.
Depending on which servers are used to manage the enterprise, security profession-
als must be aware of the security issues that affect user account and password man-
agement. Two popular server operating systems are Linux and Windows.
For Linux, passwords are stored in the /etc/passwd or /etc/shadow file. Because the
/etc/passwd file is a text file that can be easily accessed, you should ensure that
any Linux servers use the /etc/shadow file where the passwords in the file can be
protected using a hash. The root user in Linux is a default account that is given
administrative-level access to the entire server. If the root account is compromised,
all passwords should be changed. Access to the root account should be limited only
to system administrators, and root login should be allowed only via a local system
console, not remotely.
For Windows computers that are in workgroups, the Security Accounts Manager
(SAM) stores user passwords in a hashed format. However, known security issues
exist with a SAM, including the ability to dump the password hashes directly from
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
550 CISSP Cert Guide
Ownership Factors
Ownership factor authentication is authentication that is provided based on some-
thing that a person has. Ownership factors can include token devices, memory cards,
phones, keys, fobs, and smart cards.
Memory Cards
A memory card is a swipe card that is issued to valid users. The card contains user
authentication information. When the card is swiped through a card reader, the
information stored on the card is compared to the information that the user enters.
If the information matches, the authentication server approves the login. If it does
not match, authentication is denied.
Because the card must be read by a card reader, each computer or access device must
have its own card reader. In addition, the cards must be created and programmed.
Both of these steps add complexity and cost to the authentication process. However,
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 551
it is often worth the extra complexity and cost for the added security it provides,
which is a definite benefit of this system. However, the data on the memory cards is
not protected, a weakness that organizations should consider before implementing
this type of system. Memory-only cards can be counterfeited.
Smart Cards
Similar to a memory card, a smart card accepts, stores, and sends data but can hold
more data than a memory card. Smart cards, often known as integrated circuit cards
(ICCs), contain memory like a memory card but also contain an embedded chip
like bank or credit cards. Smart cards use card readers. However, the data on the
smart card is used by the authentication server without user input. To protect against
lost or stolen smart cards, most implementations require the user to input a secret
PIN, meaning the user is actually providing both a knowledge (PIN) and ownership
(smart card) authentication factor.
Two basic types of smart cards are used: contact cards and contactless cards. Contact
cards require physical contact with the card reader, usually by swiping. Contactless
cards, also referred to as proximity cards, simply need to be in close proximity to the
reader. Hybrid cards are available that allow a card to be used in both contact and
contactless systems.
For comparative purposes, security professionals should remember that smart cards
have processing power due to the embedded chips. Memory cards do not have
processing power. Smart card systems are much more reliable than memory card
systems.
Smart cards are even more expensive to implement than memory cards. Many
organizations prefer smart cards over memory cards because they are harder to
counterfeit and the data on them can be protected using a variety of encryption
methods.
Characteristic Factors
Characteristic factor authentication is authentication that is provided based on
something that a person is. Biometric technology is the technology that allows users
to be authenticated based on physiological or behavioral characteristics. Physiologi-
cal characteristics include any unique physical attribute of the user, including iris,
retina, and fingerprints. Behavioral characteristics measure a person’s actions in a
situation, including voice patterns and data entry characteristics.
Biometric technologies are now common in some of the most popular operating
systems. Examples include Windows Hello and Apple’s Touch ID and Face ID tech-
nologies. As a security professional, you need to be aware of such new
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
552 CISSP Cert Guide
Physiological Characteristics
Physiological systems use a biometric scanning device to measure certain
information about a physiological characteristic. You should understand the
following physiological biometric systems:
■ Fingerprint
■ Finger scan
■ Hand geometry
■ Hand topography
■ Palm or hand scans
■ Facial scans
■ Retina scans
■ Iris scans
■ Vascular scans
A fingerprint scan usually scans the ridges of a finger for matching. A special type
of fingerprint scan called minutiae matching is more microscopic in that it records
the bifurcations and other detailed characteristics. Minutiae matching requires more
authentication server space and more processing time than ridge fingerprint scans.
Fingerprint scanning systems have a lower user acceptance rate than many systems
because users are concerned with how the fingerprint information will be used and
shared.
A finger scan extracts only certain features from a fingerprint. Because a limited
amount of the fingerprint information is needed, finger scans require relatively less
server space or processing time than any type of fingerprint scan.
A hand geometry scan usually obtains size, shape, or other layout attributes of a
user’s hand but can also measure bone length or finger length. Two categories of
hand geometry systems are mechanical and image-edge detective systems. Regard-
less of which category is used, hand geometry scanners require less server space and
processing time than fingerprint or finger scans.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 553
A hand topography scan records the peaks and valleys of the hand and its shape.
This system is usually implemented in conjunction with hand geometry scans
because hand topography scans are not unique enough if used alone.
A palm or hand scan combines fingerprint and hand geometry technologies.
It records fingerprint information from every finger as well as hand geometry
information.
A facial scan records facial characteristics, including bone structure, eye width, and
forehead size. This biometric method uses eigenfeatures or eigenfaces. Neither
of these methods actually captures a real picture of a face. With eigenfeatures, the
distance between facial features is measured and recorded. With eigenfaces, mea-
surements of facial components are gathered and compared to a set of standard
eigenfaces. For example, a person’s face might be composed of the average face plus
21 percent from eigenface 1, 83 percent from eigenface 2, and –18 percent from
eigenface 3. Many facial scan biometric devices use a combination of eigenfeatures
and eigenfaces for better security.
A retina scan scans the retina’s blood vessel pattern. A retina scan is considered more
intrusive than an iris scan.
An iris scan scans the colored portion of the eye, including all rifts, coronas, and fur-
rows. Iris scans have a higher accuracy than any other biometric scan.
A vascular scan scans the pattern of veins in the user’s hand or face. Although this
method can be a good choice because it is not very intrusive, physical injuries to the
hand or face, depending on which the system uses, could cause false rejections.
Behavioral Characteristics
Behavioral systems use a biometric scanning device to measure a person’s actions.
You should understand the following behavioral biometric systems:
■ Signature dynamics
■ Keystroke dynamics
■ Voice pattern or print
Signature dynamics measure stroke speed, pen pressure, and acceleration and decel-
eration while users write their signatures. Dynamic signature verification (DSV)
analyzes signature features and specific features of the signing process.
Keystroke dynamics measure the typing pattern that a user uses when inputting a
password or other predetermined phrase. In this case, even if the correct password
or phrase is entered but the entry pattern on the keyboard is different, the user
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
554 CISSP Cert Guide
will be denied access. Flight time, a term associated with keystroke dynamics, is the
amount of time it takes to switch between keys. Dwell time is the amount of time you
hold down a key.
Voice pattern or print measures the sound pattern of a user stating a certain word.
When the user attempts to authenticate, that user will be asked to repeat those
words in different orders. If the pattern matches, authentication is allowed.
Biometric Considerations
When considering biometric technologies, security professionals should understand
the following terms:
■ Enrollment time: The process of obtaining the sample that is used by the
biometric system. This process requires actions that must be repeated several
times.
■ Feature extraction: The approach to obtaining biometric information from a
collected sample of a user’s physiological or behavioral characteristics.
■ Biometric accuracy: The most important characteristic of biometric systems. It
is how correct the overall readings will be.
■ Biometric throughput rate: The rate at which the biometric system will be
able to scan characteristics and complete the analysis to permit or deny access.
The acceptable rate is 6–10 subjects per minute. A single user should be able
to complete the process in 5–10 seconds.
■ Biometric acceptability: The likelihood that users will accept and follow the
system.
■ False rejection rate (FRR): A measurement of valid users that will be falsely
rejected by the system. This is called a Type I error.
■ False acceptance rate (FAR): A measurement of the percentage of invalid users
that will be falsely accepted by the system. This is called a Type II error. Type
II FAR errors are more dangerous than Type I FRR errors.
■ Crossover error rate (CER): The point at which FRR equals FAR. Expressed
as a percentage, this is the most important metric. It shows the accuracy at
which the system functions.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 555
However, you should also consider how effective each biometric system is and its
level of user acceptance. The more popular biometric methods are ranked here by
effectiveness, with the most effective being first:
1. Iris scan
2. Retina scan
3. Fingerprint
4. Hand print
5. Hand geometry
6. Voice pattern
7. Keystroke pattern
8. Signature dynamics
The more popular biometric methods ranked by user acceptance follow, with the
methods that are ranked more popular by users being first:
1. Voice pattern
2. Keystroke pattern
3. Signature dynamics
4. Hand geometry
5. Hand print
6. Fingerprint
7. Iris scan
8. Retina scan
When considering FAR, FRR, and CER, smaller values are better. FAR errors are
more dangerous than FRR errors. Security professionals can use the CER for com-
parative analysis when helping their organization decide which system to imple-
ment. For example, voice print systems usually have higher CERs than iris scans,
hand geometry, or fingerprints.
Figure 5-1 shows the biometric enrollment and authentication process.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
556 CISSP Cert Guide
Capture biometric
data from user.
Process the
biometric images.
The matcher
compares the
captured template to
the stored template.
If match is found,
user is allowed
access. If match is
not found, user is
denied access.
Location Factors
Location factor authentication provides a means of authenticating the user based on
the location from which the user is authenticating. This could include the computer
or device the person is using or the geographic location based on GPS coordinates.
The primary appeal to this type of authentication is that it limits the user to logging
in from those certain locations only. This type of authentication is particularly use-
ful in large manufacturing environments for users who should log in to only certain
terminals in the facility.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 557
Geo-fencing is one example of the use of location factors. With geo-fencing, devices
operate correctly following is a list of within the geo-fence boundaries. If a device
enters or exits the geo-fenced area, an alert is generated and sent to the operator.
Time Factors
Time factor authentication authenticates a user based on the time and/or date the user
is authenticating. For example, if certain users work only a set schedule, you can
configure their accounts to allow them to log in only during those set work hours.
However, keep in mind that such a limitation could cause administrative issues if
overtime hours are allowed. Some organizations implement this type of authentica-
tion effectively by padding the allowed hours with an hour or two leeway for the
start and end times. Credit cards use this feature effectively to protect their custom-
ers. If transactions take place in a short timeframe from geographically dispersed
locations, credit cards will often block the second transaction.
Device Authentication
Device authentication, also referred to as endpoint authentication, is a form of
authentication that relies on the identity of the device as part of the authentication
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
558 CISSP Cert Guide
process. With device authentication, the identity of the device from which a user
logs in is included as part of the authentication process, thereby providing two-
factor authentication using the device and user’s credentials. If the user then
attempts to log in from a different device, the authentication system recognizes that
a new device is being used and asks the user to provide extra authentication verifica-
tion information, usually an answer to a security question. The user is usually then
given the option to include this device in the authentication (if the device is a pri-
vate device) or not (if the device is a public device). In this manner, the device itself
becomes a security token and, as such, becomes a “something you have” authentica-
tion factor.
Security professionals should not confuse device authentication with a system that
uses a known mobile device or email to provide a one-time password or PIN needed
for authentication. When a system transmits the one-time password or PIN that
must be used as part of authentication to a mobile device or via email, this is just
another authentication factor, not device authentication. With this system, the user
registers a mobile device number or email address with the authentication system.
When the user logs in, that user usually provides two factors of authentication. After
authentication of the initial factors is completed, the one-time password or PIN is
transmitted to the known device or email, which the user must input as part of a sec-
ond authentication interface.
Separation of Duties
Separation of duties is an important concept to keep in mind when designing an
organization’s authentication and authorization policies. Separation of duties pre-
vents fraud by distributing tasks and their associated rights and privileges between
two or more users. This separation helps deter fraud and collusion because any
fraudulent act can occur only if there is collusion. A good example of separation of
duties is authorizing one person to manage backup procedures and another to man-
age restore procedures.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 559
Separation of duties is associated with dual controls and split knowledge. With dual
controls, two or more users are authorized and required to perform certain func-
tions. For example, a retail establishment might require two managers to open the
safe. Split knowledge ensures that no single user has all the information to perform a
particular task. An example of a split control is the military’s requiring two individu-
als to each enter a unique combination to authorize missile firing.
Least Privilege/Need-to-Know
The principle of least privilege requires that a user or process is given only the
minimum required access needed to perform a particular task. Its main purpose is to
ensure that users have access only to the resources they need and are authorized to
perform only the tasks they need to perform. To properly implement the least privi-
lege principle, organizations must identify all users’ jobs and restrict users only to
the identified privileges.
The need-to-know principle is closely associated with the privilege allocation given
to the users. Although least privilege seeks to reduce access to a minimum, the need-
to-know principle actually defines what the minimum privileges for each job or
business function are. Excessive privileges become a problem when a user has more
rights, privileges, and permissions than that user needs to do the job. Excessive privi-
leges are hard to control in large environments.
In a common implementation of the least privilege and need-to-know principles, for
example, a system administrator is issued both an administrative-level account and a
normal user account. In most day-to-day functions, the administrator should use the
normal user account. When needing to perform administrative-level tasks, the sys-
tem administrator should use the administrative-level account. If the administrator
uses the administrative-level account while performing routine tasks, the admin risks
compromising the security of the system and user accountability.
Organizational rules that support the principle of least privilege include the
following:
■ Keep the number of administrative accounts to a minimum.
■ Administrators should use normal user accounts when performing routine
operations.
■ Permissions on tools that are likely to be used by attackers should be as restric-
tive as possible.
To more easily support the least privilege and need-to-know principles, users should
be divided into groups to facilitate the confinement of information to a single group
or area. This process is referred to as compartmentalization.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
560 CISSP Cert Guide
Default to No Access
During the authorization process, you should configure an organization’s access
control mechanisms so that the default level of security is to default to no access. This
means that if nothing has been specifically allowed for a user or group, then the user
or group cannot access the resource. The best security approach is to start with no
access and add rights based on a user’s need to know and least privilege needed to
accomplish his daily tasks.
Directory Services
A directory service is a database designed to centralize data management regarding
network subjects and objects. A typical directory contains a hierarchy that includes
users, groups, systems, servers, client workstations, and so on. Because the directory
service contains data about users and other network entities, it can be used by many
applications that require access to that information.
The most common directory service standards are
■ X.500
■ Lightweight Directory Access Protocol (LDAP)
■ X.400
■ Active Directory Domain Services (AD DS)
X.500 uses the Directory Access Protocol (DAP). In X.500, the distinguished name
(DN) provides the full path in the X.500 database where the entry is found. The
relative distinguished name (RDN) in X.500 is an entry’s name without the full path.
Based on X.500’s DAP, LDAP is simpler than X.500. LDAP supports DN and RDN,
but includes more attributes such as the common name (CN), domain component
(DC), and organizational unit (OU) attributes. Using a client/server architecture,
LDAP uses TCP port 389 to communicate. If advanced security is needed, LDAP
over SSL communicates via TCP port 636.
X.400 is mainly for message transfer and storage. It uses elements to create a series
of name/value pairs separated by semicolons. X.400 has gradually been replaced by
Simple Mail Transfer Protocol (SMTP) implementations.
Microsoft’s implementation of LDAP is Active Directory Domain Services (AD
DS), which stores and organizes directory data into trees and forests. It also manages
logon processes and authentication between users and domains and allows adminis-
trators to logically group users and devices into organizational units.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 561
Single Sign-on
In a single sign-on (SSO) environment, a user enters login credentials once and can
access all resources in the network. The Open Group Security Forum has defined
many objectives for an SSO system. Some of the objectives for the user sign-on
interface and user account management include the following:
■ The interface should be independent of the type of authentication information
handled.
■ The creation, deletion, and modification of user accounts should be supported.
■ Support should be provided for a user to establish a default user profile.
■ Accounts should be independent of any platform or operating system.
NOTE To obtain more information about the Open Group’s Single Sign-On Stan-
dard, you should access the website at www.opengroup.org/security/sso_scope.htm.
Although the discussion on SSO so far has been mainly about how it is used for
networks and domains, SSO can also be implemented in web-based systems. Enter-
prise access management (EAM) provides access control management for web-based
enterprise systems. Its functions include accommodation of a variety of authentica-
tion methods and role-based access control.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
562 CISSP Cert Guide
Kerberos
Kerberos is an authentication protocol that uses a client/server model developed
by MIT’s Project Athena. It is the default authentication model in recent editions
of Windows Server and is also used in Apple, Oracle, and Linux operating systems.
Kerberos is an SSO system that uses symmetric key cryptography, and it provides
confidentiality and integrity.
Kerberos assumes that messaging, cabling, and client computers are not secure and
are easily accessible. In a Kerberos exchange involving a message with an authentica-
tor, the authenticator contains the client ID and a timestamp. Because a Kerberos
ticket is valid for a certain time, the timestamp ensures the validity of the request.
In a Kerberos environment, the Key Distribution Center (KDC) is the repository
for all user and service secret keys. The client sends a request to the authentication
server (AS), which might or might not be the KDC. The AS forwards the client
credentials to the KDC. The KDC authenticates clients to other entities on a net-
work and facilitates communication using session keys. The KDC provides security
to clients or principals, which are users, network services, and software. Each prin-
cipal must have an account on the KDC. The KDC issues a ticket-granting ticket
(TGT) to the principal. The principal will send the TGT to the ticket-granting
service (TGS) when the principal needs to connect to another entity. The TGS then
transmits a ticket and session keys to the principal. The set of principles for which a
single KDC is responsible is referred to as a realm.
Some advantages of implementing Kerberos include the following:
■ User passwords do not need to be sent over the network.
■ Both the client and server authenticate each other.
■ The tickets passed between the server and client are time-stamped and include
lifetime information.
■ The Kerberos protocol uses open Internet standards and is not limited to pro-
prietary codes or authentication mechanisms.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 563
■ The KDC must be scalable to ensure that performance of the system does not
degrade.
■ Session keys on the client machines can be compromised.
■ Kerberos traffic needs to be encrypted to protect the information over the
network.
■ All systems participating in the Kerberos process must have synchronized
clocks.
■ Kerberos systems are susceptible to password-guessing attacks.
An encrypted ticket-
granting ticket (TGT) is
sent to the user.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
564 CISSP Cert Guide
SESAME
The Secure European System for Applications in a Multi-vendor Environment
(SESAME) project extended the functionality of Kerberos to fix its weaknesses.
SESAME uses both symmetric and asymmetric cryptography to protect inter-
changed data. SESAME uses a trusted authentication server at each host.
SESAME uses Privileged Attribute Certificates (PACs) instead of tickets. It incorpo-
rates two certificates: one for authentication and one for defining access privileges.
The trusted authentication server is referred to as the Privileged Attribute Server
(PAS), which performs roles similar to the KDC in Kerberos. SESAME can be inte-
grated into a Kerberos system.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 565
and standards define how to provision and manage user identification, authentica-
tion, and authorization. Federated identity management uses two basic models
for linking organizations within the federation: the cross-certification model and
trusted third-party (or bridge) model. Through this model, an SSO system can be
implemented.
In the cross-certification federated identity model, each organization certifies that
every other organization is trusted. This trust is established when the organizations
review each other’s standards. Each organization must verify and certify through due
diligence that the other organizations meet or exceed standards. One disadvantage
of cross certification is that the number of trust relationships that must be managed
can become a problem. In addition, verifying the trustworthiness of other organiza-
tions can be time-consuming and resource intensive.
In the trusted third-party (or bridge) federated identity model, each organization
subscribes to the standards of a third party. The third party manages verification,
certification, and due diligence for all organizations. This model is usually the best if
an organization needs to establish federated identity management relationships with
a large number of organizations.
Security Assertion Markup Language (SAML) 2.0 is an SAML standard that
exchanges authentication and authorization data between organizations or secu-
rity domains. It uses an XML-based protocol to pass information about a principal
between an SAML authority and a web service via security tokens. In SAML 2.0,
there are three roles: the principal or user, the identity provider, and the service pro-
vider. The service provider requests identity verification from the identity provider.
SAML is very flexible because it is based on XML. If an organization implements
enterprise SAML identity federation, the organization can select which identity
attributes to share with another organization.
Security Domains
A domain is a set of resources that is available to a subject over a network. Subjects
that access a domain include users, processes, and applications. A security domain is
a set of resources that follows the same security policies and is available to a subject.
The domains are usually arranged in a hierarchical structure of parent and child
domains.
NOTE Do not confuse the term security domain with protection domain. Although a
security domain usually encompasses a network, a protection domain resides within
a single resource. A protection domain is a group of processes that shares access to the
same resource.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
566 CISSP Cert Guide
Session Management
Session management ensures that any instance of identification and authentication
to a resource is managed properly. This process includes managing desktop sessions
and remote sessions.
Desktop sessions should be managed through a variety of mechanisms. Screensavers
allow computers to be locked if left idle for a certain period of time. To reactivate a
computer, the user must log back in. Screensavers are one kind of timeout mecha-
nism, and other timeout features may also be used, such as shutting down or placing
a computer in hibernation after a certain period. Session or logon limitations allow
organizations to configure how many concurrent sessions a user can have. Schedule
limitations allow organizations to configure the time during which a user can access
a computer.
Remote sessions usually incorporate some of the same mechanisms as desktop ses-
sions. However, remote sessions do not occur at the computer itself. Rather, they are
carried out over a network connection. Remote sessions should always use secure
connection protocols. In addition, if users will only be connecting remotely from
certain computers, the organization may want to implement some type of rule-based
access that allows only certain connections.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 567
Both of these NIST publications are intended to guide federal government agencies
in their proof of identity efforts and can also be used by private organizations to aid
in the development of their own systems.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
568 CISSP Cert Guide
NOTE RADIUS and TACACS+ are covered in more detail in Chapter 4, “Commu-
nication and Network Security.”
Accountability
Accountability is an organization’s ability to hold users responsible for the actions
they perform before and after they are authorized. To ensure that users are
accountable for their actions, organizations must implement auditing and other
accountability mechanisms.
Organizations could implement any combination of the following components:
■ Strong identification: All users should have their own accounts. Group or
role accounts cannot be traced back to a single individual.
■ Strong authentication: Multifactor authentication is best. At minimum,
two-factor authentication should be implemented.
■ Monitoring: User actions should be monitored, including login, privilege
use, and other actions. Users should be warned as part of a no-expectation-of-
privacy statement that all actions can be monitored.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 569
■ Audit logs: Audit logs should be maintained and stored according to organi-
zational security policies. Administrators should periodically review these logs
and adjust authorizations of users accordingly.
NOTE Scrubbing is the act of deleting incriminating data within an audit log.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
570 CISSP Cert Guide
Audit trails detect computer penetrations and reveal actions that identify misuse. As
a security professional, you should use the audit trails to review patterns of access to
individual objects. To identify abnormal patterns of behavior, you should first iden-
tify normal patterns of behavior. Also, you should establish the clipping level, which
is a baseline of user errors above which violations will be recorded. For example,
your organization might choose to ignore the first invalid login attempt, know-
ing that initial failed login attempts are often due to user error. Any further invalid
login attempts after the first would be recorded because they could be a sign of an
attack. A common clipping level that is used is three failed login attempts. For secu-
rity purposes, any failed login attempt above the limit of three would be considered
malicious. In most cases, a lockout policy would lock out a user’s account after this
clipping level is reached.
Audit trails deter attacker attempts to bypass the protection mechanisms that are
configured on a system or device. As a security professional, you should specifically
configure the audit trails to track system/device rights or privileges being granted to
a user, and data additions, deletions, or modifications.
Finally, audit trails must be monitored, and automatic notifications should be con-
figured. If no one monitors the audit trail, then the data recorded in the audit trail is
useless. Certain actions should be configured to trigger automatic notifications. For
example, you might want to configure an email alert to occur after a certain number
of invalid login attempts because invalid login attempts might be a sign that a brute-
force password attack is occurring.
Just-In-Time (JIT)
Just-In-Time (JIT) access enables organizations to grant access to applications or
systems for predetermined periods of time, on an as-needed basis. With JIT provi-
sioning, if a user does not already have an account in a target application, the IAM
system creates the account for a user on the fly when the user first accesses the
application. JIT uses the SAML protocol to transmit information from the identity
provider to the web application. The web application receives the information from
the identity provider via SAML assertions.
Using a cloud identity provider with JIT is the most streamlined approach because
admins can configure application permissions by role or group and revoke appli-
cation access from one central location. Although setting up a JIT configuration
between the identity and service providers can be tedious, administrative effort will
be saved in the long run when each user is provisioned automatically.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 571
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
572 CISSP Cert Guide
Authorization Mechanisms
Authorization mechanisms are systems an organization deploys to control which
systems a user or device can access. Authorization mechanisms include access con-
trol models and access control policies.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 573
The access control models and concepts that you need to understand include the
following:
■ Discretionary access control
■ Mandatory access control
■ Role-based access control
■ Rule-based access control
■ Attribute-based access control
■ Content-dependent versus context-dependent access control
■ Risk-based access control
■ Access control matrix
■ Capabilities table
■ ACL
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
574 CISSP Cert Guide
MAC is more secure than DAC. DAC is more flexible and scalable than MAC.
Because of the importance of security in MAC, labeling is required. Data classifica-
tion reflects the data’s sensitivity. In a MAC system, a clearance is a subject’s privi-
lege. Each subject and object is given a security or sensitivity label. The security
labels are hierarchical. For commercial organizations, the levels of security labels
could be confidential, proprietary, corporate, sensitive, and public. For government
or military institutions, the levels of security labels could be top secret, secret, confi-
dential, and unclassified.
In MAC, the system makes access decisions when it compares the subject’s clearance
level with the object’s security label.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 575
use this type of access control and define which packet types are allowed on a net-
work. Rules can be written allowing or denying access based on packet type, port
number used, MAC address, and other parameters. Rules can be added, edited, or
deleted as required.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
576 CISSP Cert Guide
Access Control
Policy
Environment
Conditions
2a 2d
Rules
1 Decision Enforce
3
Subject Object
ABAC
2b Access Control 2c
Mechanism
ACLs and RBAC are in some ways special cases of ABAC in terms of the attributes
used. ACLs work on the attribute of “identity.” RBAC works on the attribute of
“role.” The key difference with ABAC is the concept of policies that express a com-
plex Boolean rule set that can evaluate many different attributes. While it is possible
to achieve ABAC objectives using ACLs or RBAC, demonstrating access control
requirements compliance is difficult and costly due to the level of abstraction
required between the access control requirements and the ACL or RBAC model.
Another problem with ACL or RBAC models is that if the access control require-
ments need to be changed depending on business demands or user changes, it may
be difficult to identify all the places where the ACL or RBAC implementation needs
to be updated.
ABAC relies on the assignment of attributes to subjects and objects, and the devel-
opment of policy that contains the access rules. Each object within the system must
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 577
be assigned specific object attributes that characterize the object. Some attributes
pertain to the entire instance of an object, such as the owner. Other attributes may
apply only to parts of the object.
Each subject that uses the system must be assigned specific attributes. Every object
within the system must have at least one policy that defines the access rules for the
allowable subjects, operations, and environment conditions to the object. This policy
is normally derived from documented or procedural rules that describe the business
processes and allowable actions within the organization. The rules that bind subject
and object attributes indirectly specify privileges (i.e., which subjects can perform
which operations on which objects). Allowable operation rules can be expressed
through many forms of computational language such as
■ A Boolean combination of attributes and conditions that satisfy the authoriza-
tion for a specific operation
■ A set of relations associating subject and object attributes and allowable
operations
After object attributes, subject attributes, and policies are established, objects can
be protected using ABAC. Access control mechanisms mediate access to the objects
by limiting access to allowable operations by allowable subjects. The access control
mechanism assembles the policy, subject attributes, and object attributes; then it ren-
ders and enforces a decision based on the logic provided in the policy. Access control
mechanisms must be able to manage the process required to make and enforce the
decision, including determining what policy to retrieve, which attributes to retrieve
in what order, and where to retrieve attributes. The access control mechanism must
then perform the computation necessary to render a decision.
The policies that can be implemented in an ABAC model are limited only to the
degree imposed by the computational language and the richness of the avail-
able attributes. This flexibility enables the greatest breadth of subjects to access
the greatest breadth of objects without having to specify individual relationships
between each subject and each object.
While ABAC is an enabler of information sharing, the set of components required
to implement ABAC gets more complex when deployed across an enterprise. At the
enterprise level, the increased scale requires complex and sometimes independently
established management capabilities necessary to ensure consistent sharing and use
of policies and attributes and the controlled distribution and employment of access
control mechanisms throughout the enterprise.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
578 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 579
Capabilities Table
A capability corresponds to a subject’s row from an access control matrix. A capabil-
ity table lists the access rights that a particular subject has to objects. A capability
table is about the subject.
ACL
An ACL corresponds to an object’s column from an access control matrix. An ACL
lists all the access rights that subjects have to a particular object; an ACL is about the
object.
Figure 5-4 shows an access control matrix and how a capability and ACL are part
of it.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
580 CISSP Cert Guide
A
C
L
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 581
Provisioning
User provisioning policies should be integrated as part of human resources man-
agement. Human resources policies should include procedures whereby the human
resources department formally requests the creation or deletion of a user account
when new personnel are hired or terminated.
Any identity management procedure must include processes for creating (provision-
ing), changing and monitoring (reviewing), and removing users, devices, and ser-
vices from the access control system (revoking). This procedure is referred to as the
provisioning life cycle. When initially establishing a user account, new users should
be required to provide valid photo identification and should sign a statement regard-
ing password confidentiality. For device and service accounts, the device or service
owner should request account creation. User, device, and service accounts must be
unique. Policies should be in place that standardize the structure of user, device, and
service accounts. For example, all user accounts should be firstname.lastname or some
other structure. This structure ensures that users within an organization will be able
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
582 CISSP Cert Guide
Account Transfers
Accounts, particularly user accounts, may need to be periodically transferred within
an organization. This is most often the case when personnel move from one depart-
ment or role to another. Procedures should be written so that the user account is
granted the appropriate permissions for the new department or role. In addition,
any unneeded permissions from the old department or role should be removed.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 583
Following this procedure ensures that privilege creep does not occur. Privilege
creep, also referred to as permissions creep, occurs when an employee moves
between roles in an organization and keeps the access or permissions of the
previous role.
Account Revocation
Account revocation, also referred to as deprovisioning, is the process of removing
an account from a device or enterprise. Because accounts are assigned unique IDs
in most operating systems, it is very important that security professionals ensure
that accounts are no longer needed prior to deletion. Countless stories exist where
accounts were deleted and then access to certain resources was lost. Even if an
administrator re-creates an account with the same account name, it will not have the
same unique ID that was assigned to the original account. Therefore, the adminis-
trator would still be unable to access resources owned by the original account.
Organizations should adopt formal policies on account revocation. These policies
should be implemented as part of any employee termination policy.
Role Definition
Role definition is the process of establishing what roles are needed and document-
ing the permissions and privileges of those roles. Roles may be organizational or
departmental. Roles will then need to be created and assigned the appropriate rights.
After roles are defined and created, user or group accounts must be assigned to the
roles. It is important that security professionals ensure that appropriate procedures
are in place for adding users or groups to roles. However, having procedures in place
for removing users or groups from roles is just as important. These procedures also
act as a protection against privilege creep, mentioned earlier.
Regular monitoring of the roles should occur to ensure that a particular role is
assigned only to those accounts that belong in that role and that all created roles are
still valid. Roles can be created in applications, devices, and computers.
Privilege Escalation
Privilege escalation, also referred to as privilege creep or permissions creep, is a situation
in which a user account has accumulated permissions over time, thereby resulting in
an account with unnecessary elevated permissions and privileges. It most often is the
result of a user being granted new permissions without having current permissions
examined and revoked as needed. User accounts with this condition are a security
hole just waiting for an attacker to exploit.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
584 CISSP Cert Guide
Two types of privilege escalation can occur: horizontal and vertical. In horizontal
privilege escalation, a hacker uses the privilege escalation account to access other
accounts that have the same permissions. In vertical privilege escalation, a valid
user or hacker uses the privilege escalation account to obtain more privileges, such
as through a system or administrative account. This is the most worrying form of
privilege escalation because the hacker can cause immense system damage, change
account settings, access sensitive and confidential information, and even disseminate
malware throughout the network.
Managed service accounts should be carefully monitored for privilege escalation.
Because these accounts are critical to the operation of the service, security
administrators are often reluctant to remove permissions.
In addition, privilege escalation may result in the compromise of an administrator-
level account. It is important that users use their account with administrator-level
permissions only when tasks that require those permissions must be completed.
In other cases, they should use the lower-level account. This includes the default
Administrator account in Windows and the root account in Linux.
When it comes to working with Linux, there are two ways to run administrative
applications: (1) change over to the super user, also known as the root account, using
the su command with a known password for the root or super user account, or (2)
use the sudo command. With the sudo command, the user uses their regular or
another user account but with root privilege. However, with the su command, the
user is actually logged in to the root account. Also, the root privilege in the sudo
command is valid only for a temporary amount of time. When that time expires, the
user has to input a password again to regain root privilege.
Security professionals should ensure that use of the su command is greatly
restricted. While the sudo command is a better choice, users should still use it only
when it is strictly necessary.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 585
■ DoS/DDoS
■ Buffer overflow
■ Mobile code
■ Malicious software
■ Spoofing
■ Sniffing and eavesdropping
■ Emanating
■ Backdoor/trapdoor
Password Threats
A password threat is any attack that attempts to discover user passwords. The two
most popular password threats are dictionary attacks, brute-force attacks, birthday
attacks, rainbow table attacks, and sniffer attacks.
The best countermeasures against password threats are to implement complex pass-
word policies, require users to change passwords on a regular basis, employ account
lockout policies, encrypt password files, and use password-cracking tools to discover
weak passwords.
Dictionary Attack
A dictionary attack occurs when attackers use a dictionary of common words to
discover passwords. An automated program uses the hash of the dictionary word and
compares this hash value to entries in the system password file. Although the pro-
gram comes with a dictionary, attackers also use extra dictionaries that are found on
the Internet.
You should implement a security rule that says that a password must not be a word
found in the dictionary file to protect against these attacks. You can also implement
an account lockout policy so that an account is locked out after a certain number of
invalid login attempts.
Brute-Force Attack
Brute-force attacks are more difficult to carry out because they work through
all possible combinations of numbers and characters. A brute-force attack is also
referred to as an exhaustive attack. It carries out password searches until a correct
password is found. These attacks are also very time-consuming.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
586 CISSP Cert Guide
Birthday Attack
A birthday attack compares the values that attackers have against a set of password
hashes for which they know the passwords. Eventually, the attackers will find a pass-
word that matches. To protect against birthday attacks, implement encryption on the
transmission. The attack gets its name from the likelihood of a group of users using
the same password, similar to the likelihood of a group of users assembled in a room,
having the same birthday, often referred to as the birthday paradox.
Sniffer Attack
A sniffer attack in the context of password attacks simply uses a sniffer to capture
an unencrypted or plaintext password. Security professionals should periodically use
sniffers to see whether they can determine passwords using these tools. Encryption
of the password transmission prevents this type of attack.
Phishing/Pharming
Phishing is a social engineering attack in which attackers try to learn personal infor-
mation, including credit card information and financial data. This type of attack
is usually carried out by implementing a fake website that very closely resembles
a legitimate website. Users enter data, including credentials, on the fake website,
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 587
Shoulder Surfing
Shoulder surfing occurs when an attacker watches a user enter login or other con-
fidential data. To avoid the attack, a corporation should encourage users to always
be aware of who is observing their actions. Implementing privacy screens helps to
ensure that data entry cannot be recorded.
Identity Theft
Identity theft occurs when someone obtains personal information, including driver’s
license number, bank account number, and Social Security number, and uses that
information to assume the identity of the individual whose information was stolen.
After the identity is assumed, the attack can go in any direction. In most cases,
attackers open financial accounts in the user’s name. Attackers also can gain access to
the user’s valid accounts.
Dumpster Diving
Dumpster diving occurs when attackers examine garbage contents to obtain
confidential information, such as personnel information, account login information,
network diagrams, and organizational financial data.
Organizations should implement policies for shredding documents that contain this
information.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
588 CISSP Cert Guide
DoS/DDoS
A denial-of-service (DoS) attack occurs when attackers flood a device with enough
requests to degrade the performance of the targeted device. Some popular DoS
attacks include SYN floods and teardrop attacks.
A distributed DoS (DDoS) attack is a DoS attack that is carried out from multiple
attack locations. Vulnerable devices are infected with software agents, called zom-
bies. They turn the vulnerable devices into botnets, which then carry out the attack.
Because of the geographically distributed bots and the very nature of the attack,
identifying all the attacking botnets is virtually impossible. The botnets also help to
hide the original source of the attack.
Buffer Overflow
Buffers are portions of system memory that are used to store information. A buf-
fer overflow occurs when the amount of data that is submitted to the application is
larger than the buffer can handle. Typically, this type of attack is possible because
of poorly written application or operating system code. This attack can result in an
injection of malicious code.
To protect against this issue, organizations should ensure that all operating systems
and applications are updated with the latest service packs, updates, and patches. In
addition, programmers should properly test all applications to check for overflow
conditions. Finally, programmers should use input validation to ensure that the data
submitted is not too large for the buffer.
Mobile Code
Mobile code is any software that is transmitted across a network to be executed
on a local system. Examples of mobile code include Java applets, JavaScript code,
and ActiveX controls. Mobile code includes security controls, Java sandboxes, and
ActiveX digital code signatures. Malicious mobile code can be used to bypass access
controls.
Organizations should ensure that users understand the security concerns of mali-
cious mobile code. Users should download mobile code only from legitimate sites
and vendors.
NOTE For more information about mobile code, see the section, “Mobile Code,” in
Chapter 8, “Software Development Security.”
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 589
Malicious Software
Malicious software, also called malware, is any software that is designed to perform
malicious acts.
The following are the five classes of malware you should understand:
■ Virus: Any malware that attaches itself to another application to replicate or
distribute itself.
■ Worm: Any malware that replicates itself, meaning that it does not need
another application or human interaction to propagate.
■ Trojan horse: Any malware that disguises itself as a needed application while
carrying out malicious actions.
■ Spyware: Any malware that collects private user data, including browsing
history login credentials, website data, or keyboard input.
■ Ransomware: Any malware that prevents or limits users’ access to their
systems or devices. Usually, it forces victims to pay the ransom for the return
of system access.
Spoofing
Spoofing, also referred to as masquerading, occurs when communication from an
attacker appears to come from trusted sources. Spoofing examples include IP spoof-
ing and hyperlink spoofing. The goal of this type of attack is to obtain access to
credentials or other personal information.
A man-in-the-middle attack uses spoofing as part of the attack. Some security
professionals consider phishing attacks as a type of spoofing attack.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
590 CISSP Cert Guide
Organizations should monitor and limit the use of sniffers. To protect against their
use, you should encrypt all inbound and outbound traffic on the network.
Emanating
Emanations are electromagnetic signals that are emitted by an electronic device.
Attackers can target certain devices or transmission mediums to eavesdrop on
communication without having physical access to the device or medium.
The TEMPEST program, initiated by the United States and UK, researches ways
to limit emanations and standardizes the technologies used. Any equipment that
meets TEMPEST standards suppresses signal emanations using shielding material.
Devices that meet TEMPEST standards usually implement an outer barrier or coat-
ing, called a Faraday cage or Faraday shield. TEMPEST devices are most often used
in government, the military, or in law enforcement.
Backdoor/Trapdoor
A backdoor or trapdoor is a mechanism implemented in many devices or applications
that gives the user who uses the backdoor unlimited access to the device or applica-
tion. Privileged backdoor accounts are the most common method of backdoor that
you will see today.
Most established vendors no longer release devices or applications with this security
issue. You should be aware of any known backdoors in the devices or applications
you manage.
Access Aggregation
Access aggregation is a term that is often used synonymously with privilege creep.
Access aggregation occurs when users gain more access across more systems. It
can be intentional, as when single sign-on is implemented, or unintentional, when
users are granted more rights without first checking and considering the rights that
they already have. Privilege or authorization creep occurs when users are given new
rights without having their old rights revoked. So privilege creep is actually a subset
of access aggregation.
To protect against access aggregation, organizations should implement permissions/
rights policies that review an account when permissions or rights changes—both in
escalation and de-escalation—are requested. Administrators should ensure that any
existing permissions or rights that the user no longer needs are removed. For exam-
ple, if a user is moving from the accounting department to the sales department, the
user account should no longer have permissions or rights to accounting resources.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 591
Security professionals should work with data owners and data custodians to ensure
that the appropriate policies are implemented.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
592 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 593
access aggregation; access control; access control list (ACL); access control
matrix; access control policy; advanced persistent threat (APT); attribute-based
access control (ABAC); authentication; authorization; backdoor; biometric
acceptability; biometric accuracy; biometric throughput rate; birthday attack;
brute-force attack; buffer overflow; capability table; centralized access control;
characteristic factors; context-dependent access control; cross-certification fed-
erated identity model; crossover error rate (CER); decentralized access control;
device authentication; deprovisioning; dictionary attack; discretionary access
control (DAC); dumpster diving; false acceptance rate (FAR); false rejection rate
(FRR); federated identity management (FIM); identification; Identity as a Service
(IDaaS); Kerberos; knowledge factors; least privilege; Lightweight Directory
Access Protocol (LDAP); location factors; logical control; mandatory access con-
trol (MAC); multifactor authentication (MFA); need-to-know; ownership factors;
password masking; pharming; phishing; physical control; privilege creep; pro-
visioning; provisioning life cycle; rainbow table attack; ransomware; revocation;
role-based access control (RBAC); rule-based access control; Secure European
System for Applications in a Multi-vendor Environment (SESAME); Security
Assertion Markup Language (SAML); security domain; separation of duties;
shoulder surfing; single-factor authentication; single sign-on (SSO); sniffer
attack; spyware; trapdoor; Trojan horse; virus; vishing; whaling; worm
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
594 CISSP Cert Guide
2. Which of the following statements about memory cards and smart cards is
false?
a. A memory card can be a swipe card that contains user authentication
information.
b. Memory cards are also known as integrated circuit cards (ICCs).
c. Smart cards contain memory and an embedded chip.
d. Smart card systems are more reliable than memory card systems.
5. Which access control model is a desirable model used by routers and firewalls
to control access to secure networks?
a. Discretionary access control
b. Mandatory access control
c. Role-based access control
d. Rule-based access control
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 595
9. You decide to implement an access control policy that requires that users log
on from certain workstations within your organization’s facility. Which type of
authentication factor are you implementing?
a. Knowledge factor
b. Location factor
c. Ownership factor
d. Characteristic factor
11. Which session management mechanisms are often used to manage desktop
sessions?
a. Screensavers and timeouts
b. FIPS 201.2 and NIST SP 800-79-2
c. Bollards and locks
d. KDC, TGT, and TGS
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
596 CISSP Cert Guide
13. Which type of attack is carried out from multiple locations using zombies and
botnets?
a. TEMPEST
b. DDoS
c. Backdoor
d. Emanating
14. Which type of attack is one in which an unauthorized person gains access to
a network and remains for a long period of time with the intention of stealing
data?
a. APT
b. ABAC
c. Access aggregation
d. FIM
15. Which of the following is a formal process for creating, changing, and remov-
ing users that includes user approval, user creation, user creation standards,
and authorization?
a. NIST SP 800-63
b. Centralized access control
c. Decentralized access control
d. Provisioning life cycle
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 5: Identity and Access Management (IAM) 597
2. b. Memory cards are not also known as integrated circuit cards (ICCs). Smart
cards are also known as ICCs.
3. a. Iris scans are considered more effective as far as accuracy than retina scans,
fingerprints, and hand prints.
4. b. A Type I error in a biometric system is false rejection rate (FRR). A Type II
error in a biometric system is false acceptance rate (FAR). Crossover error rate
(CER) is the point at which FRR equals FAR. Throughput rate is the rate at
which users are authenticated.
5. d. Rule-based access control is a desirable model used by routers and firewalls
to control access to networks. The other three types of access control models
are not usually implemented by routers and firewalls.
6. c. A denial-of-service (DoS) attack is not considered a social engineering
threat. The other three options are considered to be social engineering threats.
7. c. An Identity as a Service (IDaaS) implementation provides a set of identity
and access management functions to target systems on customers’ premises
and/or in the cloud. Session management ensures that any instance of
identification and authentication to a resource is managed properly. A proof of
identity process collects and verifies information about an individual to prove
that the person who has a valid account is who that person claims to be.
8. b. Using a username, retina scan, and smart card is an example of multifactor
authentication. The username is something you know, the retina scan is some-
thing you are, and the smart card is something you have.
9. b. You are implementing a location factor, which is based on where a person is
located when logging in.
10. d. A brute-force attack is considered a password threat.
11. a. Desktop sessions can be managed through screensavers, timeouts, logon,
and schedule limitations. FIPS PUB 201.2 and NIST SP 800-79-2 are docu-
ments that provide guidance on proof of identity. Physical access to facilities
can be provided securely using locks, fencing, bollards, guards, and CCTV. In
Kerberos, the Key Distribution Center (KDC) issues a ticket-granting ticket
(TGT) to the principal. The principal sends the TGT to the ticket-granting
service (TGS) when the principal needs to connect to another entity.
12. d. If a user’s credentials are compromised in a single sign-on (SSO) environ-
ment, attackers have access to all resources to which the user has access. All
other choices are advantages to implementing an SSO system.
13. b. A distributed DoS (DDoS) attack is a DoS attack that is carried out from
multiple attack locations. Vulnerable devices are infected with software agents,
called zombies. They turn the vulnerable devices into botnets, which then
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
598 CISSP Cert Guide
carry out the attack. Devices that meet TEMPEST standards implement an
outer barrier or coating, called a Faraday cage or Faraday shield. A backdoor
or trapdoor is a mechanism implemented in many devices or applications that
gives the user who uses the backdoor unlimited access to the device or appli-
cation. Emanations are electromagnetic signals that are emitted by an elec-
tronic device. Attackers can target certain devices or transmission mediums to
eavesdrop on communication without having physical access to the device or
medium.
14. a. An advanced persistent threat (APT) is an attack in which an unauthorized
person gains access to a network and remains for a long period of time with
the intention of stealing data. Attribute-based access control (ABAC) grants
or denies user requests based on arbitrary attributes of the user and arbitrary
attributes of the object, and environment conditions that may be globally rec-
ognized. Access aggregation is a term that is often used synonymously with
privilege creep. Access aggregation occurs when users gain more access across
more systems. In federated identity management (FIM), each organization that
joins the federation agrees to enforce a common set of policies and standards.
These policies and standards define how to provision and manage user identi-
fication, authentication, and authorization.
15. d. The provisioning life cycle is a formal process for creating, changing, and
removing users. This process includes user approval, user creation, user cre-
ation standards, and authorization. Users should sign a written statement that
explains the access conditions, including user responsibilities. NIST SP 800-63
provides a suite of technical requirements for federal agencies implementing
digital identity services, including an overview of identity frameworks; and
using authenticators, credentials, and assertions in digital systems. In central-
ized access control, a central department or personnel oversee the access for all
organizational resources. This administration method ensures that user access
is controlled in a consistent manner across the entire enterprise. In decentral-
ized access control, personnel closest to the resources, such as department
managers and data owners, oversee the access control for individual resources.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
This page intentionally left blank
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
This chapter covers the following topics:
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
CHAPTER 6
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
602 CISSP Cert Guide
Foundation Topics
Security Testing
Security testing ensures that a control is functioning properly. Both manual and
automatic security testing can be performed. Security testing should be carried out
on a regular basis and should be performed on all types of devices.
When performing security testing, security professionals should understand that
testing will affect the performance of the devices involved in the security tests.
Security testing cannot always be performed during nonpeak hours. Performing this
testing only during nonpeak hours could also result in skewed results.
Security professionals should consider the following factors when performing
security testing:
■ Impact
■ Difficulty
■ Time needed
■ Changes that could affect the performance
■ System risk
■ System criticality
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 6: Security Assessment and Testing 603
After security tests are performed, security professionals should analyze the results
and make appropriate recommendations based on those results. In addition, the
security testing tools themselves can be configured to send alerts or messages based
on preconfigured triggers or filters. Without proper analysis, security testing does
not provide a benefit to the organization.
Security Assessments
Security assessments are the reviews of the security status and reports for a system,
application, or other environment. During this assessment, a security professional
will review the results of the security tests, identify any vulnerabilities, and make
recommendations for remediation. Security testing leads to security assessments.
Security professionals should prepare a formal security assessment report that
includes all of the identified issues and recommendations. Also, they should
document the actions taken based on the recommendations.
Some organizations use a Purple Team instead of Red Team versus Blue Team. In a
Purple Team, the Red Team and Blue Team come together to align their strategies
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
604 CISSP Cert Guide
and expertise (see Figure 6-2). The Purple Team will develop both offensive and
defensive exercises.
Figure 6-2 Red and Blue Mixed Equals Purple (the Same Team Develops Offensive and
Defensive Tactics)
Security Auditing
According to National Institute of Standards and Technology (NIST), a security
audit is an “[i]ndependent review and examination of a system’s records and activities
to determine the adequacy of system controls, ensure compliance with established
security policy and procedures, detect breaches in security services, and recommend
any changes that are indicated for countermeasures.” Like security assessment and
testing, it can be performed internally, externally, and via a third party. Security
auditing is covered in more detail later in this chapter and in Chapter 7, “Security
Operations.”
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 6: Security Assessment and Testing 605
Vulnerability Assessment
A vulnerability assessment helps to identify the areas of weakness in a network. It
can also help to determine asset prioritization within an organization. A comprehen-
sive vulnerability assessment is part of the risk management process. But for access
control, security professionals should use vulnerability assessments that specifically
target the access control mechanisms.
Vulnerability assessments usually fall into one of three categories:
■ Personnel testing: Reviews standard practices and procedures that users
follow.
■ Physical testing: Reviews facility and perimeter protections.
■ System and network testing: Reviews systems, devices, and network
topology.
The security analyst who will be performing a vulnerability assessment must under-
stand the systems and devices that are on the network and the jobs they perform.
The analyst needs this information to be able to assess the vulnerabilities of the
systems and devices based on the known and potential threats to the systems and
devices.
After gaining knowledge regarding the systems and devices, the security analyst
should examine existing controls in place and identify any threats against these con-
trols. The security analyst can then use all the information gathered to determine
which automated tools to use to search for vulnerabilities. After the vulnerability
analysis is complete, the security analyst should verify the results to ensure that
they are accurate and then report the findings to management, with suggestions for
remedial action. With this information in hand, the analyst should carry out threat
modeling to identify the threats that could negatively affect systems and devices and
the attack methods that could be used.
Vulnerability assessment applications include Nessus, Open Vulnerability Assess-
ment System (OpenVAS), Core Impact, Nexpose, GFI LanGuard, and Qualys
Cloud Platform. Of these applications, OpenVAS is free.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
606 CISSP Cert Guide
When selecting a vulnerability assessment tool, you should research the following
metrics: accuracy, reliability, scalability, and reporting. Accuracy is the most impor-
tant metric. A false positive generally results in time spent researching an issue that
does not exist. A false negative is more serious, because it means the scanner failed to
identify an issue that poses a serious security risk.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 6: Security Assessment and Testing 607
open ports. It is also advisable to close any ports not required, or ports that are open
by default but not used, for the system to do its job.
Network discovery tools can perform the following types of scans:
■ TCP SYN scan: Sends a packet to each scanned port with the SYN flag set. If
a response is received with the SYN and ACK flags set, the port is open.
■ TCP ACK scan: Sends a packet to each port with the ACK flag set. If no
response is received, then the port is marked as filtered. If an RST response is
received, then the port is marked as unfiltered.
■ Xmas scan: Sends a packet with the FIN, PSH, and URG flags set. If the port
is open, there is no response. If the port is closed, the target responds with a
RST/ACK packet.
The result of this type of scan is primarily for security professionals to determine
whether ports are open that should be closed.
The most widely used network discovery scanning tool is Nmap.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
608 CISSP Cert Guide
Some scanners can do both agent-based and server-based scanning (also called
agentless or sensor-based scanning).
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 6: Security Assessment and Testing 609
Penetration Testing
The goal of penetration testing, which also relates to ethical hacking, is to simulate
an attack to identify any threats that can stem from internal or external resources
planning to exploit the vulnerabilities of a system or device.
The steps in performing a penetration test are as follows:
1. Obtain written consent from management.
3. Gather information about attack methods against the target system or device.
This step includes performing port scans.
4. Identify the known vulnerabilities of the target system or device.
5. Execute attacks against the target system or device to gain user and privileged
access.
6. Document the results of the penetration test and report the findings to
management, with suggestions for remedial action.
Both internal and external tests should be performed. Internal tests occur from
within the network, whereas external tests originate outside the network and target
the servers and devices that are publicly visible.
Strategies for penetration testing are based on the testing objectives defined by the
organization. The strategies that you should be familiar with include the following:
■ Blind test: The testing team is provided with limited knowledge of the
network systems and devices that use publicly available information. The
organization’s security team knows in advance about a simulated attack
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
610 CISSP Cert Guide
(or attacks). This test requires more effort by the testing team, and the team
must simulate an actual attack.
■ Double-blind test: This test is like a blind test except that the organization’s
security team does not know that an attack is coming. Only a few individuals in
the organization know about the attack, and they do not share this information
with the security team. This test usually requires equal effort for both the test-
ing team and the organization’s security team.
■ Target test: Both the testing team and the organization’s security team are
given maximum information about the network and the type of attack that will
occur. This test is the easiest to complete but does not provide a full picture of
the organization’s security.
Penetration testing is also divided into categories based on the amount of informa-
tion to be provided. The main categories that you should be familiar with include
the following:
■ Zero-knowledge test: The testing team is provided with no knowledge
regarding the organization’s network map. The testing team can use any means
available to obtain information about the organization’s network. This type is
also referred to as closed, or black-box, testing.
■ Partial-knowledge test: The testing team is provided with public knowledge
regarding the organization’s network. Boundaries might be set for this type of
test. It is also referred to as gray-box testing.
■ Full-knowledge test: The testing team is provided with all available knowledge
regarding the organization’s network, map, and its topology. This test is
focused more on what attacks can be carried out. It is also referred to as
white-box testing.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 6: Security Assessment and Testing 611
Log Reviews
A log is a physical or electronic recording of events that occur on an organizational
asset, including systems, networks, devices, and facilities. Each entry in a log covers a
single event that occurs on the asset. In most cases, there are separate logs for differ-
ent event types, including security logs, operating system logs, and application logs.
Because so many logs are generated on a single device, many organizations have
trouble ensuring that the logs are reviewed in a timely manner. Log review, however,
is probably one of the most important steps an organization can take to ensure that
issues are detected before they become major problems.
Computer security logs are particularly important because they can help an orga-
nization identify security incidents, policy violations, and fraud. Log management
ensures that computer security logs, whether they show any errors or have normal
operational procedures, are stored in sufficient detail for an appropriate period of
time so that auditing, forensic analysis, investigations, baselines, trends, and long-
term problems can be identified.
NIST has provided two special publications that relate to log management: NIST
SP 800-92, “Guide to Computer Security Log Management,” and NIST SP 800-
137, “Information Security Continuous Monitoring (ISCM) for Federal Information
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
612 CISSP Cert Guide
Systems and Organizations.” Although both of these special publications are primar-
ily used by federal government agencies and organizations, other organizations may
want to use them as well because of the wealth of information they provide. The
following section covers NIST SP 800-92, and NIST SP 800-137 is discussed later
in this chapter.
NIST SP 800-92
NIST SP 800-92 makes the following recommendations for more efficient and
effective log management:
■ Organizations should establish policies and procedures for log management.
As part of the planning process, an organization should
■ Define its logging requirements and goals.
■ Develop policies that clearly define mandatory requirements and
suggested recommendations for log management activities.
■ Ensure that related policies and procedures incorporate and support the
log management requirements and recommendations.
■ Management should provide the necessary support for the efforts involving
log management planning, policy, and procedures development.
■ Organizations should prioritize log management appropriately throughout the
organization.
■ Organizations should create and maintain a log management infrastructure.
■ Organizations should provide proper support for all staff with log manage-
ment responsibilities.
■ Organizations should establish standard log management operational
processes. This includes ensuring that administrators
■ Monitor the logging status of all log sources.
■ Monitor log rotation and archival processes.
■ Check for upgrades and patches to logging software and acquire, test, and
deploy them.
■ Ensure that each logging host’s clock is synchronized to a common time
source.
■ Reconfigure logging as needed based on policy changes, technology
changes, and other factors.
■ Document and report anomalies in log settings, configurations, and
processes.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 6: Security Assessment and Testing 613
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
614 CISSP Cert Guide
their logs to the server, which usually involves each host authenticating to the
server and transferring its logs regularly. Regardless of whether the logs are
pushed or pulled, the server then performs event filtering and aggregation and
log normalization and analysis on the collected logs.
■ Agent-based: An agent program is installed on the host to perform event
filtering and aggregation and log normalization for a particular type of log.
The host then transmits the normalized log data to the SIEM server, usually
on a real-time or near-real-time basis for analysis and storage. Multiple agents
may need to be installed if a host has multiple types of logs of interest. Some
SIEM products also offer agents for generic formats such as syslog and Simple
Network Management Protocol (SNMP). A generic agent is used primarily to
get log data from a source for which a format-specific agent and an agentless
method are not available. Some products also allow administrators to create
custom agents to handle unsupported log sources.
There are advantages and disadvantages to each method. The primary advantage
of the agentless approach is that agents do not need to be installed, configured, and
maintained on each logging host. The primary disadvantage is the lack of filtering
and aggregation at the individual host level, which can cause significantly larger
amounts of data to be transferred over networks and increase the amount of time it
takes to filter and analyze the logs. Another potential disadvantage of the agentless
method is that the SIEM server may need credentials for authenticating to each log-
ging host. In some cases, only one of the two methods is feasible; for example, there
might be no way to remotely collect logs from a particular host without installing an
agent onto it.
SIEM products usually include support for several dozen types of log sources, such
as OSs, security software, application servers (e.g., web servers, email servers), and
even physical security control devices such as badge readers. For each supported log
source type, except for generic formats such as syslog, the SIEM products typically
know how to categorize the most important logged fields. This approach signifi-
cantly improves the normalization, analysis, and correlation of log data over that
performed by software with a less granular understanding of specific log sources and
formats. Also, the SIEM software can perform event reduction by disregarding data
fields that are not significant to computer security, potentially reducing the SIEM
software’s network bandwidth and data storage usage.
Typically, system, network, and security administrators are responsible for managing
logging on their systems, performing regular analysis of their log data, documenting
and reporting the results of their log management activities, and ensuring that log
data is provided to the log management infrastructure in accordance with the orga-
nization’s policies. In addition, some of the organization’s security administrators act
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 6: Security Assessment and Testing 615
Organizations should develop and enforce policies that clearly define mandatory
requirements and suggested recommendations for several aspects of log manage-
ment, including log generation, log transmission, log storage and disposal, and log
analysis. Table 6-3 gives examples of logging configuration settings that an organi-
zation can use. The types of values defined in Table 6-3 should only be applied to
the hosts and host components previously specified by the organization as ones that
must or should log security-related events.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
616 CISSP Cert Guide
Synthetic Transactions
Synthetic transaction monitoring, which is a type of proactive monitoring, is often
preferred for websites and applications. It provides insight into the availability
and performance of an application and warns of any potential issue before users
experience any degradation in application behavior. It uses external agents to run
scripted transactions against an application. For example, Microsoft’s System Center
Operations Manager uses synthetic transactions to monitor databases, websites, and
TCP port usage.
In contrast, real user monitoring (RUM), which is a type of passive monitoring,
captures and analyzes every transaction of every application or website user. Unlike
synthetic monitoring, which attempts to gain performance insights by regularly test-
ing synthetic interactions, RUM cuts through the guesswork by seeing exactly how
users are interacting with the application.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 6: Security Assessment and Testing 617
though it can be equally effective when done properly. Code review methods include
the following:
■ Over-the-shoulder: One developer looks over the author’s shoulder as the
author walks through the code.
■ Email pass-around: Source code is emailed to reviewers automatically after
the code is checked in.
■ Pair programming: Two authors develop code together at the same
workstation.
■ Tool-assisted code review: Authors and reviewers use tools designed for peer
code review.
■ Black-box testing, or zero-knowledge testing: The team is provided with no
knowledge regarding the organization’s application. The team can use any
means at its disposal to obtain information about the organization’s applica-
tion. This is also referred to as closed testing.
■ White-box testing: The team goes into the process with a deep understanding
of the application or system. Using this knowledge, the team builds test cases
to exercise each path, input field, and processing routine.
■ Gray-box testing: The team is provided more information than in black-box
testing, while not as much as in white-box testing. Gray-box testing has the
advantage of being nonintrusive while maintaining the boundary between
developer and tester. On the other hand, it may uncover some of the problems
that might be discovered with white-box testing.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
618 CISSP Cert Guide
Other types of testing include dynamic versus static testing and manual versus
automatic testing.
2. Overview
3. Prepare
4. Inspect
5. Rework
6. Follow-up
Most organizations do not strictly adhere to the Fagan inspection process. Each orga-
nization should adopt a code review process fitting for its business requirements. The
more restrictive the environment, the more formal the code review process should be.
Static Testing
Static testing analyzes software security without actually running the software. This
analysis is usually provided by reviewing the source code or compiled application.
Automated tools are used to detect common software flaws. Static testing tools
should be available throughout the software design process.
Dynamic Testing
Dynamic testing analyzes software security in the runtime environment. With this
testing, the tester does not have access to the application’s source code.
Dynamic testing often includes the use of synthetic transactions, which are scripted
transactions that have an expected outcome. These synthetic transactions are exe-
cuted against the code to be tested, and the output is then compared to the expected
output. Any discrepancies between the two outputs should be investigated for pos-
sible source code flaws.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 6: Security Assessment and Testing 619
Fuzz Testing
Fuzz testing is a dynamic testing tool that provides input to the software to test the
software’s limits and discover flaws. The input provided can be randomly generated
by the tool or specially created to test for known vulnerabilities.
Fuzz testers include Untidy and Peach Fuzzer.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
620 CISSP Cert Guide
been written. In addition, this analysis looks at a structure or function that already
exists and not those that do not yet exist.
Interface Testing
Interface testing evaluates whether an application’s systems or components cor-
rectly pass data and control to one another. It verifies whether module interactions
are working properly and errors are handled correctly. Interfaces that should be
tested include client interfaces, server interfaces, remote interfaces, graphical user
interfaces (GUIs), application programming interfaces (APIs), external and internal
interfaces, and physical interfaces.
GUI testing involves testing a product’s GUI to ensure that it meets its specifica-
tions through the use of test cases. API testing tests APIs directly in isolation and as
part of the end-to-end transactions exercised, during integration testing, to deter-
mine whether the APIs return the correct responses.
NIST SP 800-137
According to NIST SP 800-137, ISCM is defined as maintaining ongoing awareness
of information security, vulnerabilities, and threats to support organizational risk
management decisions.
Organizations should take the following steps to establish, implement, and maintain
ISCM:
1. Define an ISCM strategy based on risk tolerance that maintains clear visibility
into assets, awareness of vulnerabilities, up-to-date threat information, and
mission/business impacts.
2. Establish an ISCM program that includes metrics, status monitoring frequen-
cies, control assessment frequencies, and an ISCM technical architecture.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 6: Security Assessment and Testing 621
Account Management
Account management is important because it involves the addition and deletion of
accounts that are granted access to systems or networks. But account management
also involves changing the permissions or privileges granted to those accounts. If
account management is not monitored and recorded properly, organizations may
discover that accounts have been created by unauthorized persons or those with mis-
used privileges for the sole purpose of carrying out fraudulent or malicious activities.
Two-person controls should be used with account management, often involving
one administrator who creates accounts and another who assigns those accounts the
appropriate permissions or privileges.
Escalation and revocation are two terms that are important to security professionals.
Account escalation occurs when a user account is granted more permissions based
on new job duties or a complete job change. Security professionals should fully
analyze a user’s needs prior to changing the current permissions or privileges, mak-
ing sure to grant only permissions or privileges that are needed for the new task
and to remove those that are no longer needed. Without such analysis, users may
be able to retain permissions that cause possible security issues because separation
of duties is no longer retained. For example, suppose a user is hired in the accounts
payable department to print out all vendor checks. Later this user receives a pro-
motion to approve payment for the same accounts. If this user’s old permission
to print checks is not removed, this single user would be able to both approve the
checks and print them, which is a direct violation of separation of duties. Moreover,
when an employee moves from one department to another and the employee’s
old (unneeded) access privileges are not rescinded, this is referred to as escalating
privileges, which poses a serious risk to the organization. Today, many managers
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
622 CISSP Cert Guide
and supervisors are required to review and approve system access for each of their
employees—often on an annual basis.
Account revocation occurs when a user account is revoked because a user is no
longer with an organization. Security professionals must keep in mind that there
will be objects that belong to this user. If the user account is simply deleted, access
to the objects owned by the user may be lost. A better plan may be to disable the
account for a certain period. Account revocation policies should also distinguish
between revoking an account for a user who resigns from an organization or moves
to another unrelated department/branch and revoking an account for a user who is
terminated.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 6: Security Assessment and Testing 623
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
624 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 6: Security Assessment and Testing 625
■ Ensure that the auditor’s report reflects risks that the organization has
identified.
■ Ensure that the audit is conducted properly.
■ Ensure that the audit covers all systems and all policies and procedures.
■ Examine the report when the audit is complete.
Remember that internal audits are performed by personnel within the organization,
whereas external or third-party audits are performed by individuals outside the orga-
nization or another company. Both types of audits should occur.
Many regulations today require that audits occur. Organizations used to rely on
Statement on Auditing Standards (SAS) 70, which provided auditors information
and verification about data center controls and processes related to data center users
and their financial reporting. A SAS 70 audit verified that the controls and processes
set in place by a data center are actually followed. The Statement on Standards for
Attestation Engagements (SSAE) 16, Reporting on Controls at a Service Organiza-
tion, is a standard that verifies the controls and processes and also requires a writ-
ten assertion regarding the design and operating effectiveness of the controls being
reviewed.
An SSAE 16 audit results in a Service Organization Control (SOC) 1 report. This
report focuses on internal controls over financial reporting. There are two types of
SOC 1 reports:
■ SOC 1, Type 1 report: Focuses on the auditors’ opinion of the accuracy and
completeness of the data center management’s design of controls, system, and/
or service.
■ SOC 1, Type 2 report: Includes the Type 1 report as well as an audit of the
effectiveness of controls over a certain time period, normally between six
months and a year.
Two other report types are also available: SOC 2 and SOC 3. Both of these audits
provide benchmarks for controls related to the security, availability, processing
integrity, confidentiality, or privacy of a system and its information. A SOC 2 report
includes service auditor testing and results, and a SOC 3 report provides only the
system description and auditor opinion. A SOC 3 report is for general use and pro-
vides a level of certification for data center operators that assures data center users
of facility security, high availability, and process integrity. Table 6-5 briefly compares
the three types of SOC reports.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
626 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
628 CISSP Cert Guide
4. What are the two ways of collecting logs using security information and event
management (SIEM) products, according to NIST SP 800-92?
a. Passive and active
b. Agentless and agent-based
c. Push and pull
d. Throughput and rate
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 6: Security Assessment and Testing 629
9. Which of the following is not a guideline for internal, external, and third-party
audits?
a. Choose auditors with security experience.
b. Involve business unit managers early in the process.
c. At a minimum, perform biannual audits to establish a security baseline.
d. Ensure that the audit covers all systems and all policies and procedures.
10. Which SOC (Service Organization Control) report should be shared with the
general public?
a. SOC 1, Type 1
b. SOC 1, Type 2
c. SOC 2
d. SOC 3
11. Which of the following is the last step in performing a penetration test?
a. Document the results of the penetration test and report the findings to
management, with suggestions for remedial action.
b. Gather information about attack methods against the target system or
device.
c. Document information about the target system or device.
d. Execute attacks against the target system or device to gain user and
privileged access.
12. In which of the following does the testing team have zero knowledge of the
organization’s network?
a. Gray-box testing
b. Black-box testing
c. White-box testing
d. Physical testing
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
630 CISSP Cert Guide
13. Which of the following is defined as a dynamic testing tool that tests the
software’s limits and discovers flaws?
a. Interface testing
b. Static testing
c. Test coverage analysis
d. Fuzz testing
14. Which factors should security professionals follow when performing security
testing? (Choose all that apply.)
a. Changes that could affect the performance
b. System risk
c. Information sensitivity level
d. Likelihood of technical failure or misconfiguration
15. Which of the following can a hacker use to identify common vulnerabilities in
an operating system running on a host or server?
a. Operating system fingerprinting
b. Network discovery scan
c. Key performance and risk indicators
d. Third-party audits
4. b. The two ways of collecting logs using security information and event man-
agement (SIEM) products, according to NIST SP 800-92, are agentless and
agent-based.
5. a. Real user monitoring (RUM) captures and analyzes every transaction of
every application or website user.
6. d. Misuse case testing is also known as negative testing.
7. b. The steps in an ISCM program, according to NIST SP 800-137, are
1. Define an ISCM strategy.
2. Establish an ISCM program.
3. Implement an ISCM program and collect the security-related information
required for metrics, assessments, and reporting.
4. Analyze the data collected, report findings, and determine the appropriate
responses.
5. Respond to findings.
6. Review and update the monitoring program.
9. c. The following are guidelines for internal, external, and third-party audits:
■ At minimum, perform annual audits to establish a security baseline.
■ Determine your organization’s objectives for the audit and share them
with the auditors.
■ Set the ground rules for the audit, including the dates/times of the audit,
before the audit starts.
■ Choose auditors who have security experience.
■ Involve business unit managers early in the process.
■ Ensure that auditors rely on experience, not just checklists.
■ Ensure that the auditor’s report reflects risks that the organization has
identified.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
632 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 6: Security Assessment and Testing 633
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
This chapter covers the following topics:
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 635
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
This page intentionally left blank
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
CHAPTER 7
Security Operations
Security operations involves ensuring that all operations within an organization
are carried out in a secure manner. It is concerned with investigating, manag-
ing, and preventing events or incidents. It also covers logging activities as they
occur, provisioning and protecting resources as needed, managing events and
incidents, recovering from events and disasters, and providing physical security.
Ultimately, security operations involves the day-to-day operation of an organi-
zation. Security professionals should receive the appropriate training in these
areas or employ experts in them to ensure that the organization’s assets are
properly protected.
The Security Operations domain within CISSP addresses a broad array of
topics, including investigations, logging, monitoring, provisioning, security
operations concepts, resource protection, incident management, detective and
preventive measures, patch and vulnerability management, change management,
disaster recovery, business continuity, physical security, and personnel safety.
The Security Operations domain carries an average weight of 13 percent of
the CISSP certification exam, which is the third highest weight of all the eight
domains and is tied with two other domains. So, pay close attention to the many
details in this chapter!
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
638 CISSP Cert Guide
Foundation Topics
Investigations
Investigations must be carried out in the appropriate manner to ensure that any
evidence collected can be used in court. Without proper investigations and evidence
collection, attackers will not be held responsible for their actions. In the following
sections, we discuss forensic and digital investigations and evidence.
After law enforcement has been informed of a computer crime, the organization’s
investigator’s constraints are increased. You might need to turn the investigation
over to law enforcement to ensure that evidence is preserved properly.
In the investigation of a computer crime, evidentiary rules must be addressed. Com-
puter evidence should prove a fact that is material to the case and must be reliable.
The chain of custody must be maintained, as described later in the chapter. Com-
puter evidence is less likely to be admitted in court as evidence if the process for
producing the evidence has not been properly documented.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 639
2. Preservation
3. Collection
4. Examination
5. Analysis
6. Presentation
7. Decision
Identification
Preservation
Collection
Examination
Analysis
Presentation
Decision
The following sections cover these forensic investigation steps in detail as well as
explain forensic procedures, reporting and documentation, IOCE/SWGDE and
NIST, the crime scene, MOM, the chain of custody, interviewing, and investigative
techniques.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
640 CISSP Cert Guide
Identify Evidence
The first step in any forensic investigation is to identify and secure the crime scene
and identify the evidence. The evidence is identified by reviewing audit logs, moni-
toring systems, analyzing user complaints, and analyzing detection mechanisms.
Initially, the investigators might be unsure of which evidence is important. Preserv-
ing evidence that you might not need, which is the next step in the process, is always
better than wishing you had evidence that you did not retain. Therefore, a logical
first step in any investigation is identifying the evidence and securing the crime
scene.
In digital investigations, the attacked system is considered the crime scene. In some
cases, the system from which the attack originated can also be considered part of
the crime scene. However, fully capturing the attacker’s systems may not always be
possible. For this reason, you should ensure that you capture any data, such as IP
addresses, usernames, and other identifiers, that can point to a specific system.
2. Swap files
3. Network processes
4. System processes
To make system images, you need to use a tool that creates a bit-level copy of the
system. In most cases, you must isolate the system and remove it from production or
the live environment to create this bit-level copy. You should ensure that two cop-
ies of the image are retained. One copy of the image will be stored to ensure that
an undamaged, accurate copy is available as evidence. The other copy will be used
during the examination and analysis steps. Message digests should be used to ensure
data integrity.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 641
Although the system image is usually the most important piece of evidence, it is
not the only piece of evidence you need. You might also need to capture data that
is stored in cache, process tables, memory, and the registry. When documenting a
computer attack, you should use a bound notebook to keep notes.
Remember that you might need to include experts in digital investigations to ensure
that evidence is properly preserved and collected. Investigators usually assemble
a field kit to help in the investigation process. This kit might include tags and
labels, disassembly tools, and tamper-evident packaging. Commercial field kits are
available, or you could assemble your own based on organizational needs.
Present Findings
After an examination and analysis of the evidence, it must be presented as evidence
in court. In most cases when presenting evidence in court, presenting the findings in
a format the audience can understand is best. Although an expert should be used to
testify as to the findings, it is important that the expert be able to articulate to a
nontechnical audience the details of the evidence.
Decide
At the end of the court proceeding, a decision will be made as to the guilt or inno-
cence of the accused party. At that time, evidence may no longer need to be retained,
provided there is no possibility of an appeal. However, documenting any lessons
learned from the incident is important. Any individuals involved in any part of the
investigation should be a part of this lessons-learned session.
Forensic Procedures
Collecting digital evidence is trickier than collecting physical evidence and must be
completed by trained forensic technicians and investigators. These individuals must
stay abreast of the latest tools and technologies that can be used to investigate a
computer crime.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
642 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 643
Although the IOCE is no longer a functioning evidence body, it did establish some
principles that are still applicable today. The main principles as documented by
IOCE are as follows:
■ The general rules of evidence should be applied to all digital evidence.
■ Upon the seizure of digital evidence, any actions taken to preserve the
evidence should not change that evidence in any way.
■ When a person needs to access original digital evidence, that person should be
suitably trained and authorized for the purpose.
■ All activity relating to the seizure, access, storage, or transfer of digital
evidence must be fully documented, preserved, and available for review.
■ An individual is responsible for all actions taken with respect to digital
evidence while the digital evidence is in that individual’s possession.
■ Any agency that seizes, accesses, stores, or transfers digital evidence is
responsible for compliance with IOCE principles.
Crime Scene
A crime scene is the environment in which potential evidence exists. After the crime
scene has been identified, steps should be taken to ensure that the environment
is protected, including both the physical and virtual environment. To secure the
physical crime scene, an investigator might need to isolate the systems involved by
removing them from a network. However, the systems should not be powered down
until the investigator is sure that all digital evidence has been captured. Remember:
Live computer data is dynamic and is possibly stored in several volatile locations.
In response to a possible crime, it is important to ensure that the crime scene
environment is protected using the following steps:
1. Identify the crime scene.
3. Identify any pieces of evidence or potential sources of evidence that are part of
the crime scene.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
644 CISSP Cert Guide
Remember that there can be more than one crime scene, especially in digital crimes.
If an attacker breaches an organization’s network, all assets that were compromised
are part of the crime scene, and any assets that the attacker used are also part of the
crime scene.
Access to the crime scene should be tightly controlled and limited only to individu-
als who are vital to the investigation. As part of the documentation process, make
sure to note anyone who has access to the crime scene. After a crime scene is con-
taminated, no way exists to restore it to the original condition.
MOM
Documenting motive, opportunity, and means (MOM) is the most basic strategy for
determining suspects. Motive is all about why the crime was committed and who
committed the crime. Opportunity is all about where and when the crime occurred.
Means is all about how the crime was carried out by the suspect. Any suspect who
is considered must possess all three of these qualities. For example, a suspect might
have a motive for a crime (being dismissed from the organization) and an opportu-
nity for committing the crime (user accounts were not disabled properly) but might
not possess the means to carry out the crime.
Understanding MOM can help any investigator narrow down the list of suspects.
Chain of Custody
At the beginning of any investigation, you should ask the questions who, what,
when, where, and how. These questions can help you get all the data needed for
the chain of custody. The chain of custody shows who controlled the evidence, who
secured the evidence, and who obtained the evidence. A proper chain of custody
must be preserved to successfully prosecute a suspect. To preserve a proper chain of
custody, you must collect the evidence following predefined procedures in accor-
dance with all laws and regulations.
Chain of custody forms should be used to track who has access to the evidence,
when that access occurs, and other valuable details based on the organization’s or
investigation’s needs. This chain of custody form should be kept with the evidence
at all times. For example, if a forensic investigator plans to analyze the contents of
a digital log, that investigator should complete the appropriate information on the
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 645
chain of custody form to indicate when a copy of the digital log was obtained, the
type of analysis being performed, and other details.
The primary purpose of the chain of custody is to ensure that evidence is admissible
in court. Law enforcement officers emphasize chain of custody in any investigations
that they conduct. Involving law enforcement early in the process during an investi-
gation can help to ensure that the proper chain of custody is followed.
Interviewing
An investigation often involves interviewing suspects and witnesses. One person
should be in charge of all interviews. Because evidence needs to be obtained, ensur-
ing that the interviewer understands what information needs to be obtained and all
the questions to cover is important. Reading rights to a suspect is necessary only if
law enforcement is performing the interview. Recording the interview might be a
good idea to provide corroboration later when the interview is used as evidence.
If an employee is suspected of a computer crime, a representative of the human
resources department should be involved in any interrogation of the suspect.
The employee should be interviewed only by an individual who is senior to that
employee.
Investigative Techniques
A computer crime involves the use of investigative techniques, which include inter-
viewing (discussed above), surveillance, forensics, and undercover operations.
Surveillance includes both physical surveillance and computer surveillance. Physical
surveillance uses security cameras, wiretaps, and visual tracking to monitor move-
ment. Computer surveillance monitors elements of computer use and online behav-
ior. It may also include sting operations, like setting up a honeypot or honeynet.
After interviews are completed and surveillance gathers enough evidence, investiga-
tors will want to perform advanced forensic analysis. Organizations can do this by
continually monitoring activity, but if law enforcement is involved, a warrant will
need to be obtained that will allow forensic analysis of identified computers and
devices. Investigators should follow the electronic trail wherever it leads, looking for
digital fingerprints in emails, files, and web-browsing histories.
In some cases, crimes may require investigators to go undercover, adopting fake
online personae to trap criminals. In this case, investigators should log all inter-
actions as evidence and may even arrange a face-to-face meeting to arrest the
perpetrator.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
646 CISSP Cert Guide
Because digital evidence is more volatile than other evidence, it still must meet these
five rules.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 647
Types of Evidence
An investigator must be aware of the types of evidence used in court to ensure
that all evidence is admissible. Sometimes the type of evidence determines its
admissibility.
The types of evidence that you should understand are as follows:
■ Best evidence
■ Secondary evidence
■ Direct evidence
■ Conclusive evidence
■ Circumstantial evidence
■ Corroborative evidence
■ Opinion evidence
■ Hearsay evidence
Best Evidence
The best evidence rule states that when evidence, such as a document or recording,
is presented, only the original will be accepted unless a legitimate reason exists for
why the original cannot be used. In most cases, digital evidence is not considered
best evidence because investigators must capture copies of the original data and state.
However, courts can apply the best evidence rule to digital evidence on a case-by-
case basis, depending on the evidence and the situation. In this situation, the copy
must be proved by an expert witness who can testify as to the contents and confirm
that it is an accurate copy of the original.
Secondary Evidence
Secondary evidence has been reproduced from an original or substituted for an orig-
inal item. Copies of original documents and oral testimony are considered secondary
evidence.
Direct Evidence
Direct evidence proves or disproves a fact through oral testimony based on infor-
mation gathered through the witness’s senses. A witness can testify on what he saw,
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
648 CISSP Cert Guide
smelled, heard, tasted, or felt. This is considered direct evidence. Only the witness
can give direct evidence. No one else can report on what the witness told them
because that is considered hearsay evidence.
Conclusive Evidence
Conclusive evidence does not require any other corroboration and cannot be
contradicted by any other evidence.
Circumstantial Evidence
Circumstantial evidence provides inference of information from other intermedi-
ate relevant facts. This evidence helps a jury come to a conclusion by using a fact
to imply that another fact is true or untrue. An example is implying that a for-
mer employee committed an act against an organization due to his dislike of the
organization after his dismissal. Circumstantial evidence is often dismissed or never
presented, although it is impossible to control the behavior of jurors in this regard
once they start deliberation.
Corroborative Evidence
Corroborative evidence supports another piece of evidence. For example, if a suspect
produces a receipt to prove she was at a particular restaurant at a certain time and
then a waiter testifies that he waited on the suspect at that time, then the waiter
provides corroborating evidence through his testimony.
Opinion Evidence
Opinion evidence is based on what the witness thinks, feels, or infers regarding the
facts. A witness in opinion evidence is not normally an expert because if an expert
witness is used, that expert is able to testify on a fact based on knowledge in a certain
area. For example, a psychiatrist can testify as to conclusions on a suspect’s state of
mind. Expert testimony is not considered opinion evidence because of the expert’s
knowledge and experience.
Hearsay Evidence
Hearsay evidence is evidence that is secondhand, where the witness does not have
direct knowledge of the fact asserted but knows it only from being told by someone.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 649
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
650 CISSP Cert Guide
Media Analysis
Investigators can perform many types of media analysis, depending on the media
type. A media recovery specialist may be employed to provide a certified forensic
image, which is an expensive process. An artifact in a digital forensics investigation
includes things like registry keys, files, timestamps, and event logs. These are the
traces security professionals follow in digital forensic work. They will vary depend-
ing on the device type, operating system, and other factors.
The following types of media analysis can be used:
■ Disk imaging: Creates an exact image of the contents of the hard drive.
■ Slack space analysis: Analyzes the slack (marked as empty or reusable)
space on the drive to see whether any old (marked for deletion) data can be
retrieved.
■ Content analysis: Analyzes the contents of the drive and gives a report
detailing the types of data by percentage.
■ Steganography analysis: Analyzes the files on a drive to see whether the files
have been altered or to discover the encryption used on the file.
Software Analysis
Software analysis is a little more difficult to perform than media analysis because it
often requires the input of an expert on software code, including source code, com-
piled code, or machine code. It often involves decompiling or reverse engineering.
This type of analysis is often used during malware analysis and copyright disputes.
Software analysis techniques include the following:
■ Content analysis: Analyzes the content of software, particularly malware, to
determine for which purpose the software was created.
■ Reverse engineering: Retrieves the source code of a program to study how
the program performs certain operations.
■ Author identification: Attempts to determine the software’s author.
■ Context analysis: Analyzes the environment the software was found in to dis-
cover clues to determining risk.
Network Analysis
Network analysis involves the use of networking tools to preserve logs and activity
for evidence.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 651
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
652 CISSP Cert Guide
■ Case folder
■ Blank forms
■ Evidence collection and packaging supplies
■ Software
■ Air card for Internet access
■ Cables for data transfer (network, crossover, USB, and so on)
■ Blank hard drives and other media
■ Hardware write blockers
The digital toolkit should contain forensic tools that will enable an investigator to
obtain data that can be used as evidence. The tools used by investigators are classi-
fied according to the type of information they obtain, as shown in the following list:
■ Disk and data capture tools
■ File viewers
■ File analysis tools
■ Registry analysis tools
■ Internet analysis tools
■ Email analysis tools
■ Mobile device analysis tools
■ macOS analysis tools
■ Network forensic tools
■ Database forensic tools
Many of the tools available today can provide services in multiple areas listed here.
Investigators should obtain training in the proper usage of these tools.
Tools that can be included in a digital forensic toolkit include the following:
■ Digital Forensics Framework (DFF)
■ Open Computer Forensics Architecture (OCFA)
■ Computer Aided INvestigative Environment (CAINE)
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 653
■ X-Ways Forensics
■ SANS Investigative Forensics Toolkit (SIFT)
■ EnCase Forensic
■ Registry Recon
■ The Sleuth Kit (TSK)
■ LibForensics
■ Volatility
■ WindowsSCOPE
■ The Coroner’s Toolkit (TCT)
■ Oxygen Forensic Suite
■ Bulk_Extractor
■ Xplico
■ RedLine
■ Computer Online Forensic Evidence Extractor (COFEE)
■ PlainSight
■ XRY
■ Helix3
■ UFED
Investigators must also be familiar with the proper digital forensic tactics and pro-
cedures that are commonly used. For this reason, investigators should be properly
trained to ensure that the tools, tactics, and procedures are followed so that evidence
collected will be admissible in court. Keep in mind that you should not be tested on
the functionality of the individual tools or the digital forensics tactics and proce-
dures on the CISSP exam; however, you should understand that these tools, tactics,
and procedures provide digital forensic investigation automation and investigatory
standards compliance. A CISSP candidate’s job role is not defined as performing
individual forensic investigation tasks; however, the CISSP professional should be
familiar with the tools, tactics, and procedures available to ensure that an organiza-
tion’s investigator obtains the appropriate tools to perform digital investigations and
follows appropriate tactics and procedures.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
654 CISSP Cert Guide
NOTE Investigation types are discussed in detail in Chapter 1, “Security and Risk
Management.”
The level and amount of auditing should reflect the security policy of the company.
Audits can be either self-audits or performed by a third party. Self-audits always
introduce the danger of subjectivity to the process. Logs can be generated on a wide
variety of devices including intrusion detection systems (IDSs), servers, routers, and
switches. In fact, a host-based IDS makes use of the operating system logs of the
host machine.
When assessing controls over audit trails or logs, address the following questions:
■ Does the audit trail provide a trace of user actions?
■ Is access to online logs strictly controlled?
■ Is there separation of duties between security personnel who administer the
access control function and those who administer the audit trail?
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 655
Keep and store logs in accordance with the retention policy defined in the orga-
nization’s security policy. They must be secured to prevent modification, deletion,
and destruction. When auditing is functioning in a monitoring role, it supports the
detection security function in the technical category. When formal review of the audit
logs takes place, it is a form of detective administrative control. Reviewing audit data
should be a function separate from the day-to-day administration of the system.
Log Types
Logging is the process of recording event information to a log file or database. It
captures system events, changes, messages, and other information that shows the
activities that occur on a system or device. The different types of logs that security
professionals use include security logs, systems logs, application logs, firewall logs,
proxy logs, and change logs.
Security logs record access to resources, including access to files, folders, and print-
ers. They can record when a user accesses, modifies, or deletes a file or folder.
Although most systems will record when key files are accessed, it is often necessary
for an administrator to enable auditing on other resources, such as data folders or
network printers. When auditing is running on a device, it will affect the perfor-
mance of that device. For this reason, security professionals should configure audit-
ing only when necessary based on the organization’s security policies.
System logs record system events, such as system and service startup and shutdown.
They can help a security professional to determine the actions taken by a malicious
user.
Applications logs record actions that occur within a specific application. Security
professionals should work with application developers or vendors to determine
which type of information should be logged.
Firewall logs record network traffic information, including incoming and outgoing
traffic. This usually includes important data, such as IP addresses and port numbers
that can be used to determine the origin of an attack.
Proxy logs record details on the Internet traffic that passes through the proxy server,
including the sites being visited by users, how much time is being spent on those
sites, and if attempts are being made to access prohibited sites.
Change logs report changes made to a specific device or application as part of the
change management process.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
656 CISSP Cert Guide
Audit Types
When auditing is enabled, administrators can select individual events to monitor to
ensure user accountability. Audit types include access review audits, user privilege
audits, and privileged group audits.
Access review audits ensure that object access and user account management prac-
tices adhere to the organization’s security policy. User privilege audits monitor right
and permission usage for all users. Privileged group audits monitor when high-level
groups and administrator accounts are used.
NOTE IDS and IPS devices are discussed in more detail later in this chapter and also
in Chapter 4, “Communication and Network Security.”
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 657
Continuous Monitoring
Any logging and monitoring activities should be part of an organizational continu-
ous monitoring program. The continuous monitoring program must be designed
to meet the needs of the organization and implemented correctly to ensure that the
organization’s critical infrastructure is guarded. Organizations may want to look into
Continuous Monitoring as a Service (CMaaS) solutions deployed by cloud service
providers.
Egress Monitoring
Egress monitoring occurs when an organization monitors the outbound flow of
information from one network to another. The most popular form of egress moni-
toring is carried out using firewalls that monitor and control outbound traffic.
Data leakage occurs when sensitive data is disclosed to unauthorized personnel
either intentionally or inadvertently. Data loss prevention (DLP) software attempts
to prevent data leakage. It does this by maintaining awareness of actions that can and
cannot be taken with respect to a document. For example, it might allow printing of
a document but only at the company office. It might also disallow sending the docu-
ment through email. DLP software uses ingress and egress filters to identify sensi-
tive data that is leaving the organization and can prevent such leakage.
Another scenario might be the release of product plans that should be available only
to the Sales group. A security professional could set a policy like the following for
that document:
■ It cannot be emailed to anyone other than Sales group members.
■ It cannot be printed.
■ It cannot be copied.
You can use both precise and imprecise methods to determine what is sensitive:
■ Precise methods: These methods involve content registration and trigger
almost zero false-positive incidents.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
658 CISSP Cert Guide
The value of a DLP system lies in the level of precision with which it can locate and
prevent the leakage of sensitive data.
Log Management
Log management is the process of storing and handling log events generated by
applications, devices, and infrastructure components. It includes collecting, aggre-
gating, parsing, storing, analyzing, searching, archiving, and disposing of logs. The
goal of log management is to use the events entered in the logs for troubleshooting.
Log files contain a record of events and are often divided into categories. Through
log management, an administrator can gather the event data in one place and exam-
ine it together, thereby allowing the administrator to analyze the data and identify
issues and patterns. Log management provides improved monitoring and trouble-
shooting, operations, resource usage, and security.
Log management includes five key functions:
■ Log collection
■ Log aggregation
■ Log search and analysis
■ Log monitoring and alerting
■ Log visualization and reporting
Organizations should adopt a log management policy. This policy should include
guidelines on what to log, where to store logs, how long to store logs, how often
logs should be reviewed, and whether logs should be encrypted or archived for audit
purposes.
Threat Intelligence
Threat intelligence is threat information that allows organizations to implement
controls to protect against the threats. A threat intelligence feed (TI feed), also
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 659
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
660 CISSP Cert Guide
All networks and devices evolve, grow, and change over time. Companies and their
processes also evolve and change, which is a good thing. But organizations should
manage change in a structured way so as to maintain a common sense of purpose
about the changes. By following recommended steps in a formal process, change can
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 661
be prevented from becoming a small element that controls the larger process. The
following are guidelines to include as a part of any change control policy:
■ All changes should be formally requested. Change logs should be maintained.
■ Each request should be analyzed to ensure that it supports all goals and
policies. This analysis includes baselining and security impact analysis.
■ Prior to formal approval, all costs and effects of the methods of implementa-
tion should be reviewed. Using the collected data, changes should be approved
or denied.
■ After they’re approved, the change steps should be developed.
■ During implementation, incremental testing should occur, and it should rely
on a predetermined fallback strategy if necessary. Versioning should be used to
effectively track and control changes to a collection of entities.
■ Complete documentation should be produced and submitted with a formal
report to management.
One of the key benefits of following this method is the ability to make use of the
documentation in future planning. Lessons learned can be applied and even the pro-
cess itself can be improved through analysis.
Resource Provisioning
Resource provisioning is a process in security operations which ensures that an
organization deploys only the assets it currently needs. Resource provisioning
must follow the organization’s resource life cycle. To properly manage the resource
life cycle, an organization must maintain an accurate asset inventory and use
appropriate configuration management processes. Resources that are involved in
provisioning include physical assets, virtual assets, cloud assets, and applications.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
662 CISSP Cert Guide
Security devices, such as firewalls, network address translation (NAT) devices, and
IDSs and IPSs, should receive the most attention because they relate to physical and
logical security. Beyond this, devices that can easily be stolen, such as laptops, tab-
lets, and smartphones, should be locked away. If that is not practical, then consider
locking these types of devices to stationary objects (for example, using cable locks
with laptops).
When the technology is available, tracking of small devices can help mitigate the
loss of both devices and their data. Many smartphones now include tracking soft-
ware that allows you to locate a device after it has been stolen or lost by using either
cell tower tracking or GPS. Deploy the device tracking technology when available.
Another useful feature available on many smartphones and other portable devices
is a remote wiping feature. This allows the user to send a signal to a stolen device,
instructing it to wipe out all the data contained on the device. Similarly, these
devices typically also come with the ability to be remotely locked when misplaced or
stolen.
Strict control of the use of portable media devices can help prevent sensitive infor-
mation from leaving the network or office premises. These devices include CDs,
DVDs, flash drives, and external hard drives. Although written rules should be in
effect about the use of these devices, using security policies to prevent the copying of
data to these media types is also possible. Allowing the copying of data to these drive
types as long as the data is encrypted is also possible. If these functions are provided
by the network operating system, you should deploy them.
It should not be possible for unauthorized persons to access and tamper with any
devices. Tampering includes defacing, damaging, or changing the configuration of a
device. Organizations should use integrity verification programs to look for evidence
of data tampering, errors, and omissions.
Encrypting sensitive data stored on devices can help prevent the exposure of data in
the event of a theft or in the event of inappropriate access of the device.
Physical Assets
Physical assets include servers, desktop computers, laptops, mobile devices, and net-
work devices that are deployed in the enterprise. Physical assets should be deployed
and decommissioned based on organizational need. For example, suppose an organi-
zation deploys a wireless access point (WAP) for use by a third-party auditor. Proper
resource provisioning should ensure that the WAP is decommissioned after the
third-party auditor no longer needs access to the network. Without proper inven-
tory and configuration management, the WAP may remain deployed and can be
used at some point to carry out a wireless network attack.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 663
Virtual Assets
Virtual assets include software-defined networks, virtual storage-area networks
(VSANs), guest operating systems deployed on virtual machines (VMs), and virtual
routers. As with physical assets, the deployment and decommissioning of virtual
assets should be tightly controlled as part of configuration management because
virtual assets, just like physical assets, can be compromised. For example, a Windows
10 VM deployed on a Windows Server system should be retained only until it is no
longer needed. As long as the VM is being used, it is important to ensure that the
appropriate updates, patches, and security controls are deployed on it as part of con-
figuration management. When users no longer access the VM, it should be removed.
Virtual storage occurs when physical storage (including hard drives, DVDs, and
other storage media) from multiple network devices is compiled into a single logical
space and appears as a single drive to the regular user. Block virtualization sepa-
rates the logical storage from the physical storage. File virtualization eliminates the
dependency between data accessed at the file level and the physical storage location
of the files. Host-based virtual storage requires software running on the host.
Storage device–based virtual storage runs on a storage controller and allows other
storage controllers to be attached. Network-based virtual storage uses network-
based devices, such as iSCSI or Fibre Channel, to create a storage solution.
Cloud Assets
Cloud assets include cloud services, virtual machines, storage networks, and other
cloud services contracted through a cloud service provider. Cloud assets are usually
billed based on usage and should be carefully provisioned and monitored to prevent
the organization from paying for portions of service that it does not need. Configu-
ration management should ensure that the appropriate monitoring policies are in
place to make certain that only resources that are needed are deployed.
Applications
Applications include commercial applications that are locally installed, web services,
and any cloud-deployed application services, such as Software as a Service (SaaS).
The appropriate number of licenses should be maintained for all commercial
applications. An organization should periodically review its licensing needs. For
cloud deployments of software services, configuration management should be used
to ensure that only personnel who have valid needs for the software are given access
to it.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
664 CISSP Cert Guide
Baselining
Baselining is the process of documenting the attributes of a CI at a point in time,
which serves as a basis for defining change. Configuration baselines should be docu-
mented for all CIs. If a change is approved and completed to a CI, then the baseline
of the CI needs to be adjusted based on the changes made.
Baseline configurations should be maintained over time. This requires creating new
baselines as organizational information systems change.
Automation
Automation software reduces cost, complexity, and errors in configuration manage-
ment by maintaining a CI database. With automation tools, CI baselines can be
saved. Then if a change has unanticipated consequences, administrators can simply
roll the CI back to the saved baseline.
Automation tools allow administrators to make changes and deployments faster
and remove the potential for administrator error. They also allow administrators
to track the state of resources, preventing duplicated effort by attempting to install
something that is already deployed to a CI. Finally, configuration management tools
can audit an organization’s CIs so that administrators can easily pinpoint CIs with
certain issues or needs.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 665
to know requires that the operator have the minimum knowledge of the system
necessary to perform a task.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 667
their position while gone, which enhances the opportunity to discover unusual
activity. Beyond the security aspects of job rotation, additional benefits include
■ Trained backup in case of emergencies
■ Protection against fraud
■ Cross training of employees
Rotation of duties, separation of duties, and mandatory vacations are all administra-
tive controls.
Two-Person Control
A two-person control, also referred to as a two-man rule, occurs when certain access
and actions require the presence of two authorized people at all times. Common
examples are the requirement for two people to sign checks over a certain dollar
amount or for two people to be present to perform a certain activity, such as opening
a safe.
Record Retention
Proper access control is not possible without auditing. It allows us to track activi-
ties and discover problems before they are fully realized. Because this analysis can
sometimes lead to a mountain of data to analyze, you should monitor only the most
sensitive of activities, and retain and review all records. Moreover, in many cases
companies are required by law or regulation to maintain records of certain data.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
668 CISSP Cert Guide
Most auditing systems allow for the configuration of data retention options. In some
cases, the default operation is to start writing over the older records in the log when
the maximum log size is full. Regularly clearing and saving the log can prevent this
from happening and avoid the loss of important events. In cases of extremely sensi-
tive data, having a server shut off access when a security log is full and cannot record
any more events is even advisable.
NOTE For more information on the information life cycle, refer to Chapter 2, “Asset
Security.”
Service-Level Agreements
Service-level agreements (SLAs) are agreements about the ability of the support
system to respond to problems within a certain timeframe while providing an
agreed-upon level of service. SLAs can be internal between departments or external
to a service provider. When parties agree on the speed and accuracy with which vari-
ous problems related to the provided service are addressed, some predictability is
introduced to the response to problems, which ultimately supports the maintenance
of access to resources.
An SLA should contain a description of the services to be provided and the service
levels and metrics that the customer can expect. It also includes the duties and
responsibilities of each party of the SLA. It lists the service specifics, exclusions,
service levels, escalation procedures, and cost. It should include a clause regarding
payment to the customers resulting from a breach of the SLA. Although SLAs can
be transferable, they are not transferable by law. Metrics that should be measured
include service availability, service levels, defect rates, technical quality, and security.
SLAs should be periodically reviewed to ensure that the business needs, technical
environment, or workloads have not changed. In addition, metrics, measurement
tools, and processes should be reviewed to see if they have improved.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 669
Resource Protection
Enterprise resources include both assets you can see and touch (tangible), such as
computers and printers, and assets you cannot see and touch (intangible), such as
trade secrets and processes. Although typically you would think of resource pro-
tection as preventing the corruption of digital resources and as the prevention of
damage to physical resources, this concept also includes maintaining the availability
of those resources. In the following sections, we discuss both aspects of resource
protection.
Facilities
Usually, the largest tangible asset an organization has is the building in which it
operates and the surrounding land. Physical security is covered later in this
chapter, but it bears emphasizing that vulnerability testing (discussed more fully
in Chapter 6) ought to include the security controls of the facility itself. Some
examples of vulnerability testing as it relates to facilities include
■ Do doors close automatically, and does an alarm sound if they are held open
too long?
■ Are the protection mechanisms of sensitive areas, such as server rooms and
wiring closets, sufficient and operational?
■ Does the fire suppression system work?
■ Are sensitive documents shredded as opposed to being thrown in the
dumpster?
Beyond the access issues, the main systems that are needed to ensure operations are
not disrupted include fire detection/suppression, HVAC (including temperature and
humidity controls), water and sewage systems, power/backup power, communica-
tions equipment, and intrusion detection.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
670 CISSP Cert Guide
Hardware
Another of the more tangible assets that must be protected is all the hardware that
makes the network operate. This hardware includes not only the computers and
printers with which the users directly come in contact but also the infrastructure
devices that they never see such as routers, switches, and firewall appliances.
Maintaining access to these critical devices from an availability standpoint is covered
later in the sections “Redundancy and Fault Tolerance” and “Backup and Recovery
Systems.”
From a management standpoint, these devices are typically managed remotely.
Special care must be taken to safeguard access to these management features as well
as protect the data and commands passing across the network to these devices. Some
specific guidelines include
■ Change all default administrator passwords on the devices.
■ Limit the number of users who have remote access to these devices.
■ Rather than Telnet (which sends commands in cleartext), use an encrypted
command-line tool such as Secure Shell (SSH).
■ Manage critical systems locally.
■ Limit physical access to these devices.
Software
Software assets include any propriety application, scripts, or batch files that have
been developed in house that are critical to the operation of the organization. Secure
coding and development practices can help to prevent weaknesses in these systems.
Security professionals also must pay attention to preventing theft of these assets.
Moreover, closely monitoring the use of commercial applications and systems in
the enterprise can prevent unintentional breach of licensing agreements. One of the
benefits of giving users only the applications they require to do their job is that it
limits the number of users that have an application, helping to prevent exhaustion of
licenses for software.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 671
Information Assets
Information assets are the last asset type that needs to be discussed, but by no means
are they the least important. The primary purpose of operations security is to safe-
guard information assets that are resident in the system. These assets include reci-
pes, processes, trade secrets, product plans, and any other type of information that
enables the enterprise to maintain competitiveness within its industry. The prin-
ciples of data classification and access control apply most critically to these assets. In
some cases the dollar value of these assets might be difficult to determine, although
it might be clear to all involved that the asset is critical. For example, the secret for-
mula for Coca-Cola has been closely guarded for many years due to its value to the
company.
Asset Management
In the process of managing these assets, several issues must be addressed. Certainly,
access to the asset must be closely controlled to prevent its deletion, theft, or cor-
ruption (in the case of digital assets) and from physical damage (in the case of physi-
cal assets). Moreover, the asset must remain available when needed. This section
covers methods of ensuring availability, authorization, and integrity.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
672 CISSP Cert Guide
Media Management
Media management is an important part of operations security because media is
where data is stored. Media management includes RAID, SAN, NAS, and HSM.
RAID
Redundant Array of Independent Disks (RAID) refers to a system whereby multiple
hard drives are used to provide either a performance boost or fault tolerance for the
data. When we speak of fault tolerance in RAID, we mean maintaining access to the
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 673
data even in a drive failure without restoring the data from backup media.
The following are the types of RAID with which you should be familiar.
RAID 0, also called disk striping, writes the data across multiple drives or disks.
Although it improves performance, it does not provide fault tolerance. Figure 7-2
depicts RAID 0.
RAID 0
A1 A2
A3 A4
A5 A6
A7 A8
Disk 0 Disk 1
RAID 1, also called disk mirroring, uses two drives or disks and writes a copy of
the data to both disks, providing fault tolerance in the case of a single drive failure.
Figure 7-3 depicts RAID 1.
RAID 1
A1 A1
A2 A2
A3 A3
A4 A4
Disk 0 Disk 1
RAID 3, requiring at least three drives or disks, also requires that the data is written
across all drives like striping and then parity information is written to a single dedi-
cated drive. The parity information is used to regenerate the data in the case of a
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
674 CISSP Cert Guide
single drive failure. The downfall is that the parity drive is a single point of failure if
it goes bad. Figure 7-4 depicts RAID 3.
B1 B2 B3 p1
B4 B5 B6 p2
B7 B8 B9 p3
RAID 5, requiring at least three drives or disks, also requires that the data is written
across all drives like striping and then parity information also is written across all
drives. The parity information is used in the same way as in RAID 3, but it is not
stored on a single drive so there is no single point of failure for the parity data.
With hardware RAID level 5, the spare drives that replace the failed drives are usu-
ally hot swappable, meaning they can be replaced on the server while it is running.
Figure 7-5 depicts RAID 5.
RAID 5
Parity across disks
RAID 10, which requires at least four drives or disks, is a combination of RAID 0
and RAID 1. First, a RAID 1 volume is created by mirroring two drives together.
Then a RAID 0 stripe set is created on each mirrored pair. Figure 7-6 depicts
RAID 10.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 675
RAID 10
RAID 0
RAID 1 RAID 1
A1 A1 A2 A2
A3 A3 A4 A4
A5 A5 A6 A6
A7 A7 A8 A8
Although RAID can be implemented with software or with hardware, certain types
of RAID are faster when implemented with hardware. When software RAID is used,
it is a function of the operating system. Both RAID 3 and 5 are examples of RAID
types that are faster when implemented with hardware. Simple striping or mirroring
(RAID 0 and 1), however, tend to perform well in software because they do not use
the hardware-level parity drives. Table 7-1 summarizes the RAID types.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
676 CISSP Cert Guide
SAN
Storage-area networks (SANs) are composed of high-capacity storage devices that
are connected by a high-speed private network (separate from the LAN) using
storage-specific switches. This storage information architecture addresses the
collection, management, and use of data.
NAS
Network-attached storage (NAS) serves the same function as SAN, but clients access
the storage in a different way. In a NAS, almost any machine that can connect to the
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 677
LAN (or is interconnected to the LAN through a WAN) can use protocols such as
NFS, CIFS, or HTTP to connect to a NAS and share files. In a SAN, only devices
that can use the Fibre Channel SCSI network can access the data, so it is typically
done though a server that has this capability. Figure 7-7 shows a comparison of the
two systems.
Application
network
Application
and database
servers
IP-Based Fibre
Ethernet Channel
LAN SAN
Custom file RAID disk
server array
RAID disk
array
HSM
A hierarchical storage management (HSM) system is a type of backup management
system that provides a continuous online backup by using optical or tape
“jukeboxes.” It operates by automatically moving data between high-cost and low-
cost storage media as the data ages. When continuous availability (24-hours-a-day
processing) is required, HSM provides a good alternative to tape backups. It also
strives to use the proper media for the scenario. For example, a rewritable and
erasable (CDR/W) optical disc is sometimes used for backups that require short-
time storage for changeable data but require faster file access than tape.
NOTE Don’t confuse the acronym HSM. HSM can also refer to hardware secu-
rity module, which is a device that manages and protects digital keys for strong
authentication.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
678 CISSP Cert Guide
Media History
Security professionals must accurately maintain media library logs to keep track
of the history of the media. This task is important in that all media types have a
maximum number of times they can safely be used. A log should be kept by a media
librarian. This log should track all media (backup and other types such as OS instal-
lation discs and USB thumb drives). With respect to the backup media, use the fol-
lowing guidelines:
■ Track all instances of access to the media.
■ Track the number and location of backups.
■ Track age of media to prevent loss of data through media degeneration.
■ Inventory the media regularly.
The environment where the media will be stored is also important. For example,
damage starts occurring to magnetic media above 100 degrees. The Forest Green
Book is a Rainbow Series book that defines the secure handling of sensitive or clas-
sified automated information system memory and secondary storage media, such as
degaussers, magnetic tapes, hard disks, and cards. The Rainbow Series is discussed in
more detail in Chapter 3.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 679
media in a magnetically randomized (blank) state. Some other disposal terms and
concepts with which you should be familiar are
■ Data purging: Using a method such as degaussing to make the old data
unavailable even with forensics. Purging renders information unrecoverable
against laboratory attacks (forensics).
■ Data clearing: Rendering information unrecoverable by a keyboard. This
attack extracts information from data storage media by executing software
utilities, keystrokes, or other system resources executed from a keyboard.
■ Remanence: Any data left after the media has been erased.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
680 CISSP Cert Guide
■ MTBF and MTTR: Although SLAs are appropriate for services that are pro-
vided, a slightly different approach to introducing predictability can be used
with regard to physical components that are purchased. Vendors typically pub-
lish values for a product’s mean time between failure (MTBF), which describes
how often a component fails on average. Another valuable metric typically
provided is the mean time to repair (MTTR), which describes the average
amount of time it will take to get the device fixed and back online.
■ Single point of failure (SPOF): Though not actually a strategy, it is worth
mentioning that the ultimate goal of any of these approaches is to avoid an
SPOF in a system. All components and groups of components and devices
should be examined to discover any single element that could interrupt
access to resources if a failure occurs. Each SPOF should then be mitigated
in some way.
Incident Management
Incident response and management are vital to every organization to ensure that
any security incidents are detected, contained, and investigated. Incident response is
the beginning of any investigation. After an incident has been discovered, incident
response personnel perform specific tasks. During the entire incident response, the
incident response team must ensure that they follow proper procedures to ensure
that evidence is preserved. Incident management ensures that the incident response
team manages an incident and returns service to normal as quickly as possible after
the incident.
As part of incident response, security professionals must understand the difference
between events and incidents (see the following section). The incident response
team must have the appropriate incident response procedures in place to ensure that
the incident is handled, but the procedures must not hinder any forensic investiga-
tions that might be needed to ensure that parties are held responsible for any illegal
actions. Security professionals must understand the rules of engagement and the
authorization and scope of any incident investigation.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 681
Events can be detected only if an organization has established the proper auditing
and security mechanisms to monitor activity. A single negative event might occur.
For example, the auditing log might show that an invalid login attempt occurred.
By itself, this login attempt is not a security concern. However, if many invalid login
attempts occur over a period of a few hours, the organization might be undergoing
an attack. The initial invalid login is considered an event, but the series of invalid
login attempts over a few hours would be an incident, especially if it is discovered
that the invalid login attempts all originated from the same IP address.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
682 CISSP Cert Guide
to commit a crime that the individual might have had no intention of committing.
Enticement is legal but does raise ethical arguments and might not be admissible in
court. Conversely, entrapment is illegal.
6. Remediate all components affected by the incident to ensure that all traces of
the incident have been removed.
7. Review the incident, and document all findings as lessons learned.
The actual investigation of the incident occurs during the respond, mitigate, report,
and recover steps. Following appropriate forensic and digital investigation processes
during the investigation can ensure that evidence is preserved.
The incident response process is shown in Figure 7-8.
Lessons
Detect Respond Mitigate Report Recover Remediate
Learned
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 683
Detect
The first step in the incident response process is to detect the incident. Prior to
any incident response investigation, security professionals must first perform the
appropriate triage for the affected assets. This process includes initially detecting
the incident and determining how serious the incident is. In some cases, during the
triage phase, security professionals may determine that a false positive has occurred,
meaning that an attack really did not occur, even though an alert indicated that it
did. If an attack is confirmed, then the incident response will progress into investiga-
tive actions.
All detective controls, such as auditing, discussed in Chapter 1, are designed to
provide this capability. The worst sort of incident is the one that goes unnoticed.
Respond
The response to the incident should be appropriate for the type of incident. Denial-
of-service (DoS) attacks against the web server would require a quicker and different
response than a missing mouse in the server room. Establish standard responses and
response times ahead of time.
Response involves containing the incident and quarantining the affected assets,
thus preventing other assets from being affected and reducing the potential impact.
Different methods can be used, depending on the category of the attack, the asset
affected, and the data criticality or infection risk.
After an attack is contained or isolated, analysts should work to examine and analyze
the cause of the incident. This analysis includes determining where the incident
originated. Security professionals should use experience and formal training to make
the appropriate conclusions regarding the incident. After the root cause has been
determined, security professionals should follow incident handling policies that the
organization has in place.
Mitigate
Mitigation includes limiting the scope of what the attack might do to the organiza-
tion’s assets. If damage has occurred or the incident may broaden and affect other
assets, proper mitigation techniques ensure that the incident is contained to within
a certain scope of assets. Mitigation options vary, depending on the kind of attack
that has occurred. Security professionals should develop procedures in advance that
detail how to properly mitigate any attacks that occur against organizational assets.
Preparing these mitigation procedures in advance ensures that they are thorough
and gives personnel a chance to test the procedures.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
684 CISSP Cert Guide
Report
All incidents should be reported within a timeframe that reflects the seriousness of
the incident. In many cases, establishing a list of incident types and the person to
contact when that type of incident occurs is helpful. Exercising attention to detail at
this early stage while time-sensitive information is still available is critical.
Recover
Recovery involves a reaction designed to make the network or system that is affected
functional again; it includes repair of the affected assets and prevention of similar
incidents in the future. Exactly what recovery means depends on the circumstances
and the recovery measures that are available. For example, if fault-tolerance mea-
sures are in place, the recovery might consist of simply allowing one server in a clus-
ter to fail over to another. In other cases, recovery could mean restoring the server
from a recent backup. The main goal of this step is to make all resources available
again. Delay putting any asset back into operation until it is at least protected from
the incident that occurred. Thoroughly test assets for vulnerabilities and weaknesses
before reintroducing them into production.
Remediate
The remediation step involves eliminating any residual danger or damage to the
network that still might exist. For example, in the case of a virus outbreak, it could
mean scanning all systems to root out any additional affected machines. These mea-
sures are designed to make a more detailed mitigation when time allows.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 685
IDS/IPS
Setup, configuration, and monitoring of any intrusion detection and intrusion
prevention systems (IDS/IPS) are also ongoing responsibilities of operations
security. Many of these systems must be updated on a regular basis with the attack
signatures that enable them to detect new attack types. The analysis engines that
they use also sometimes have updates that need to be applied.
Moreover, the log files of systems that are set to log certain events rather than take
specific actions when they occur need to have those logs archived and analyzed on a
regular basis. Spending large sums of money on software that gathers important log
information and then disregarding that log information makes no sense.
IDS and IPS are discussed in more detail earlier in this chapter and in Chapter 4.
Intrusion response is just as important as intrusion detection and prevention.
Intrusion response is about responding appropriately to any intrusion attempt. Most
systems use alarms and signals to communicate with the appropriate personnel or
systems when an intrusion has been attempted. An organization must respond to
alerts and signals in a timely manner.
Firewalls
Firewalls can be implemented on multiple levels to allow or prevent communication
based on a variety of factors. If personnel discover that certain types of unwanted
traffic are occurring, it is often fairly simple to configure a firewall to prevent that
type of traffic. Firewalls can protect the boundaries between networks, traffic within
a subnetwork, or a single system. Make sure to keep firewalls fully updated per the
vendor’s recommendations. Firewalls are discussed in more depth in Chapter 4.
Whitelisting/Blacklisting
Whitelisting occurs when a list of acceptable email addresses, Internet addresses,
websites, applications, or some other identifier is configured as good senders or as
allowed. Blacklisting identifies bad senders. Graylisting is somewhere in between
the two, listing entities that cannot be identified as whitelist or blacklist items. In the
case of graylisting, the new entity must pass through a series of tests to determine
whether it will be whitelisted or blacklisted.
Whitelisting, blacklisting, and graylisting are commonly used with spam filtering
tools.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
686 CISSP Cert Guide
Sandboxing
Sandboxing is a software virtualization technique that allows applications and pro-
cesses to run in an isolated virtual environment. Applications and processes in the
sandbox are not able to make permanent changes to the system and its files.
Some malware attempts to delay or stall code execution, allowing the sandbox to
time out. A sandbox can use hooks and environmental checks to detect malware.
These methods do not prevent many types of malware. For this reason, third-party
security services are important.
Honeypots/Honeynets
Honeypots are systems that are configured with reduced security to entice attack-
ers so that administrators can learn about attack techniques. In some cases, entire
networks called honeynets are attractively configured for this purpose. These types
of approaches should be undertaken only by companies with the skill to properly
deploy and monitor them. Some third-party security services can provide this func-
tion for organizations.
Anti-malware/Antivirus
All updates of antivirus and anti-malware software are the responsibility of opera-
tions security. It is important to deploy a comprehensive anti-malware/antivirus
solution for the entire enterprise.
Clipping Levels
Clipping levels set a baseline for normal user errors, and violations exceeding that
threshold will be recorded for analysis of why the violations occurred. When clip-
ping levels are used, a certain number of occurrences of an activity might gener-
ate no information, whereas recording of activities begins when a certain level is
exceeded.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 687
Unscheduled Reboots
When systems reboot on their own, this behavior is typically a sign of hardware
problems of some sort. Reboots should be recorded and addressed. Overheating
is the cause of many reboots. Sometimes reboots may also be the result of a DoS
attack. You should have system monitoring in place to record all system reboots and
investigate any that are not initiated by a human or have occurred as a result of an
automatic upgrade.
Unauthorized Disclosure
The unauthorized disclosure of information is a large threat to organizations. It
includes destruction of information, interruption of service, theft of information,
corruption of information, and improper modification of information. Enterprise
solutions must be deployed to monitor for any potential disclosure of information.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
688 CISSP Cert Guide
Trusted Recovery
When an application or operating system suffers a failure (crash, freeze, and so on),
it is important that the system respond in a way that leaves the system in a secure
state or that it makes a trusted recovery. A trusted recovery ensures that security is
not breached when a system crash or other system failure occurs. You might recall
from Chapter 3 that the Orange Book requires a system be capable of a trusted recov-
ery for all systems rated B3 or A1.
Trusted Paths
A trusted path is a communication channel between the user or the program
through which that user is working and the trusted computer base (TCB). The
TCB provides the resources to protect the channel and prevent it from being com-
promised. Conversely, a communication path that is not protected by the system’s
normal security mechanisms is called a covert channel. Taking this a step further, if the
interface offered to the user is secured in this way, it is referred to as a trusted shell.
Operations security must ensure that trusted paths are validated. This validation
occurs using log collection, log analysis, vulnerability scans, patch management, and
system integrity checks.
Input/Output Controls
The main thrust of input/output control is to apply controls or checks to the input
that is allowed to be submitted to the system. Performing input validation on all
information accepted into the system can ensure that it is of the right data type and
format and that it does not leave the system in an insecure state.
Also, secure output of the system (printouts, reports, and so on) should be ensured.
All sensitive output information should require a receipt before release and have
proper access controls applied regardless of its format.
System Hardening
Another of the ongoing goals of operations security is to ensure that all systems
have been hardened to the extent that is possible and still provide functionality.
The hardening can be accomplished both on a physical basis and on a logical basis.
Physical security of systems is covered in detail later in this chapter. From a logical
perspective,
■ Remove unnecessary applications.
■ Disable unnecessary services.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 689
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
690 CISSP Cert Guide
4. Patch assessment and audit: After patches are deployed, ensure that the
patches work properly.
Recovery Strategies
Identifying the preventive controls is the third step of the business continuity steps
as outlined in NIST SP 800-34 R1. If preventive controls are identified in the busi-
ness impact analysis (BIA), disasters or disruptive events might be mitigated or
eliminated. These preventive measures deter, detect, and/or reduce impacts to the
system. Preventive methods are preferable to actions that might be necessary to
recover the system after a disruption if the preventive controls are feasible and cost
effective.
The following sections discuss the primary controls that organizations can imple-
ment as part of business continuity and disaster recovery, including redundant sys-
tems, facilities, and power; fault-tolerance technologies; insurance; data backup; fire
detection and suppression; high availability; quality of service; and system resilience.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 691
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
692 CISSP Cert Guide
solutions are selected. An RTO stipulates the amount of time an organization will
need to recover from a disaster, and an RPO stipulates the amount of data an orga-
nization can lose when a disaster occurs. The RTO, WRT, and RPO values are
derived during the BIA process.
In developing the recovery strategy, the recovery plan committee takes the RTO,
WRT, and RPO values and determines the recovery strategies that should be used to
ensure that the organization meets these BIA goals.
Critical devices, systems, and applications need to be restored earlier than devices,
systems, or applications that do not fall into this category. Keep in mind when clas-
sifying systems that most critical systems cannot be restored using manual methods.
The recovery plan committee must understand the backup/restore solutions that are
available and implement the system that will provide recovery within the BIA values
and cost constraints. The window of time for recovery of data-processing capabili-
ties is based on the criticality of the operations affected.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 693
The DRP must include recovery information on the following assets that must be
restored:
■ Hardware backup
■ Software backup
■ Human resources
■ Heating, ventilation, and air conditioning (HVAC)
■ Supplies
■ Documentation
Hardware Backup
Hardware that must be included as part of the DRP includes client computers,
server computers, routers, switches, firewalls, and any other hardware that is run-
ning on the organization’s network. The DRP must include not only guidelines and
procedures for restoring all the data on each of these devices, but also information
regarding restoring these systems manually if the systems are damaged or com-
pletely destroyed. Legacy devices that are no longer available in the retail market
should also be identified.
As part of preparing the DRP, the recovery plan team must determine the amount of
time that it will take the hardware vendors to provide replacements for any damaged
or destroyed hardware. Without this information documented, any recovery plans
might be ineffective due to lack of resources. Organizations might need to explore
other options, including purchasing redundant systems and storing them at an alter-
nate location, if vendors are unable to provide replacement hardware in a timely
manner. When replacement of legacy devices is possible, organizations should take
measures to replace them before the disaster occurs.
Software Backup
Even if an organization has every device needed to restore its infrastructure, those
devices are useless if the applications and software that run on the devices are not
available. The applications and software include any operating systems, databases,
and utilities that need to be running on the device.
Many organizations might think that this requirement is fulfilled if they have a
backup on either tape, DVD, flash drive, hard drive, or other media of all their soft-
ware. But all software that is backed up usually requires at least an operating system
to be running on the device on which it is restored. These data backups often also
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
694 CISSP Cert Guide
require that the backup management software is running on the backup device,
whether that is a server or dedicated device.
All software installation media, service packs, and other necessary updates should
be stored at an alternate location. In addition, all license information should be
documented as part of the DRP. Finally, frequent backups of applications should be
taken, whether this is through the application’s internal backup system or through
some other organizational backup. A backup is useful only if it can be restored, so
the DRP should fully document all the steps involved.
In many cases, applications are purchased from a software vendor, and only the soft-
ware vendor understands the coding that occurs in the applications. Because there
are no guarantees in today’s market, some organizations might decide that they need
to ensure that they are protected against a software vendor’s demise. A software
escrow is an agreement whereby a third party is given the source code of the soft-
ware to ensure that the customer has access to the source code if certain conditions
for the software vendor occur, including bankruptcy and disaster.
Human Resources
No organization is capable of operating without personnel. An occupant emergency
plan specifically addresses procedures for minimizing loss of life or injury when a
threat occurs. The human resources team is responsible for contacting all person-
nel in the event of a disaster. Contact information for all personnel should be stored
onsite and offsite. Multiple members of the HR team should have access to the per-
sonnel contact information. Remember that personnel safety is always the primary
concern. All other resources should be protected only after the personnel are safe.
After the initial event is over, the HR team should monitor personnel morale and
guard against employee stress and burnout during the recovery period. If proper
cross-training has occurred, multiple personnel can be rotated in during the recov-
ery process. Any DRP should take into consideration the need to provide adequate
periods of rest for any personnel involved in the disaster recovery process. It should
also include guidelines on how to deal with situations where any personnel fall vic-
tims of a disaster.
The organization must ensure that salaries and other funding to personnel continue
during and after the disaster. Because funding can be critical both for personnel and
for resource purchases, authorized, signed checks should be securely stored offsite.
Lower-level management with the appropriate access controls should have the
ability to disperse funds using these checks in the event that senior management is
unavailable.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 695
An executive succession plan should also be created to ensure that the organization
follows the appropriate steps to protect itself and continue operation.
Supplies
Often disasters affect the ability to supply an organization with its needed resources,
including paper, cabling, and even water. The organization should document any
resources that are vital to its daily operations and the vendors from which these
resources can be obtained. Because supply vendors can also be affected by the disas-
ter, alternative suppliers should be identified.
Documentation
For disaster recovery to be a success, the personnel involved must be able to com-
plete the appropriate recovery procedures. Although the documentation of all
these procedures might be tedious, it is necessary to ensure that recovery occurs. In
addition, each department within the organization should be asked to decide what
departmental documentation is needed to carry out day-to-day operations. This
documentation should be stored in a central location onsite, and a copy should be
retained offsite also. Specific personnel should be tasked with ensuring that this
documentation is created, stored, and updated as appropriate.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
696 CISSP Cert Guide
Data Recovery
In most organizations, the data is one of the most critical assets when recover-
ing from a disaster. The BCPs and DRPs must include guidelines and procedures
for recovering data. However, the operations teams must determine which data is
backed up, how often the data is backed up, and the method of backup used. So
although we discuss data backup, remember that BCP teams do not actually make
any data backup decisions. The BCP teams are primarily concerned with ensuring
that the data that is backed up can be restored in a timely manner.
Next, we discuss the data backup types and schemes that are used as well as elec-
tronic backup methods that organizations can implement.
The three main data backups are full backups, differential backups, and incremen-
tal backups. To understand these three data backup types, you must understand the
concept of archive bits. When a file is created or updated, the archive bit for the file
is enabled. If the archive bit is cleared, the file will not be archived during the next
backup. If the archive bit is enabled, the file will be archived during the next backup.
With a full backup, all data is backed up. During the full backup process, the archive
bit for each file is cleared. A full backup takes the longest time and the most space
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 697
to complete. However, if an organization uses only full backups, then only the
latest full backup needs to be restored. Any differential or incremental backup will
first start with a full backup as its baseline. A full backup is the most appropriate for
offsite archiving.
In a differential backup, all files that have been changed since the last full backup
will be backed up. During the differential backup process, the archive bit for each
file is not cleared. A differential backup might vary from taking a short time and a
small amount of space to growing in both the backup time and amount of space it
needs over time. Each differential backup will back up all the files in the previous
differential backup if a full backup has not occurred since that time. In an organiza-
tion that uses a full/differential scheme, the full backup and only the most recent
differential backup must be restored, meaning only two backups are needed.
An incremental backup backs up all files that have been changed since the last
backup of any type. During the incremental backup process, the archive bit for each
file is cleared. An incremental backup usually takes the least amount of time and
space to complete. In an organization that uses a full/incremental scheme, the full
backup and each subsequent incremental backup must be restored. The incremental
backups must be restored in order. If your organization completes a full backup on
Sunday and an incremental backup daily Monday through Saturday, up to seven
backups could be needed to restore the data. Figure 7-9 compares the different types
of backups.
Backup Type Data Backed Up Backup Time Restore Time Storage Space
Copy and daily backups are two special backup types that are not considered part
of any regularly scheduled backup scheme because they do not require any other
backup type for restoration. Copy backups are similar to normal backups but do not
reset the file’s archive bit. Daily backups use a file’s timestamp to determine whether
it needs archiving. Daily backups are popular in mission-critical environments where
multiple daily backups are required because files are updated constantly.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
698 CISSP Cert Guide
Transaction log backups are used only in environments where capturing all transac-
tions that have occurred since the last backup is important. Transaction log backups
help organizations to recover to a particular point in time and are most commonly
used in database environments.
Although magnetic tape drives are still used to back up data, organizations today
may back up their data to optical discs, including CD-ROMs, DVDs, and Blu-ray
discs; high-capacity, high-speed magnetic drives; flash-based media; or even net-
work storage. No matter the media used, retaining backups both onsite and offsite is
important. Store onsite backup copies in a waterproof, heat-resistant, fire-resistant
safe or vault.
Electronic Backup
Electronic backup solutions back up data quicker and more accurately than the nor-
mal data backups and are best implemented when information changes often.
For the CISSP exam, you should be familiar with the following electronic backup
terms and solutions:
■ Electronic vaulting: Copies files as modifications occur. This method occurs in
real time.
■ Remote journaling: Copies the journal or transaction log offsite on a regular
schedule. This method occurs in batches.
■ Tape vaulting: Creates backups over a direct communication line on a backup
system at an offsite facility.
■ Hierarchical storage management (HSM): Stores frequently accessed data
on faster media and less frequently accessed data on slower media.
■ Optical jukebox: Stores data on optical disks and uses robotics to load and
unload the optical disks as needed. This method is ideal when 24/7 availability
is required.
■ Replication: Copies data from one storage location to another. Synchronous
replication uses constant data updates to ensure that the locations are close
to the same, whereas asynchronous replication delays updates to a predefined
schedule.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 699
Many companies use cloud backup or replication solutions. Any organization con-
sidering a cloud solution should research the full security implications of this type of
deployment.
Training Personnel
Even if an organization takes the steps to develop the most thorough BCPs and
DRPs, these plans are useless if the organization’s personnel do not have the skills
to completely recover the organization’s assets when a disaster occurs. Personnel
should be given the appropriate time and monetary resources to ensure that ade-
quate training occurs. This includes allowing personnel to test any DRPs.
Training should be obtained from both internal and external sources. When job
duties change or new personnel are hired, policies should be in place to ensure the
appropriate transfer of knowledge occurs.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
700 CISSP Cert Guide
1 2 3 4 5 8
Recycled
11
1 2 3 4 6
12
13
1 2 3 4 7
14
1 2 3 4 15
16
1 2 3 4 9
17
1 2 3 4 10 18
19
1 2 3 4 5
5
21
1 2 3 4
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 701
disaster. This might mean that the organization must select an alternate location
that is in another city or geographic region. The main factors that affect the selec-
tion of an alternate location include the following:
■ Geographic location
■ Organizational needs
■ Location’s cost
■ Location’s restoration effort
Testing an alternate location is a vital part of any DRP. Some locations are easier to
test than others. The DRP should include instructions on when and how to periodi-
cally test alternate facilities to ensure that the contingency facility is compatible with
the primary facility.
The alternate locations that you should understand for the CISSP exam include the
following:
■ Hot site
■ Cold site
■ Warm site
■ Tertiary site
■ Reciprocal agreements
■ Redundant sites
Hot Site
A hot site is a leased facility that contains all the resources needed for full operation.
This environment includes computers, raised flooring, full utilities, electrical and
communications wiring, networking equipment, and UPSs. The only resource that
must be restored at a hot site is the organization’s data, often only partially. It should
take only a few minutes to hours to bring a hot site to full operation.
Although a hot site provides the quickest recovery, it is the most expensive to main-
tain due to the ready-to-use asset conditions. In addition, it can be administratively
hard to manage if the organization requires proprietary hardware or software. A hot
site requires the same security controls as the primary facility and full redundancy,
including hardware, software, and communication wiring.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
702 CISSP Cert Guide
Cold Site
A cold site is a leased facility that contains only electrical and communications wir-
ing, air conditioning, plumbing, and raised flooring. No communications equip-
ment, networking hardware, or computers are installed at a cold site until it is
necessary to bring the site to full operation. For this reason, a cold site takes much
longer to bring to full operation than a hot or warm site.
Although a cold site provides the slowest recovery, it is the least expensive to main-
tain. It is also the most difficult to test.
Warm Site
A warm site is a leased facility that contains electrical and communications wiring,
full utilities, and networking equipment. In most cases, the only devices that are not
included in a warm site are the computers. A warm site takes longer to restore than a
hot site but less than a cold site.
A warm site is somewhere between the restoration time and cost of a hot site and
cold site. It is the most widely implemented alternate leased location. Although test-
ing a warm site is easier than testing a cold site, a warm site requires much more
effort for testing than a hot site.
Figure 7-11 compares the components deployed in these three sites.
Figure 7-11 Hot Site, Warm Site, and Cold Site Comparison
Tertiary Site
A tertiary site is a secondary backup site that provides an alternate in case the hot
site, warm site, or cold site is unavailable. Many large companies implement tertiary
sites to protect against catastrophes that affect large geographic areas.
For example, if an organization requires a data center that is located on the coast,
the organization might have its primary location in New Orleans, Louisiana, and its
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 703
hot site in Mobile, Alabama. This organization might consider locating a tertiary site
in Omaha, Nebraska, because a hurricane can affect both the Louisiana and Alabama
Gulf coast.
Reciprocal Agreements
A reciprocal agreement is an agreement between two organizations that have similar
technological needs and infrastructures. In the agreement, both organizations agree
to act as an alternate location for the other if either one of the organization’s pri-
mary facilities is rendered unusable. Unfortunately in most cases, these agreements
are hard to enforce due to various legalities.
A disadvantage of this alternate site is that it might not be capable of handling the
required workload and operations of the other organization.
Redundant Sites
A redundant site (or mirrored site) is one that is identically configured as the pri-
mary site. A redundant or mirrored site is not a leased site but is usually owned by
the same organization that owns the primary site. The organization is responsible
for maintaining the redundant site. Multiple processing sites can also be configured
to serve as operationally redundant sites.
Although redundant sites are expensive to maintain, many organizations today see
them as a necessary expense to ensure that uninterrupted service can be provided.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
704 CISSP Cert Guide
Fault-Tolerance Technologies
Fault tolerance enables a system to continue operation in the event of the failure of
one or more components. Fault tolerance within a system can include fault-tolerant
adapter cards and fault-tolerant storage drives. One of the most well-known fault-
tolerant systems is RAID, which is discussed earlier in this chapter.
By implementing fault-tolerant technologies, an organization can ensure that nor-
mal operation occurs if a single fault-tolerant component fails.
Insurance
Although redundancy and fault tolerance can actually act as preventive measures
against failures, insurance is not really a preventive measure. If an organization pur-
chases insurance to provide protection in the event of a disruptive event, the insur-
ance has no power to protect against the event itself. The purpose of the insurance
is to ensure that the organization will have access to additional financial resources to
help in the recovery.
Keep in mind that recovery efforts from a disruptive event can often incur large
financial costs. Even some of the best estimates might still fall short when the actual
recovery must take place. By purchasing insurance, the organization can ensure that
key financial transactions, including payroll, accounts payable, and any recovery
costs, are covered.
Insurance actual cost valuation (ACV) compensates property based on the value of
the item on the date of loss plus 10 percent. However, keep in mind that insurance
on any printed materials covers only inscribed, printed, or written documents, man-
uscripts, or records. It does not cover money and securities. A special type of insur-
ance called business interruption insurance provides monetary protection for expenses
and lost earnings.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 705
Data Backup
Data backup provides prevention against data loss but not prevention against dis-
ruptive events. All organizations should ensure that all systems that store important
files are backed up in a timely manner. Users should also be encouraged to back up
personal files that they might need. In addition, periodic testing of the restoration
process should occur to ensure that the files can be restored.
Data recovery, including backup types and schemes and electronic backup, was cov-
ered in detail earlier in this chapter.
High Availability
High availability in data recovery is a concept which ensures that data is always
available using redundancy and fault tolerance. Most organizations implement high-
availability solutions as part of any DRP.
High-availability terms and techniques that you must understand include the
following:
■ Redundant Array of Independent Disks (RAID): A hard-drive technology
in which data is written across multiple disks in such a way that a disk can fail
and the data can be quickly made available from the remaining disks in the
array without restoring from a backup tape or other backup media.
■ Storage-area network (SAN): High-capacity storage (several petabytes)
devices that are connected by a high-speed private network using storage-
specific switches.
■ Failover: The capacity of a system to switch over to a backup system if a failure
in the primary system occurs.
■ Failsoft: The capability of a system to terminate noncritical processes when a
failure occurs.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
706 CISSP Cert Guide
Quality of Service
Quality of service (QoS) is a technology that manages network resources to ensure
a predefined level of service. It assigns traffic priorities to the different types of traf-
fic or protocols on a network. QoS deploys when a bottleneck occurs and decides
which traffic is more important than the rest. Exactly what traffic is more important
than what other traffic is based on rules the administrator supplies. Importance can
be based on IP address, MAC address, and even service name. However, QoS works
only when a bottleneck occurs in the appropriate location and the settings
are bandwidth declarations. For example, if the QoS settings are set beyond the
ISP’s bandwidth, traffic will not be prioritized if a router thinks there is enough
available bandwidth. But what if the ISP’s maximums are being met, and the ISP
decides what is or is not important? The key to any QoS deployment is to tweak the
settings and observe the network over time.
System Resilience
System resilience is the ability of a system, device, or data center to recover quickly
and continue operating after an equipment failure, a power outage, or another
disruption. It involves the use of redundant components or facilities. When one
component fails or is disrupted, the redundant component takes over seamlessly and
continues to provide services to the users.
Disaster Recovery
Disaster recovery involves restoring services and systems from a contingency state,
or the temporary state that operations may be in where they are running but not at
the primary facility or on the optimum resources. The DRP is discussed in detail in
Chapter 1. In this chapter, we discuss the disaster recovery process further, in terms
of response, personnel, communications, assessment, restoration, and training and
awareness.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 707
Response
After an event has occurred, the appropriate personnel should be contacted to initi-
ate the communications that alert the appropriate recovery team and the affected
personnel of the event. All the teams listed in the personnel section then need to
perform their duties. A process hierarchy must be developed so that each team per-
forms its duties as part of the disaster recovery process in the correct order.
Personnel
Although the number one and number two priorities when a disaster occurs are
personnel safety and health and damage mitigation, respectively, recovering from
a disaster quickly becomes an organization’s priority after these two are handled.
However, no organization can recover from a disaster if the personnel are not prop-
erly trained and prepared. To ensure that personnel can perform their duties during
disaster recovery, they must know and understand their job tasks.
During any disaster recovery, financial management is important. Financial man-
agement usually includes the chief financial officer and any other key accounting
personnel. This group must track the recovery costs and assess the cash flow pro-
jections. They formally notify any insurers of claims that will be made. Finally, this
group is responsible for establishing payroll continuance guidelines, procurement
procedures, and emergency costs tracking procedures.
Organizations must decide which teams are needed during a disaster recovery and
ensure that the appropriate personnel are placed on each of these teams. The disas-
ter recovery manager directs the short-term recovery actions immediately following
a disaster.
Organizations might need to implement the following teams to provide the appro-
priate support for the DRP:
■ Damage assessment team
■ Legal team
■ Media relations team
■ Recovery team
■ Relocation team
■ Restoration team
■ Salvage team
■ Security team
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
708 CISSP Cert Guide
Legal Team
The legal team deals with all legal issues immediately following the disaster and
during the disaster recovery. The legal team oversees any public relations events
that are held to address the disaster, although the media relations team will actually
deliver the message. The legal team should be consulted to ensure that all recovery
operations adhere to federal and state laws and regulations.
Recovery Team
The recovery team’s primary task is recovering the critical business functions at the
alternate facility. This task mostly involves ensuring that the physical assets are in
place, including computers and other devices, wiring, and so on. The recovery team
usually oversees the relocation and restoration teams.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 709
Relocation Team
The relocation team oversees the actual transfer of assets between locations. This
task includes moving assets from the primary site to the alternate site and then
returning those assets when the primary site is ready for operation.
Restoration Team
The restoration team actually ensures that the assets and data are restored to opera-
tions. The restoration team needs access to the backup media.
Salvage Team
The salvage team recovers all assets at the disaster location and ensures that the pri-
mary site returns to normal. The salvage team manages the cleaning of equipment,
oversees the rebuilding of the original facility, and identifies any experts to employ
in the recovery process. In most cases, the salvage team can decide when operations
at the disaster site can resume.
Security Team
The security team is responsible for managing the security at both the disaster site
and any alternate location that the organization uses during the recovery. Because
the geographic area that the security team must manage after the disaster is often
much larger, the security team might need to hire outside contractors to aid in this
process. Using these outside contractors to guard the physical access to the sites and
internal resources to provide security inside the facilities is always a better approach
because the reduced state might make issuing the appropriate access credentials to
contractors difficult.
Communications
Communication during disaster recovery is important to ensure that the organiza-
tion recovers in a timely manner. It is also important to ensure that no steps are
omitted and that the steps occur in the correct order. Communication with per-
sonnel depends on who is being contacted about the disaster. Personnel who are
affected by a disaster should receive communications that list the affected systems,
the projected outage time, and any contingencies they should follow in the mean-
time. The different disaster recovery teams should receive communications that per-
tain to their duties during the recovery from the disaster.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
710 CISSP Cert Guide
During recovery, security professionals should work closely with the different teams
to ensure that all assets remain secure. All teams involved in the process should also
communicate often with each other to update each other on the progress.
Assessment
When an event occurs, personnel need to assess the event’s severity and impact.
Doing so ensures that the appropriate response is implemented. Most organizations
establish event categories, including nonincident, incident, and severe incident. Each
organization should have a disaster recovery assessment process in place to ensure
that personnel properly assess each event.
Restoration
The restoration process involves restoring the primary systems and facilities to
normal operation. The personnel involved in this process depend on the assets that
were affected by the event. Any teams involved in the recovery of assets should care-
fully coordinate their recovery efforts. Without careful coordination, recovery could
be negatively impacted. For example, if full recovery of a web application requires
that the database servers be operational, the database administrator must work
closely with the web application and system administrators to ensure that both web
applications and computer servers are returned to normal function.
Lessons Learned
Documenting lessons learned is the process of gathering information that reflects
both the positive and negative experiences of a project, incident, or disaster recovery
effort. The purpose of documenting lessons learned at the end of a disaster is to use
the lessons to refine the disaster recovery plan and to provide future disaster recov-
ery teams with information to increase efficiency.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 711
By properly documenting these lessons, team members ensure that their experiences
are carried forward to aid future teams.
NOTE Business continuity and disaster recovery are covered in more detail in
Chapter 1.
Read-Through Test
A read-through test involves the teams that are part of any recovery plan. These
teams read through the plan that has been developed and attempt to identify any
inaccuracies or omissions in the plan.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
712 CISSP Cert Guide
Checklist Test
The checklist test occurs when managers of each department or functional area
review the BCP. These managers make note of any modifications to the plan. The
BCP committee then uses all the management notes to make changes to the BCP.
Table-Top Exercise
A table-top exercise is the most cost-effective and efficient way to identify areas of
overlap in the plan before conducting higher-level testing. A table-top exercise is an
informal brainstorming session that encourages participation from business leaders
and other key employees. In a table-top exercise, the participants are given roles and
responsibilities and agree to a particular disaster scenario on which they will focus.
Simulation Test
In a simulation test, the operations and support personnel execute the DRP in a
role-playing scenario. This test identifies omitted steps and threats.
Parallel Test
A parallel test involves bringing the recovery site to a state of operational readiness
but maintaining operations at the primary site.
Full-Interruption Test
A full-interruption test involves shutting down the primary facility and bringing
the alternate facility up to full operation. This is a hard switch-over in which all
processing occurs at the primary facility until the “switch” is thrown. This type of
test requires full coordination between all the parties and includes notifying users in
advance of the planned test. An organization should perform this type of test only
when all other tests have been implemented and are successful.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 713
Functional Drill
A functional drill tests a single function or department to see whether the function’s
DRP is complete. This type of drill requires the participation of the personnel that
perform the function.
Evacuation Drill
In an evacuation drill, personnel follow the evacuation or shelter-in-place guidelines
for a particular disaster type. In this type of drill, personnel must understand the
area to which they are to report when the evacuation occurs. All personnel should be
accounted for at that time.
Physical Security
Physical security involves using the appropriate security controls to protect all assets
from physical access. Perimeter security involves implementing the appropriate
perimeter security controls, including gates and fences, perimeter intrusion detec-
tion, lighting, patrol force, and access control, to prevent access to the perimeter
of a facility. Building and internal security involves implementing the appropriate
building and internal security controls.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
714 CISSP Cert Guide
Security Layers
Perimeter Fence
Exterior Door
Office Door
Locked Cabinet
Barriers (Bollards)
Barriers called bollards have become quite common around the perimeter of new
office and government buildings. These short vertical posts placed at the building’s
entrance way and lining sidewalks help to provide protection from vehicles that
might either intentionally or unintentionally crash into or enter the building or
injure pedestrians. They can be made of many types of materials. The ones shown in
Figure 7-13 are stainless steel.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 715
Fences
Fencing is the first line of defense in the concentric circle paradigm. When selecting
the type of fencing to install, consider the determination of the individuals you are
trying to discourage from entry. Use the following guidelines with respect to height:
■ Fences 3 to 4 feet tall deter only casual intruders.
■ Fences 6 to 7 feet tall are too tall to climb easily.
■ Fences 8 feet and taller deter more determined intruders, especially when
these fences are augmented with razor wire.
A geo-fence is a geographic area within which devices are managed using some sort
of radio frequency communication. For example, a geo-fence could be set up in a
radius around a store or point location or within a predefined set of boundaries, such
as around a school zone. It is used to track users or devices entering or leaving the
geo-fence area. Alerts could be configured to message the device’s user and the
geo-fence operator of the device’s location.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
716 CISSP Cert Guide
Gates
Gates can be weak points in a fence if not handled correctly. Gates are rated by the
Underwriters Laboratory (UL) in the following way. Each step up in class requires
additional levels of protection:
■ Class 1 gate: Residential use
■ Class 2 gate: Commercial usage
■ Class 3 gate: Industrial usage
■ Class 4 gate: Restricted area
Walls
In some cases, walls might be called for around a facility. When that is the case, and
when perimeter security is critical, perimeter intrusion detection systems, discussed
next, can be deployed to alert security personnel of any breaching of the walls.
Infrared Sensors
Passive infrared (PIR) systems operate by identifying changes in heat waves in
an area. Because the presence of an intruder would raise the temperature of the
surrounding air particles, this system alerts or sounds an alarm when this occurs.
Electromechanical Systems
Electromechanical systems operate by detecting a break in an electrical circuit.
For example, the circuit might cross a window or door and when the window or
door is opened, the circuit is broken, setting off an alarm of some sort. Another
example might be a pressure pad placed under the carpet to detect the presence of
individuals.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 717
Photoelectric Systems
Photometric systems (or photoelectric systems) operate by detecting changes in
the light and thus are used in windowless areas. They send a beam of light across the
area, and if the beam is interrupted (by a person or a stray animal, for example), the
alarm is triggered.
Capacitance Detector
Capacitance detectors emit a magnetic field and monitor that field. If the field is
disrupted, which will occur when a person enters the area, the alarm will sound.
CCTV
A closed-circuit television (CCTV) system uses sets of cameras that can either be
monitored in real time or can record days’ worth of activity that can be viewed as
needed at a later time. In very high-security facilities, these systems are usually mon-
itored. One of the main benefits of using CCTV is that it increases a guard’s visual
capabilities. Guards can monitor larger areas at once from a central location. CCTV
is a category of physical surveillance, not computer/network surveillance.
Camera types include outdoor, infrared, fixed-position, pan/tilt, dome, and Internet
Protocol (IP) cameras. When implementing cameras, organizations need to select
the appropriate lens, resolution, frames per second (FPS), and compression. In
addition, analysis of the lighting requirements of the different cameras must be
understood; a CCTV system should work in the amount of light that the location
provides. In addition, an organization must understand the different types of moni-
tor displays, including single-image, split-screen, and large-format displays. Finally,
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
718 CISSP Cert Guide
storage space will be required, whether the videos are digital format and stored on
a server or physical format and stored on physical tapes. Storage can be a particular
concern when continuous monitoring is implemented.
Lighting
One of the best ways to deter crime and mischief is to shine a light on areas of
concern. Next, we look at some types of lighting and some lighting systems that
have proven to be effective. Lighting is considered a physical control for physical
security.
Types of Systems
The security professional must be familiar with several types of lighting systems:
■ Continuous lighting: An array of lights that provide an even amount of illu-
mination across an area.
■ Standby lighting: A type of system that illuminates only at certain times or on
a schedule.
■ Movable lighting: Lighting that can be repositioned as needed.
■ Emergency lighting: Lighting systems with their own power source to use
when power is out.
Types of Lighting
A number of options are available when choosing the illumination source or type of
light. The following are the most common choices:
■ Fluorescent: A very low-pressure mercury-vapor gas-discharge lamp that uses
fluorescence to produce visible light.
■ Mercury vapor: A gas-discharge lamp that uses an electric arc through
vaporized mercury to produce light.
■ Sodium vapor: A gas-discharge lamp that uses sodium in an excited state to
produce light.
■ Quartz lamps: A lamp consisting of an ultraviolet light source, such as mer-
cury vapor, contained in a fused-silica bulb that transmits ultraviolet light with
little absorption.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 719
Regardless of the light source, it will be rated by its feet of illumination. When
positioning the lights, you must take this rating into consideration. For example,
if a controlled light fixture mounted on a 5-meter pole can illuminate an area
30 meters in diameter, for security lighting purposes, the distance between the
fixtures should be 30 feet. Moreover, there should be extensive exterior perimeter
lighting of entrances or parking areas to discourage prowlers or casual intruders.
Patrol Force
An excellent augmentation to all other detection systems is the presence of a guard
patrolling the facility. This option offers the most flexibility in reacting to whatever
occurs. One of the keys to success is adequate training of guards so that they are
prepared for any eventuality. There should be a prepared response for any possible
occurrence. One of the main benefits of this approach is that guards can use dis-
criminating judgment based on the situation, which automated systems cannot do.
The patrol force can be internally hired, trained, and controlled or can be out-
sourced to a contract security company. An organization can control the training and
performance of an internal patrol force. However, some organizations outsource the
patrol force to ensure impartiality and cost savings.
Access Control
When physical access to the facility is granted, a number of guidelines should be
followed with respect to record keeping. Every successful and unsuccessful attempt
to enter the facility, including those instances where admission was granted, should
be recorded as follows:
■ Date and time
■ Specific entry point
■ User ID employed during the attempt
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
720 CISSP Cert Guide
personnel. Their safety comes before all other considerations. Although equipment
and, in most cases the data, can be recovered, human beings can neither be backed
up nor replaced.
An Occupant Emergency Plan (OEP) provides coordinated procedures for minimiz-
ing loss of life or injury and protecting property damage in response to a physical
threat. In a disaster of any type, personnel safety is the first concern.
The organization is responsible for protecting the privacy of each individual’s
information, especially as it relates to personnel and medical records. Although
this expectation of privacy does not necessarily and usually does not extend to their
activities on the network, both federal and state laws hold organizations responsible
for the release of this type of information, with violations resulting in heavy fines
and potential lawsuits if the company is found liable.
Organizations should develop policies for dealing with employee duress, travel,
monitoring, emergency management, and security training and awareness.
Duress
Employee duress occurs when an employee is coerced to commit an action by
another party. This is a particular concern for high-level management or employees
with high security clearances because they have access to extra assets. Organiza-
tions should train employees on what to do when under duress. For any security
codes, PINs, or passwords that are used, it is a good policy to implement a secondary
duress code. Then, if personnel are under duress, they use the duress code to access
the systems, facilities, or other assets. Security personnel are alerted that the duress
code has been used. Organizations should stress to personnel that the protection of
life should trump any other considerations.
Travel
Employees often travel for business purposes and take their organization-issued
assets while traveling. Employees must be given the proper training to ensure that
they keep organization-issued assets safe during the travel period and to be par-
ticularly careful when in public. They should also receive instructions on properly
reporting lost or stolen assets.
Monitoring
Employee actions on organizational assets may need to be monitored, particularly
for personnel with high clearance levels. However, it is important that person-
nel understand that they are being monitored. Organizations that will monitor
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 721
Emergency Management
Organizations should have specific emergency management policies and procedures
in place. Emergency management teams should be formed to document the types
of emergencies that could occur and prepare the appropriate emergency plans to be
used if a specific emergency occurs.
These plans should be periodically tested to ensure that personnel understand what
to do in the event of an emergency and revised based on the results of these tests.
Emergencies that should be anticipated include weather events (such as tornadoes,
hurricanes, and winter storms), active shooter situations, and power outages. Emer-
gency management oftentimes leads to business continuity and disaster recovery if
the effects of the emergency are long term. Emergency management is concerned
with the immediate reaction to the emergency. While business continuity and
disaster recovery are focused on the recovery of the organization to normal opera-
tions, not every emergency will require full disaster recovery. For example, if an
organization is notified that a tornado warning has been issued, the organization
should implement the emergency plan for tornadoes. If the tornado does not affect
the facility, operations can return to normal as soon as the warning expires and the
tornado passes. If the tornado affects the facility, however, it might be necessary to
implement the business continuity and disaster recovery plans.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
722 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 723
acoustical systems; artifact; asset; baselining; best evidence rule; blacklisting; bol-
lards; chain of custody; checklist test; circumstantial evidence; civil investigation;
Class 1 gate; Class 2 gate; Class 3 gate; Class 4 gate; clipping levels; closed-circuit
television (CCTV) system; cold site; conclusive evidence; content analysis; con-
tinuous lighting; copy backup; corroborative evidence; crime scene; criminal
investigation; daily backup; data clearing; data loss prevention (DLP) software;
data purging; differential backup; direct evidence; disk imaging; duress; egress
monitoring; electronic vaulting; emergency lighting; event; failover; failsoft; fault
tolerance; feet of illumination; first in, first out (FIFO); fluorescent; full backup;
full-interruption test; grandfather/father/son (GFS); hearsay evidence; hierarchi-
cal storage management (HSM) system; high availability; honeynet; honeypot;
hot site; incident; incremental backup; intangible assets; job rotation; least privi-
lege; log management; means; mercury vapor; motive; movable lighting; need to
know; network-attached storage (NAS); operations security; opinion evidence;
opportunity; passive infrared (PIR) system; photometric system; quality of service
(QoS); quartz lamp; parallel test; RAID 0; RAID 1; RAID 3; RAID 5; RAID 10;
read-through test; reciprocal agreement; redundancy; redundant site; regulatory
investigation; remanence; resource provisioning; sandboxing; search; seizure; sec-
ondary evidence; separation of duties; service-level agreement (SLA); simulation
test; slack space analysis; sodium vapor; standby lighting; steganography analysis;
storage-area network (SAN); structured walk-through test; surveillance; system
resilience; table-top exercise; tangible assets; tertiary site; threat intelligence;
threat intelligence feed (TI feed); threat feed; threat intelligence sources; threat
hunting; transaction log backup; trusted path; trusted recovery; two-person con-
trol; user and entity behavior analytics (UEBA); user behavior analytics (UBA);
warm site; whitelisting
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
724 CISSP Cert Guide
4. Which of the following refers to allowing access to users only to the resources
required to do their jobs?
a. Job rotation
b. Separation of duties
c. Need to know/least privilege
d. Mandatory vacation
8. Which term is used for a facility that contains all the resources needed for full
operation?
a. Cold site
b. Hot site
c. Warm site
d. Tertiary site
9. Which electronic backup type stores data on optical discs and uses robotics to
load and unload the optical disks as needed?
a. Optical jukebox
b. Hierarchical storage management
c. Tape vaulting
d. Replication
12. Which of the following are considered virtual assets? (Choose all that apply.)
a. Software-defined networks
b. Virtual storage-area networks
c. Guest OSs deployed on VMs
d. Virtual routers
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
726 CISSP Cert Guide
13. Which of the following describes the ability of a system, device, or data center
to recover quickly and continue operating after an equipment failure, power
outage, or other disruption?
a. Quality of service (QoS)
b. Recovery time objective (RTO)
c. Recovery point objective (RPO)
d. System resilience
14. Which of the following are the main factors that affect the selection of an
alternate location during the development of a DRP? (Choose all that apply.)
a. Geographic location
b. Organizational needs
c. Location’s cost
d. Location’s restoration effort
16. You need to record incoming and outgoing network traffic information in
order to determine the origin of an attack. Which of the following logs would
be appropriate for this purpose?
a. System log
b. Application log
c. Firewall log
d. Change log
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 727
17. What should you perform on all information accepted into a system to ensure
that it is of the right data type and format and that it does not leave the system
in an insecure state?
a. Clipping levels
b. Two-person control
c. Access review audits
d. Input validation
18. Which of the following defenses would you implement to discourage a deter-
mined intruder?
a. 3 to 4 feet tall fence
b. 6 to 7 feet tall fence
c. 8 feet and taller fence
d. Geo-fence
19. Which of the following actions could you perform to logically harden a sys-
tem? (Choose all that apply.)
a. Remove unnecessary applications.
b. Disable unnecessary services.
c. Block unrequired ports.
d. Tightly control the connecting of external storage devices and media.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
728 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 729
9. a. An optical jukebox stores data on optical discs and uses robotics to load and
unload the optical discs as needed.
10. b. Failsoft is the capability of a system to terminate noncritical processes when
a failure occurs.
11. a. Egress monitoring occurs when an organization monitors the outbound
flow of information from one network to another. The most popular form
of egress monitoring is carried out using firewalls that monitor and control
outbound traffic. Continuous monitoring and Continuous Monitoring as a
Service (CMaaS) are not specific enough to answer this question. Any logging
and monitoring activities should be part of an organizational continuous moni-
toring program. The continuous monitoring program must be designed to
meet the needs of the organization and implemented correctly to ensure that
the organization’s critical infrastructure is guarded. Organizations may want
to look into CMaaS solutions deployed by cloud service providers. Resource
provisioning is the process in security operations that ensures that the organi-
zation deploys only the assets that it currently needs.
12. a, b, c, d. Virtual assets include software-defined networks (SDNs), virtual
storage-area networks (VSANs), guest operating systems deployed on virtual
machines (VMs), and virtual routers. As with physical assets, the deployment
and decommissioning of virtual assets should be tightly controlled as part of
configuration management because virtual assets, like physical assets, can be
compromised.
13. d. System resilience is the ability of a system, device, or data center to recover
quickly and continue operating after an equipment failure, power outage, or
other disruption. It involves the use of redundant components or facilities.
Quality of service (QoS) is a technology that manages network resources to
ensure a predefined level of service. It assigns traffic priorities to the different
types of traffic on a network. A recovery time objective (RTO) stipulates the
amount of time an organization needs to recover from a disaster, and a recov-
ery point objective (RPO) stipulates the amount of data an organization can
lose when a disaster occurs.
14. a, b, c, d. The main factors that affect the selection of an alternate location
during the development of a disaster recovery plan (DRP) include the
following:
■ Geographic location
■ Organizational needs
■ Location’s cost
■ Location’s restoration effort
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
730 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 7: Security Operations 731
A geo-fence is a geographic area within which devices are managed using some
sort of radio frequency communication. It is used to track users or devices
entering or leaving the geo-fence area.
19. a, b, c, d. An ongoing goal of operations security is to ensure that all systems
have been hardened to the extent that is possible and still provide functionality.
The following actions can be performed to logically harden a system:
■ Remove unnecessary applications.
■ Disable unnecessary services.
■ Block unrequired ports.
■ Tightly control the connecting of external storage devices and media if
it’s allowed at all.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
This chapter covers the following subjects:
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
CHAPTER 8
Software Development
Security
Software development security covers all the security issues and controls that
security professionals must understand when dealing with commercial or
in-house-developed software. They should understand the software develop-
ment life cycle and be able to assess software security effectiveness and the
impact of software.
Software is at the heart of all functionality in computer systems. Various types of
software, including operating systems, applications, and utilities, work together
to deliver instructions from a human to hardware. All these instructions are cre-
ated with the intent of making some operation possible.
When software is written and developed, the focus can be placed on its func-
tionality and ease of use or on its security. In many cases, the two goals might
work at cross purposes. Giving inadequate attention to the security of a piece of
software results in software that can introduce security issues to both the appli-
cation and the systems on which it is run. Moreover, some types of software are
intentionally developed to create security openings in a network or system. This
chapter discusses software development methodology, best practices for secure
development, and types of malware and methods of mitigating the effects of
malware.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
734 CISSP Cert Guide
Foundation Topics
Machine Languages
Machine languages are those that deliver instructions directly to the processor. This
was the only type of programming done in the 1950s and uses basic binary instruc-
tions without a compiler or interpreter (programs that convert higher language
types to a form that can be executed by the processor). This type of programming is
both time-consuming and prone to errors. Most of these programs were very rudi-
mentary due to the need to keep a tight rein on their length.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 735
algorithms free programmers to focus on the real-world problems they are trying to
solve rather than the details that go on behind the scenes.
Finally, in the 1990s, a fifth generation of languages began to emerge, called natural
languages. The goal is to use these languages to create software that can solve prob-
lems on its own rather than require a programmer to create code to deal with the
problem. Although this goal is not fully realized, using knowledge-based processing
and artificial intelligence is worth pursuing.
A significant distinction exists with respect to security between compiled programs
and interpreted programs. Because a compiled program has already been translated
to binary language (machine code), detecting malicious code inside an application
is very difficult. Interpreted code, on the other hand, uses a language interpreter,
which is a piece of software that translates high-level code, line-by-line, each time a
program is executed (run). In this case, spotting malicious code is somewhat easier
because the code is a bit more readable by humans.
Object-Oriented Programming
In classic software development, data is input into a program, the program manages
the data from beginning to end, and a result is returned. Object-oriented program-
ming (OOP) supplies the same functionality, but it is more efficiently introduced
through different techniques. In OOP, objects are organized in a hierarchy of classes
with characteristics called attributes attached to each class. OOP emphasizes the
employment of objects and methods rather than types or transformations.
The programmer creates the classes of objects but not necessarily the objects them-
selves. Software in the program allows for objects to be created on demand when
needed through requests. When a request comes in, usually from an existing object
for a new object to carry out some function, it is built (instantiated) with necessary
code. It does not matter whether objects are written in a different programming
language as long as the objects have the ability to communicate with one another, a
process usually made possible through an application programming interface (API).
Moreover, because objects are organized in hierarchical classes, object methods (func-
tionalities or procedures) can be passed from a class to a subclass through a process
called inheritance. The objects contain or encapsulate attribute values. Objects com-
municate with messages sent to another object’s API. Different objects might react
differently to the same message, which is called the object’s behavior. The code that
defines how an object will behave with respect to a message is called its method.
Some parts of an object can be defined as private, which means its internal data
and operation are not visible to other objects. This privacy is provided through the
encapsulation process and is sometimes called data hiding. Abstraction is the ability to
suppress these unnecessary internal details. Other objects, subjects, and applications
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
736 CISSP Cert Guide
can make use of objects’ functionality through standardized interfaces without wor-
rying about the details of the functionality.
OOP uses data types with defined ranges. Programmers must identify all data
objects and their relationships through a process called data modeling. The object is
then generalized into an object class and is defined as part of a logic sequence, also
called a method, used to manipulate the object. An object can be used in different
applications.
Examples of OOP languages are C++, Java, Simula 67, and Smalltalk. The many
advantages to this OOP include
■ Modularity in design through autonomous objects
■ Definition of internal components without impacting other parts of the system
■ Reusability of components
■ The capability to more readily map to business needs
Polymorphism
In an object-oriented system, polymorphism denotes objects of many different
classes that are related by some common superclass; thus, any object denoted by this
name can respond to some common set of operations in a different way. Polymor-
phism is the ability of different objects with a common name to react to the same
message or input and produce a different output. For example, three objects can be
created to receive the string “Toyota Corolla” as input. One object’s output might be
“subcompact”, another’s might be “uses regular fuel”, and another’s might be “costs
$18,000”. In some cases, these differences derive from the fact that the objects have
inherited different characteristics from their parent classes.
Polyinstantiation
Polyinstantiation prevents low-level objects from gaining information from a higher
security level. Objects may act differently depending on the data they contain. For
this reason, it may be difficult to determine whether inherited security properties are
valid. Polyinstantiation prevents inference database attacks.
Encapsulation
Encapsulation protects objects by preventing direct access to data that is in the
object. It ensures that private data is protected. However, encapsulation makes it
hard to apply the appropriate security policies to an object because it is hard to
determine what the object contains.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 737
Cohesion
Cohesion is a term used to describe program organization. It is the degree to which
elements of a module are related functionally. If it is limited to a small number or a
single function, it is said to have high cohesion. High cohesion is good in that changes
can be made to the model without affecting other modules. It also makes reusing the
module easier. The highest cohesion is provided by limiting the scope of a module’s
operation.
Coupling
Coupling describes how much interaction one module requires from another mod-
ule to function the overall programming function. Low or loose coupling indicates
that a module does not need much help from other modules, whereas high coupling
indicates the opposite. If Module A needs to wait on results from messages it sent to
three other modules before it can proceed, it is said to have high coupling. Low cou-
pling, in other words, indicates how independent a class is from other classes. The
best programming provides high cohesion and low coupling.
Data Structures
Data structure refers to the logical relationship between elements of data. It
describes the extent to which elements, methods of access, and processing alterna-
tives are associated and the organization of data elements. These relationships can
be simple or complex. From a security standpoint, these relationships or the way in
which various software components communicate and the data formats that they use
must be well understood to understand the vulnerabilities that might be exposed by
these data structures.
CORBA
Common Object Request Broker Architecture (CORBA) is an open object-oriented
standard developed by the Object Management Group (OMG). This standard uses
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
738 CISSP Cert Guide
OLE
Object Linking and Embedding (OLE) is a method for sharing objects on a local
computer that uses COM (Component Object Model) as its foundation. In fact,
OLE is sometimes described as the predecessor of COM. It allows objects to be
embedded in documents (spreadsheets, graphics, and so on). The term linking refers
to the relationship between one program and another, and the term embedding refers
to the placement of data into a foreign program or document. One example of OLE
is including an Excel worksheet in a Microsoft Word document.
Java
Java Platform, Enterprise Edition (Java EE), is another distributed component
model that relies on the Java programming language. It is a framework used to
develop software that provides APIs for networking services and uses an interpro-
cess communication process that is based on Common Object Request Broker
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 739
SOA
A newer approach to providing a distributed computing model is the service-
oriented architecture (SOA). It operates on the theory of providing web-based
communication functionality without each application requiring redundant code
to be written per application. It uses standardized interfaces and components called
service brokers to facilitate communication among web-based applications.
Mobile Code
Mobile code is a type of code that can be transferred across a network and then exe-
cuted on a remote system or device. The security concerns with mobile code revolve
around preventing the execution of malicious code without the knowledge of the
user. The following sections cover the two main types of mobile code, Java applets
and ActiveX applets, and the way they operate.
Java Applets
A Java applet is a small application written in Java that is run from a web page. It is
platform independent and compiles to bytecode that is not processor-specific. When
the applet downloads to the computer, the Java virtual machine (JVM), which must
be present on the destination computer, converts the byte code to machine code.
The JVM executes the applet in a protected environment called a sandbox. This criti-
cal security feature, called the Java Security Model (JSM), helps mitigate the extent
of damage that could be caused by the applet if it has any malicious code. However,
it does not eliminate the problem with hostile applets (also called active content
modules), so Java applets should still be regarded with suspicion because they might
launch an intentional attack after being downloaded from the Internet. Java applets
have largely been phased out.
ActiveX
ActiveX is a Microsoft technology that uses OOP (object-oriented programming)
and is based on the COM and DCOM. These self-sufficient programs, called con-
trols, become a part of the operating system after they’re downloaded. The problem
is that these controls execute under the security context of the current user, which
in many cases has administrator rights without knowing and by default. This means
that a malicious ActiveX control will download and automatically run with adminis-
trative privileges and could do some serious damage.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
740 CISSP Cert Guide
ActiveX uses Authenticode technology to digitally sign the controls. This system has
been shown to have significant flaws, and ActiveX controls are generally regarded
with more suspicion than Java applets. ActiveX is being phased out and is not sup-
ported by Microsoft’s Edge web browser.
NIST SP 800-163
NIST SP 800-163 Rev. 1, “Vetting the Security of Mobile Applications,” was written
to help organizations (1) understand the process for vetting the security of mobile
applications, (2) plan for the implementation of an application (app) vetting process,
(3) develop app security requirements, (4) understand the types of app vulnerabili-
ties and the testing methods used to detect those vulnerabilities, and (5) determine
whether an app is acceptable for deployment on the organization’s mobile devices.
To provide software assurance for apps, organizations should develop security
requirements that specify, for example, how data used by an app should be secured,
the environment in which an app will be deployed, and the acceptable level of risk
for an app. To help ensure that an app conforms to such requirements, a process for
evaluating the security of apps should be performed. This process is referred to as
an app vetting process. An app vetting process is a sequence of activities that aims
to determine whether an app conforms to the organization’s security requirements.
This process is performed on an app after the app has been developed and released
for distribution but prior to its deployment on an organization’s mobile device.
Thus, an app vetting process is distinguished from software assurance processes that
may occur during the software development life cycle of an app. Note that an app
vetting process typically involves analysis of an app’s compiled, binary representation
but can also involve analysis of the app’s source code if it is available.
An app vetting process comprises a sequence of two main activities: app testing and
app approval/rejection.
According to NIST SP 800-163 Rev. 1, an app vetting process begins when an app
is submitted by a mobile device administrator to one or more analyzers for testing.
Apps that are submitted by an administrator for testing will typically be acquired
from an app store or an app developer, each of which may be internal or external
to the organization. An analyzer is a service, tool, or human that tests an app for
specific software vulnerabilities and may be internal or external to the organization.
After an app has been received and preprocessed by an analyzer, the analyzer then
tests the app for the presence of software vulnerabilities. Such testing may include
a wide variety of tests including static and dynamic analyses and may be performed
in an automated or manual fashion. Note that the tests performed by an analyzer
are aimed at identifying software vulnerabilities that may be common across differ-
ent apps. After testing an app, an analyzer generates a report that identifies detected
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 741
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
742 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 743
■ Test plans: Reviewing the developer’s test plans may help focus app
vetting by identifying any areas that have not been tested or were tested
inadequately. A developer could opt to submit a test oracle in certain
situations to demonstrate its internal test effort.
■ Testing results: Code review results and other testing results will
indicate which security standards were followed. For example, if an
application threat model was created, this model should be submitted. It
will list weaknesses that were identified and should have been addressed
during design and coding of the app.
■ Service-level agreement: If an app was developed for an organization
by a third party, a service-level agreement (SLA) may have been included
as part of the vendor contract. This contract should require the app to be
compatible with the organization’s security policy.
2. Acquire/Develop
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
744 CISSP Cert Guide
3. Implement
4. Operate/Maintain
5. Dispose
Initiate
In the Initiate phase, the realization is made that a new feature or functionality is
desired or required in an existing piece of software. This new feature might consti-
tute an upgrade to an existing product or the development of a whole new piece of
software. In either case, the Initiate phase includes making a decision on whether to
purchase or develop the product internally.
In this stage, an organization must also give thought to the security requirements of
the solution. A preliminary risk assessment can be created to detail the confidentiality,
integrity, and availability (CIA) requirements and concerns. Identifying these issues
at the outset is important so these considerations can guide the purchase or develop-
ment of the solution. The earlier in the System Development Life Cycle that the
security requirements are identified, the more likely that the issues can be success-
fully addressed in the final product.
Acquire/Develop
In the Acquire/Develop stage of the System Development Life Cycle, a series of
activities take place that provide input to facilitate making a decision about acquiring
or developing the solution; the organization then makes a decision on the solution.
The activities are designed to get answers to the following questions:
■ What functions does the system need to perform?
■ What are the potential risks to CIA exposed by the solution?
■ What protection levels must be provided to satisfy legal and regulatory
requirements?
■ What tests are required to ensure that security concerns have been mitigated?
■ How do various third-party solutions address these concerns?
■ How do the security controls required by the solution affect other parts of the
company security policy?
■ What metrics will be used to evaluate the success of the security controls?
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 745
The answers to these questions should guide the acquisition or develop the decision
as well as the steps that follow this stage of the System Development Life Cycle.
Implement
In the Implement stage, the solution is introduced to the live environment but not
without its completing both certification and accreditation. Certification is the
process of technically verifying the solution’s effectiveness and security. The accredi-
tation process involves a formal authorization to introduce the solution into the
production environment by management.
Operate/Maintain
After the system is operating in the environment, the process does not end. Doing
a performance baseline is important so that continuous monitoring can take place.
The baseline ensures that performance issues can be quickly determined. Any
changes over time (addition of new features, patches to the solution, and so on)
should be closely monitored with respect to the effects on the baseline.
Instituting a formal change management process ensures that all changes are
both approved and documented. Because changes can affect both security and
performance, special attention should be given to monitoring the solution after any
changes.
Finally, vulnerability assessments and penetration testing after the solution is
implemented can help discover any security or performance problems that might
either be introduced by a change or arise as a result of a new threat.
Dispose
The Dispose stage consists of removing the solution from the environment when it
reaches the end of its usefulness. When this situation occurs, an organization must
consider certain issues. They include
■ Does removal or replacement of the solution introduce any security holes in
the network?
■ How can the system be terminated in an orderly fashion so as not to disrupt
business continuity?
■ How should any residual data left on any systems be removed?
■ How should any physical systems that were a part of the solution be disposed
of safely?
■ Are there any legal or regulatory issues that would guide the destruction of
data?
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
746 CISSP Cert Guide
2. Gather Requirements
3. Design
4. Develop
5. Test/Validate
6. Release/Maintain
7. Certify/Accredit
Plan/Initiate Project
In the Plan/Initiate Project phase of the Software Development Life Cycle, the
organization decides to initiate a new software development project and formally
plans the project. Security professionals should be involved in this phase to deter-
mine whether information involved in the project requires protection and whether
the application needs to be safeguarded separately from the data it processes. Secu-
rity professionals need to analyze the expected results of the new application to
determine whether the resultant data has a higher value to the organization and,
therefore, requires higher protection.
Any information that is handled by the application needs a value assigned by its
owner, and any special regulatory or compliance requirements need to be docu-
mented. For example, healthcare information is regulated by several federal laws and
must be protected. The classification of all input and output data of the application
needs to be documented, and the appropriate application controls should be docu-
mented to ensure that the input and output data are protected.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 747
Data transmission must also be analyzed to determine the types of networks used.
All data sources must also be analyzed. Finally, the effects of the application on
organizational operations and culture need to be analyzed.
Gather Requirements
In the Gather Requirements phase of the Software Development Life Cycle, both
the functionality and the security requirements of the solution are identified. These
requirements could be derived from a variety of sources, such as evaluating competi-
tor products for a commercial product or surveying the needs of users for an inter-
nal solution. In some cases, these requirements could come from a direct request
from a current customer. There are also user requirements, functional requirements,
and security requirements.
From a security perspective, an organization must identify potential vulnerabilities
and threats. When this assessment is performed, the intended purpose of the soft-
ware and the expected environment must be considered. Moreover, the data that will
be generated or handled by the solution must be assessed for its sensitivity. Assign-
ing a privacy impact rating to the data to help guide measures intended to protect
the data from exposure might be useful.
Design
In the Design phase of the Software Development Life Cycle, an organization
develops a detailed description of how the software will satisfy all functional and
security goals. It attempts to map the internal behavior and operations of the soft-
ware to specific requirements to identify any requirements that have not been met
prior to implementation and testing.
During this process, the state of the application is determined in every phase of its
activities. The state of the application refers to its functional and security posture
during each operation it performs. Therefore all possible operations must be identi-
fied. This is done to ensure that at no time does the software enter an insecure state
or act in an unpredictable way.
Identifying the attack surface is also a part of this analysis. The attack surface
describes what is available to be leveraged by an attacker. The amount of attack
surface might change at various states of the application, but at no time should the
attack surface provided violate the security needs identified in the Gather Require-
ments stage.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
748 CISSP Cert Guide
Develop
The Develop phase involves writing the code or instructions that make the software
work. The emphasis of this phase is strict adherence to secure coding practices.
Some models that can help promote secure coding are covered later in this chapter,
in the section “Software Development Security Best Practices.”
Many security issues with software are created through insecure coding practices,
such as lack of input validation or data type checks. Organizations need to identify
these issues in a code review that attempts to assume all possible attack scenarios
and their impact on the code. Not identifying these issues can lead to attacks such as
buffer overflows and injection and to other error conditions, which are covered later
in this chapter, in the section “Security Weaknesses and Vulnerabilities at the Source
Code Level.”
Test/Validate
In the Test/Validate phase, several types of testing should occur, including ways to
identify both functional errors and security issues. The auditing method that assesses
the extent of the system testing and identifies specific program logic that has not
been tested is called the test data method. This method tests not only expected or
valid input but also invalid and unexpected values to assess the behavior of the soft-
ware in both instances. An active attempt should be made to attack the software,
including attempts at buffer overflows and denial-of-service (DoS) attacks. Some
goals of testing performed at this time are
■ Verification testing: Determines whether the original design specifications
have been met.
■ Validation testing: Takes a higher-level view and determines whether the
original purpose of the software has been achieved.
Software is typically developed in pieces or modules of code that are later assembled
to produce the final product. Each module should be tested separately, in a proce-
dure called unit testing. Having development staff carry out this testing is critical, but
using a different group of engineers than the ones who wrote the code can ensure
that an impartial process occurs. This is a good example of the concept of separation
of duties.
The following should be characteristics of the unit testing:
■ The test data is part of the specifications.
■ Testing should check for out-of-range values and out-of-bounds conditions.
■ Correct test output results should be developed and known beforehand.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 749
Live or actual field data is not recommended for use in the unit testing procedures.
Additional testing that is recommended includes
■ Integration testing: Assesses the way in which the modules work together
and determines whether functional and security specifications have been met.
■ Acceptance testing: Ensures that the customer (either internal or external) is
satisfied with the functionality of the software.
■ Regression testing: Takes place after changes are made to the code to ensure
the changes have reduced neither functionality nor security.
Release/Maintenance
The Release/Maintenance phase includes the implementation of the software into
the live environment and the continued monitoring of its operation. Finding addi-
tional functional and security problems at this point, as the software begins to inter-
face with other elements of the network, is not unusual.
In many cases, vulnerabilities are discovered in the live environments for which
no current fix or patch exists. Such a vulnerability is referred to as a zero-day
vulnerability. It is, of course, better for an organization to have supporting
development staff discover these issues than to have people who are looking to
exploit vulnerabilities find them.
Certify/Accredit
Certification is the process of evaluating software or a system for its security effec-
tiveness with regard to the customer’s needs. Ratings can certainly be an input to
this but are not the only consideration. Accreditation is the formal acceptance of the
adequacy of a system’s overall security by the management. Provisional accreditation
is given for a specific amount of time and lists required changes to applications, sys-
tems, or accreditation documentation. Full accreditation grants accreditation with-
out any required changes. Provisional accreditation becomes full accreditation after
all the changes are completed, analyzed, and approved by the certifying body.
Although certification and accreditation are related, they are not considered to be
two steps in a process.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
750 CISSP Cert Guide
DevSecOps
DevSecOps is short for development, security, operations, which is a methodology
that focuses on integrating security during each stage of the Software Develop-
ment Life Cycle. Prior to DevSecOps, security was added in the latter stages of the
development life cycle. When security is integrated at all stages, it becomes a shared
responsibility for developers, operations, and IT security. Ultimately, the goal is to
deliver more secure code faster.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 751
vulnerability that DAST may identify is SQL injection. Again, the goal is to identify
security vulnerabilities that may be related to application configuration or authenti-
cation protocols.
DAST can occur when the application is in production, but more commonly this
security testing takes place during the quality assurance phase of development.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
752 CISSP Cert Guide
■ V-shaped Model
■ Prototype Model
■ Modified Prototype Model
■ Incremental Model
■ Spiral Model
■ Agile Model
■ Continuous Integration and Continuous Delivery (CI/CD)
■ Rapid Application Development (RAD) Model
■ Joint Analysis Development (JAD) Model
■ Cleanroom Model
■ Structured Programming Development Model
■ Exploratory Model
■ Computer-Aided Software Engineering (CASE) Model
■ Component-Based Development Model
■ CMMI
■ ISO 9001:2015/90003:2014
■ IDEAL Model
helps to identify and eliminate as many bugs as possible without using the customer
as “quality control.”
In this simplistic model of the software development process, certain unrealistic
assumptions are made, including
■ Each step of development can be completed and finalized without affecting
later stages that might require rework.
■ Iteration (reworking and repeating) among the steps in the process that is typi-
cally called for in other models is not stressed in this model.
■ Phases are not seen as individual milestones as in some other models discussed
here.
Waterfall Model
The original Waterfall model breaks the development process into distinct phases.
Although this model uses somewhat of a rigid approach, the basic process is as a
sequential series of steps that are followed without going back to earlier steps. This
approach is called incremental development. Figure 8-1 is a representation of the
Waterfall process.
Idea
Analysis
Design
Development
Test
Final
Product
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
754 CISSP Cert Guide
V-Shaped Model
The V-shaped model is also somewhat rigid but differs primarily from the Waterfall
method in that verification and validation are performed at each step. Although this
model can work when all requirements are well understood up front (frequently
not the case) and potential scope changes are small, it does not provide for handling
events concurrently because it is also a sequential process like the Waterfall. It does
build in a higher likelihood of success because it performs testing at every stage.
Figure 8-2 is a representation of this process.
Prototyping
Although it’s not a formal model unto itself, prototyping is the use of a sample of
code to explore a specific approach to solving a problem before extensive time
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 755
and cost have been invested in the approach. This technique allows the team to
both identify the utility of the sample code and identify design problems with the
approach. Prototype systems can provide significant time and cost savings because
the whole final product does not have to be made to begin testing it.
Incremental Model
The Incremental model is a refinement to the basic Waterfall model, which states
that software should be developed in increments of functional capability. In this
model, a working version or iteration of the solution is produced, tested, and redone
until the final product is completed. You could think of it as a series of waterfalls.
After each iteration or version of the software is completed, testing occurs to iden-
tify gaps in functionality and security from the original design. Then the gaps are
addressed by proceeding through the same analysis, design, code, and test stages
again. When the product is deemed to be acceptable with respect to the original
design, it is released. Figure 8-3 is a representation of this process.
Requirement
Design Requirement
Design
Implementation
Implementation
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
756 CISSP Cert Guide
Spiral Model
The Spiral model is actually a meta-model that incorporates a number of the soft-
ware development models. It is also an iterative approach but places more emphasis
on risk analysis at each stage. Prototypes are produced at each stage, and the process
can be seen as a loop that keeps circling back to take a critical look at risks that have
been addressed while still allowing visibility into new risks that might have been
created in the last iteration.
This model assumes that knowledge will be gained at each iteration and should be
incorporated into the design as it evolves. Some cases even involve the customer
making comments and observations at each iteration. Figure 8-4 is a representation
of this process. The radial dimension of the diagram represents cumulative cost, and
the angular dimension represents progress made in completing each cycle.
Cumulative Cost
Requirements Operational
Review Plan Prototype 1 Prototype 2 Prototype
Concept of Concept of
Operation Requirements Requirements Detailed
Draft
Design
Agile Model
Many of the processes or models discussed thus far rely on rigid adherence to
process-oriented models. In many cases, the focus is more on following procedural
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 757
steps than on reacting to changes quickly and increasing efficiency. The Agile model
puts more emphasis on continuous feedback and cross-functional teamwork.
This model attempts to be nimble enough to react to situations that arise during
development. Less time is spent on the upfront analysis and more emphasis is placed
on learning from the process and incorporating lessons learned in real time. There is
also regular and active interaction with the customer throughout the process.
Figure 8-5 compares the Agile model with the Waterfall model.
Agile
Conception Conception
Initiation Initiation
Analysis Analysis
Design
VS Design
Construction Construction
Testing Testing
Deployment Deployment
Waterfall
Model
Figure 8-5 Agile and Waterfall Model Comparison
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
758 CISSP Cert Guide
TRADITIONAL
RAD
onstrate
Dem
Refin
Buil
Cleanroom Model
In contrast to the JAD model, the Cleanroom model strictly adheres to formal steps
and a more structured method. It attempts to prevent errors and mistakes through
extensive testing. This method works well in situations where high quality is a must,
the application is mission critical, or the solution must undergo a strict certification
process.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 759
Exploratory Model
In the Exploratory model, requirements are based on what is currently available.
Assumptions are documented about how the system might work. To create a usable
system, other insights and suggestions are incorporated as they are discovered. In
this model, security will probably not have priority over enhancements. As a result,
security controls are often added on an ad hoc basis.
Component-Based Development
The Component-Based Development method uses building blocks to assemble an
application rather than building the application itself from scratch. The advantage
of this method in regards to security is that the components are tested for security
prior to being used in the application.
CMMI
The Capability Maturity Model Integration (CMMI) is a comprehensive set
of guidelines that addresses all phases of the Software Development Life Cycle.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
760 CISSP Cert Guide
Level 4
Processes measured
Quantitatively and controlled.
Managed
ISO 9001:2015/90003:2014
ISO 9001:2015 is a quality management systems standard. It specifies requirements
for a quality management system when an organization (1) needs to demonstrate
its ability to consistently provide products and services that meet customer and
applicable statutory and regulatory requirements, and (2) aims to enhance customer
satisfaction through the effective application of the system, including processes for
improvement of the system and the assurance of conformity to customer and appli-
cable statutory and regulatory requirements.
All the requirements of ISO 9001:2015 are generic and are intended to be applicable
to any organization, regardless of its type or size and regardless of what products
and services it provides.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 761
IDEAL Model
The IDEAL model was developed by the Software Engineering Institute to provide
guidance on software development. Its name is an acronym that stands for the five
phases:
1. Initiate: Outline the business reasons behind the change, build support for the
initiative, and implement the infrastructure needed.
2. Diagnose: Analyze the current organizational state and make change
recommendations.
3. Establish: Take the recommendations from the previous phase and use them
to develop an action plan.
4. Act: Develop, test, refine, and implement the solutions according to the action
plan from the previous phase.
5. Learn: Use the quality improvement process to determine whether goals have
been met and develop new actions based on the analysis.
Figure 8-8 shows the steps involved in each of the phases of the IDEAL model.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
762 CISSP Cert Guide
Learning
Analyze
Propose and
Future Validate Implement
Actions Acting
Solution
Refine
Solution
Stimulus Set Build Charter
for Change Context Sponsorship Infrastructure
Pilot/Test
Characterize Solution
Initiating Current and
Desired
States Create
Develop Solution
Diagnosing Recommen-
dations Plan
Set Actions
Priorities Develop
Approach
Establishing
Figure 8-8 Phases and Steps of the IDEAL Model
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 763
The DoD handbook says the IPT should function efficiently and effectively. The
important point to remember is that each IPT in IPPD has a mission to develop and
deliver a product and its associated processes. At the program level, IPT characteris-
tics include
■ Responsibility for a defined product or process
■ Authority over the resources and personnel
■ An agreed schedule for delivery of the defined product
■ An agreed level of risk to deliver the defined product
■ An agreed-upon set of measurable metrics
IPTs are an integral part of the acquisition oversight and review process. There are
generally two levels of IPTs: the working-level integrated product team (WIPT)
and the overarching integrated product team (OIPT). Each program should have
one OIPT and at least one WIPT. A WIPT should focus on a particular topic, such
as cost/performance, program baseline, acquisition strategy, test and evaluation (or
contracting). An integrating integrated product team (IIPT), which is a type of a
WIPT, should coordinate WIPT efforts and cover all program topics, including
those not otherwise assigned to another IPT. IPT participation is the primary way
for any organization to be part of the acquisition program. IIPTs are essential in that
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
764 CISSP Cert Guide
they facilitate staff-level program insight into programs at the program level and
provide the requisite input to the OIPT.
DevOps (development operations) emphasizes the collaboration and communication
of both software developers and other IT professionals while automating the process
of software delivery and infrastructure changes. It aims to ensure that building, test-
ing, and releasing software can happen more quickly, more often, and more reliably.
WASC
The Web Application Security Consortium (WASC) is an organization that provides
best practices for web-based applications along with a variety of resources, tools, and
information that organizations can make use of in developing web applications.
One of the functions undertaken by WASC is continual monitoring of attacks lead-
ing to the development and maintenance of an up-to-date list of top attack methods
that are currently known. This list can aid in ensuring that organizations not only
are aware of the latest attack methods and how widespread these attacks are but also
can make the proper precautions and care to their web applications to mitigate these
attack types.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 765
OWASP
The Open Web Application Security Project (OWASP) is another group that moni-
tors attacks, specifically web attacks. OWASP maintains a list of top 10 attacks on an
ongoing basis. This group also holds regular meetings at chapters throughout the
world, providing resources and tools including testing procedures, code review steps,
and development guidelines.
BSI
The Department of Homeland Security (DHS) also has become involved in
promoting software security best practices. The Build Security In (BSI) initiative
promotes a process-agnostic approach that makes security recommendations with
regard to architectures, testing methods, code reviews, and management processes.
The DHS Software Assurance program addresses ways to reduce vulnerabilities,
mitigate exploitations, and improve the routine development and delivery of
software solutions. Although the BSI initiative is considered defunct, security
professionals should still be aware of its existence.
ISO/IEC 27000
The International Organization for Standardization (ISO) and the International
Electrotechnical Commission (IEC) created the 27034 standard, which is part of a
larger body of standards called the ISO/IEC 27000 series. These standards provide
guidance to organizations in integrating security into the development and mainte-
nance of software applications. These suggestions are relevant not only to the devel-
opment of in-house applications but also to the safe deployment, distribution, and
management of third-party solutions in an enterprise.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
766 CISSP Cert Guide
Software Threats
Software threats, or malicious software, can also be created in the way software is
coded or developed. Following development best practices can help prevent this
inadvertent creation of security issues when creating software. Software threats also
can be introduced through malware. In the following sections, we discuss malware
and software coding issues as well as options to mitigate the threat. Some of these
topics are discussed in Chapter 5, “Identity and Access Management (IAM),” and
they are covered more extensively in this chapter.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 767
Malware
Malicious software (or malware) is any software that intends to harm a computer,
modifies/corrupts/deletes data, or takes actions the user did not authorize. It
includes a wide array of malware types, including ones you have probably heard of,
such as viruses, and many you might not have heard of but of which you should be
aware.
Some of the malware that security professionals need to understand includes the
following:
■ Virus
■ Boot sector virus
■ Parasitic virus
■ Stealth virus
■ Polymorphic virus
■ Macro virus
■ Multipartite virus
■ Worm
■ Trojan horse
■ Logic bomb
■ Spyware/adware
■ Botnet
■ Rootkit
■ Ransomware
■ Keylogger
■ Mobile Malware
Virus
A virus is a software program that infects and causes the other genuine software to
malfunction. It uses a host application to reproduce and deliver its payload and typi-
cally attaches itself to a file. It differs from a worm in that it usually requires some
action on the part of the user to help it spread to other computers.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
768 CISSP Cert Guide
Following are the virus types along with a brief description of each:
■ Boot sector virus: This type of malware infects the boot sector of a
computer and either overwrites files or installs code into the sector so the virus
initiates at startup.
■ Parasitic virus: This type of virus attaches itself to a file, usually an executable
file, and then delivers the payload when the program is used.
■ Stealth virus: This type of virus is difficult for a system to detect.
■ Polymorphic virus: This type of virus makes copies of itself, and then makes
changes to those copies. It does so in hopes of avoiding detection from
antivirus software.
■ Macro virus: This type of virus infects programs written in Word, Basic, Visual
Basic, or VBScript that are used to automate functions. These viruses infect
Microsoft Office files and are easy to create because the underlying language is
simple and intuitive to apply. They are especially dangerous in that they infect
the operating system itself. They also can be transported between different
operating systems because the languages are platform independent.
■ Multipartite virus: Originally, this type of virus could infect both program
files and boot sectors. This term now means that the virus can infect more
than one type of object or can infect in more than one way.
■ File or system infector: File infectors program files, and system infectors
infect system program files.
■ Companion virus: This type of virus does not physically touch the target file.
It is also referred to as a spawn virus.
■ Email malware: This type of malware specifically uses an email system to
spread itself because it is aware of the email system functions. Knowledge of
such email system functions allows this virus to take advantage of all email
system capabilities.
■ Script malware: This type of malware is a stand-alone file that can be exe-
cuted by an interpreter.
Worm
A worm is a type of malware that can spread without the assistance of the user. It
is a small program that, like a virus, is used to deliver a payload. One way to help
mitigate the effects of worms is to place limits on sharing, writing, and executing
programs.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 769
Trojan Horse
A Trojan horse is a program or rogue application that appears to, or is purported to
do, one thing but actually does another when executed. For example, what appears
to be a screensaver program might really be a Trojan horse. When the user unwit-
tingly uses the program, it executes its payload, which in turn could delete files or
create backdoors. Backdoors are alternative ways to access the computer undetected
in the future.
One type of Trojan targets and attempts to access and make use of smart cards. A
countermeasure to prevent this attack is to use “single-access device driver” architec-
ture. Using this approach, the operating system allows only one application to have
access to the serial device (and thus the smart card) at any given time. Another way
to prevent the attack is by using a smart card that enforces a “one private key usage
per PIN entry” policy model. In this model, the user must enter a PIN every single
time the private key is used, and therefore, the Trojan horse would not have access
to the key.
Logic Bomb
A logic bomb is a type of malware that executes when a particular event takes place.
For example, that event could be a time of day or a specific date, or it could be the
first time you open notepad.exe. Some logic bombs execute when digital forensics is
being conducted, and in that case the bomb might delete all digital evidence.
Spyware/Adware
Adware doesn’t actually steal anything, but it tracks Internet usage in an attempt
to tailor ads and junk email to a user’s interests. Spyware also tracks activities and
can also gather personal information that could lead to identity theft. In some cases,
spyware can even direct the computer to install software and change settings.
Botnet
A bot is a type of malware that installs itself on large numbers of computers through
infected emails, downloads from websites, Trojan horses, and shared media. After
it’s installed, the bot can connect back to the hacker’s computer. After a connection
is successfully established, the hacker’s server controls all the bots located on these
machines. At a set time, the hacker might direct the bots to take some action, such
as direct all the machines to send out spam messages, initiate a distributed denial-
of-service (DDoS) attack, send phishing emails, or do any number of malicious acts.
The collection of computers that act together is called a botnet, and the individual
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
770 CISSP Cert Guide
computers are called zombies. The attacker’s computer that manages the botnet is
often referred to as the bot herder or bot master. Figure 8-9 shows this relationship.
Typical Botnet
Rootkit
A rootkit is a set of tools that a hacker can use on a computer after managing to
gain access and elevating privileges to administrator. It gets its name from the root
account, the most powerful account in UNIX-based operating systems. The rootkit
tools might include a backdoor for the hacker to access. This is one of the hardest
types of malware to remove, and in many cases only a reformat of the hard drive will
completely remove it.
The following are some of the actions a rootkit can take:
■ Install a backdoor.
■ Remove all entries from the security log (log scrubbing).
■ Replace default tools with compromised versions (Trojaned programs).
■ Make malicious kernel changes.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 771
Ransomware
Ransomware is malware that prevents or limits users from accessing their systems.
It is called ransomware because it forces its victims to pay a ransom through certain
online payment methods to be given access to their systems again or to get their
data back. Generally, the hacker will demand a ransom (or payment) in cryptocur-
rency within a short space of time; after the deadline, the ransom goes up, thereby
forcing an organization to make a quick decision. An organization should view the
resources available at nomoreransom.org first in case an existing solution is available
to remove the ransomware. The organization should also consider cyber insurance
to prepare for a potential ransomware or other major cyberattack.
Keylogger
A keylogger is malware that records a user’s keystrokes. After these keystrokes are
sent back to the hacker, the hacker can in turn use those recorded keystrokes to the
user’s credentials into a website.
Mobile Malware
The huge growth in mobile devices, such as smartphones, has meant that there has
been tremendous growth in mobile malware. Mobile malware can include mobile
banking Trojans—that is, a link to a mobile application installation, which is mali-
cious. The majority of mobile malware is found on Android devices.
Malware Protection
Organizations and individuals are not totally helpless in the fight against malware.
Programs and practices can help to mitigate the damage malware can cause. Here,
we discuss some of the ways to protect a network from malware.
Antivirus Software
The first line of defense is antivirus software. This software is designed to identify
viruses, Trojans, and worms and delete them, or at least quarantine them until they
can be removed. This identification process requires that the software’s definition
files, the files that make it possible for the software to identify the latest viruses, are
updated frequently. If a new virus is created that has not yet been identified in the
list, the computer will not be protected until the virus definition is added and the
new definition file is downloaded.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
772 CISSP Cert Guide
Anti-malware Software
Closely related to antivirus software and in some cases part of the same software
package, anti-malware software focuses on other types of malware, such as adware
and spyware. An important way to help prevent malware infection is to train users
on appropriate behavior when using the Internet. For that reason, user education in
safe practices is a necessary part of preventing malware. This practice should be a
part of security policies.
Scanning Types
Three major types of scanning for malware or viruses occur: known signature
scanning, activity monitoring, and change detection. With known signature scan-
ning, a database of malware signatures is maintained. When scans occur, they are
looking for matches to a signature in the database. With activity monitoring, the
monitor watches for suspicious activity. With change detection, the detector exam-
ines files and configuration, stores the information, and compares the stored infor-
mation against the configuration at a later date. It usually involves checksum values.
Security Policies
Security policies are covered in detail in Chapter 1, “Security and Risk Management,”
but it is important to mention here that encouraging or requiring safe browsing and
data handling practices should be formalized into the security policy of the organiza-
tion. Some of the items to stress in this policy and perhaps include in training for
users are the importance of the following:
■ Antivirus and anti-malware updates
■ Reporting any error message concerning an update failure on the user
machine
■ Reporting any strange computer behavior that might indicate a virus infection
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 773
■ Trusted computer base (TCB): The TCB comprises the components (hard-
ware, firmware, and/or software) that are trusted to enforce the security policy
of the system and that, if compromised, jeopardize the security properties of
the entire system. The reference monitor is a primary component of the TCB.
This term is derived from the Orange Book. All changes to the TCB should
be audited and controlled, which is an example of a configuration management
control.
■ Security perimeter: This is the dividing line between the trusted parts of
the system and the parts that are untrusted. According to security design best
practices, components that lie within this boundary (which means they lie
within the TCB) should never permit untrusted components to access critical
resources in an insecure manner.
■ Reference monitor: A reference monitor is a system component that enforces
access controls on an object. It is an access control concept that refers to an
abstract machine that mediates all accesses to objects by subjects. It was intro-
duced for circumventing difficulties in classic approaches to computer security
by limiting damages produced by malicious programs. The security risk cre-
ated by a covert channel is that it bypasses the reference monitor functions. The
reference monitor should exhibit isolation, completeness, and verifiability. Iso-
lation is required because of the following:
■ The reference monitor can’t be available for public access. The less
access, the better.
■ The reference monitor must have a sense of completeness to provide the
whole information and process cycles.
■ The reference monitor must be verifiable, to provide security, audit, and
accounting functions.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
774 CISSP Cert Guide
Because software often contains vulnerabilities that are not discovered until the
software is operational, security professionals should ensure that a patch management
process is documented and implemented when necessary to provide risk mitigation.
This task includes using a change control process, testing any newly released patches,
keeping a working backup, scheduling production downtime to apply the new patches,
and establishing a back-out plan. Prior to deploying any patches, security professionals
should notify helpdesk personnel and key user groups. When patches are deployed,
the least critical computers and devices should receive the patch first, moving up
through the hierarchy until the most critical computers and devices are patched.
When mitigations (patches) are deployed, the mitigations must be tested and veri-
fied, usually as part of quality assurance and testing. Any risk mitigation that has
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 775
been completed must be verified by an independent party that is not the developer
or system owner. Developers should be encouraged to use code signing to ensure
code integrity, to determine who developed code, and to determine the code’s pur-
pose. Code-signing certificates are digital certificates which ensure that code has
not been changed. By signing code, organizations can determine whether the code
has been modified by an entity other than the signer. Code signing primarily covers
running code, not stored code. While code signing verifies code integrity, it cannot
guarantee freedom from security vulnerabilities or that an app will not load unsafe
or unaltered code during execution.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
776 CISSP Cert Guide
Buffer Overflow
As discussed in Chapter 5, a buffer is an area of memory where commands and data
are placed until they can be processed by the CPU. A buffer overflow occurs when
too much data is accepted as input to a specific process. Hackers can take advantage
of this phenomenon by submitting too much data, which can cause an error or, in
some cases, execute commands on the machine if the hackers can locate an area
where commands can be executed. Not all attacks are designed to execute
commands. Some just lock up the computer and are used as DoS attacks.
A packet containing a long string of no-operation instructions (NOPs) followed by a
command is usually indicative of a type of buffer overflow attack called an NOP slide.
The purpose is to get the CPU to locate where a command can be executed. The fol-
lowing is an example of a packet as seen from a sniffer, showing a long string of 90s in
the middle of the packet that pads the packet and causes it to overrun the buffer:
TCP Connection Request
---- 14/03/2018 15:40:57.910
68.144.193.124 : 4560 TCP Connected ID = 1
---- 14/03/2018 15:40:57.910
Status Code: 0 OK
68.144.193.124 : 4560 TCP Data In Length 697 bytes
MD5 = 19323C2EA6F5FCEE2382690100455C17
---- 14/03/2018 15:40:57.920
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 777
0000 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 ................
0010 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 ................
0020 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 ................
0030 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 ................
0040 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 ................
0050 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 ................
0060 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 ................
0070 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 ................
0080 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 ................
0090 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 ................
00A0 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 ................
00B0 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 ................
00C0 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 ................
00D0 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 ................
00E0 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 ................
00F0 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 ................
0100 90 90 90 90 90 90 90 90 90 90 90 90 4D 3F E3 77 ............M?.w
0110 90 90 90 90 FF 63 64 90 90 90 90 90 90 90 90 90 .....cd.........
0120 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 ................
0130 90 90 90 90 90 90 90 90 EB 10 5A 4A 33 C9 66 B9 ..........ZJ3.f.
0140 66 01 80 34 0A 99 E2 FA EB 05 E8 EB FF FF FF 70 f..4...........p
0150 99 98 99 99 C3 21 95 69 64 E6 12 99 12 E9 85 34 .....!.id......4
0160 12 D9 91 12 41 12 EA A5 9A 6A 12 EF E1 9A 6A 12 ....A....j....j.
0170 E7 B9 9A 62 12 D7 8D AA 74 CF CE C8 12 A6 9A 62 ...b....t......b
0180 12 6B F3 97 C0 6A 3F ED 91 C0 C6 1A 5E 9D DC 7B .k...j?.....^..{
0190 70 C0 C6 C7 12 54 12 DF BD 9A 5A 48 78 9A 58 AA p....T....ZHx.X.
01A0 50 FF 12 91 12 DF 85 9A 5A 58 78 9B 9A 58 12 99 P.......ZXx..X..
01B0 9A 5A 12 63 12 6E 1A 5F 97 12 49 F3 9A C0 71 E5 .Z.c.n._..I...q.
01C0 99 99 99 1A 5F 94 CB CF 66 CE 65 C3 12 41 F3 9D ...._...f.e..A..
01D0 C0 71 F0 99 99 99 C9 C9 C9 C9 F3 98 F3 9B 66 CE .q............f.
01E0 69 12 41 5E 9E 9B 99 9E 24 AA 59 10 DE 9D F3 89 i.A^....$.Y.....
01F0 CE CA 66 CE 6D F3 98 CA 66 CE 61 C9 C9 CA 66 CE ..f.m...f.a...f.
0200 65 1A 75 DD 12 6D AA 42 F3 89 C0 10 85 17 7B 62 e.u..m.B......{b
0210 10 DF A1 10 DF A5 10 DF D9 5E DF B5 98 98 99 99 .........^......
0220 14 DE 89 C9 CF CA CA CA F3 98 CA CA 5E DE A5 FA ............^...
0230 F4 FD 99 14 DE A5 C9 CA 66 CE 7D C9 66 CE 71 AA ........f.}.f.q.
0240 59 35 1C 59 EC 60 C8 CB CF CA 66 4B C3 C0 32 7B Y5.Y.`....fK..2{
0250 77 AA 59 5A 71 62 67 66 66 DE FC ED C9 EB F6 FA w.YZqbgff.......
0260 D8 FD FD EB FC EA EA 99 DA EB FC F8 ED FC C9 EB ................
0270 F6 FA FC EA EA D8 99 DC E1 F0 ED C9 EB F6 FA FC ................
0280 EA EA 99 D5 F6 F8 FD D5 F0 FB EB F8 EB E0 D8 99 ................
0290 EE EA AB C6 AA AB 99 CE CA D8 CA F6 FA F2 FC ED ................
02A0 D8 99 FB F0 F7 FD 99 F5 F0 EA ED FC F7 99 F8 FA ................
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
778 CISSP Cert Guide
In many cases, the key to preventing buffer overflow attacks is input validation.
This method requires that any input be checked for format and length before it is
used. Buffer overflows and boundary errors (when input exceeds the boundaries
allotted for the input) are considered to be a family of error conditions called input
validation errors.
Malformed input is the category in which all buffer overflow attacks fit. Malformed
input is any attack in which the input is configured in an unusual way.
Escalation of Privileges
Privilege escalation is the process of exploiting a bug or weakness in an operating
system to allow users to receive privileges to which they are not entitled. These
privileges can be used to delete files, view private information, or install unwanted
programs such as viruses.
Backdoor
Backdoors and trapdoors have been mentioned in passing several times in this book
(for example, Chapter 5). A backdoor is a piece of software installed by hackers, using
one of the delivery mechanisms previously discussed, that allows them to return
later and connect to the computer without going through the normal authentication
process. A backdoor normally bypasses access control measures. Some commercial
applications inadvertently include backdoors because programmers forget to remove
them before release to market. In many cases, the backdoor program is listening
on a specific port number, and when attackers attempt to connect to that port, they
are allowed to connect without authentication. An example is Back Orifice 2000
(BO2K), an application-level Trojan horse used to give an attacker backdoor net-
work access.
Rogue Programmers
It is becoming commonplace for regular computer users to create utilities and
scripts for performing their day-to-day duties. Unfortunately, these rogue program-
mers do not fully understand the security issues that can arise with the use of such
tools. If possible, an organization should forbid the usage of any utilities or scripts
that are not created by trained programmers. However, if an organization allows
casual programming, security professionals should ensure that the people who are
writing utilities and scripts receive the appropriate training in system development
practices.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 779
Covert Channel
A covert channel occurs when two processes transfer information in a manner that
violates a system’s security policy. Two types of covert channels can occur:
■ Storage: Involves direct or indirect storage location reading by multiple
processes. It usually occurs at a memory location or disk sector shared by two
subjects at different security levels.
■ Timing: Involves one process being able to influence the rate at which
another process can acquire CPU, memory, or I/O resources.
Object Reuse
Memory is allocated to a process, de-allocated to a process, and then allocated to
another process. Sometimes data from an old process remains behind, and this old
data causes a security violation. If the memory is not zeroed out or overwritten by
the operating system, this remaining data is carried over into a new process and may
be reused. Object reuse can also occur on a hard drive or a paging or swap file.
Mobile Code
As previously mentioned, mobile code is executable content that transmits across
a network from a remote source to a local host and is executed on the local host.
Mobile code can come from a variety of sources, including web pages and email
messages.
Local execution of remotely sourced code is a security concern for every organiza-
tion today. Mobile code presents a unique security issue because often one subject
is acting on behalf of another or itself. Security controls must be implemented to
define which of these requests will be allowed or denied.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
780 CISSP Cert Guide
Validate Input
Developers should be sure to validate any input into an application from all
untrusted data sources. Proper input validation can eliminate the vast majority of
software vulnerabilities. Most external data sources, including command-line argu-
ments, network interfaces, environmental variables, and user-controlled files, should
be considered untrusted.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 781
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
782 CISSP Cert Guide
acceptance testing; accreditation; ActiveX; adware; Agile; app vetting; app test-
ing; app approval/rejection; assembly languages; backdoor; boot sector malware;
botnet; buffer overflow; Build and Fix; Build Security In (BSI); Capability Matu-
rity Model Integration (CMMI); certification; change management process;
Cleanroom model; code repository; cohesion; Common Object Request Broker
Architecture (CORBA); Component Object Model (COM); Continuous Integra-
tion and Continuous Delivery (CI/CD); coupling; data structure; DevSecOps;
Distributed Component Object Model (DCOM); distributed object-oriented
systems; Dynamic Application Security Testing (DAST); high-level languages;
IDEAL model; Incremental model; input validation; ISO/IEC 27000; Java
applet; Java Platform, Enterprise Edition (Java EE); Joint Analysis Development
(JAD) model; keylogger; logic bomb; machine languages; macro virus; malware;
mobile code; mobile malware; multipartite virus; natural languages; Object
Linking and Embedding (OLE); object-oriented programming (OOP); Open
Web Application Security Project (OWASP); parasitic virus; polyinstantiation;
polymorphic virus; polymorphism; privilege escalation; prototyping; Rapid
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 783
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
784 CISSP Cert Guide
6. Which term describes the degree to which elements in a module are related to
one another?
a. Polymorphism
b. Cohesion
c. Coupling
d. Data structures
9. Which of the following is the dividing line between the trusted parts of the
system and those that are untrusted?
a. Security perimeter
b. Reference monitor
c. Trusted computer base (TCB)
d. Security kernel
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 785
10. Which of the following is a system component that enforces access controls on
an object?
a. Security perimeter
b. Reference monitor
c. Trusted computer base (TCB)
d. Security kernel
11. Which of the following tests ensures that the customer (either internal or
external) is satisfied with the functionality of the software?
a. Integration testing
b. Acceptance testing
c. Regression testing
d. Accreditation
12. In which of the following software development models is less time spent on
the upfront analysis and more emphasis placed on learning from the process
feedback and incorporating lessons learned in real time?
a. Agile Development
b. Rapid Application Development
c. Cleanroom Model
d. Modified Waterfall
13. Which of the following software development risk analysis and mitigation
strategy guidelines should security professionals follow? (Choose all that
apply.)
a. Integrate risk analysis and mitigation in the Software Development Life
Cycle.
b. Use qualitative, quantitative, and hybrid risk analysis approaches based
on standardized risk analysis methods.
c. Track and manage weaknesses that are discovered throughout risk
assessment, change management, and continuous monitoring.
d. Encapsulate data to make it easier to apply the appropriate policies to
objects.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
786 CISSP Cert Guide
14. Which of the following are valid guidelines for providing application
programming interface (API) security? (Choose all that apply.)
a. Use the same security controls for APIs as for any web application in the
enterprise.
b. Use Hash-based Message Authentication Code (HMAC).
c. Use encryption when passing static keys.
d. Implement password encryption instead of single key-based
authentication.
15. Which of the following is not one of the four phases of acquiring software?
a. Planning
b. Contracting
c. Development
d. Monitoring and accepting
16. Which of the following are considered secure coding best practices that devel-
opers and security professionals should adhere to? (Choose all that apply.)
a. Sanitize all data passed to other systems.
b. Implement default deny.
c. Validate input.
d. Heed compiler warnings.
2. c. The Develop stage involves writing the code or instructions that make the
software work. The emphasis of this phase is strict adherence to secure coding
practices.
3. b. The Department of Homeland Security (DHS) is involved in promoting
software security best practices. The Build Security In (BSI) initiative
promotes a process-agnostic approach that makes security recommendations
with regard to architectures, testing methods, code reviews, and management
processes.
4. c. Though it’s not a formal model, the Build and Fix approach describes a
method that has been largely discredited and is now used as a template for how
not to manage a development project. Simply put, in this method, the software
is developed as quickly as possible and released.
5. c. Machine languages deliver instructions directly to the processor. This was
the only type of programming done in the 1950s and uses basic binary instruc-
tions, compiler or interpreter. (These programs convert higher language types
to a form that can be executed by the processor.)
6. b. Cohesion describes how many different tasks a module can carry out. If a
module is limited to a small number or a single function, it is said to have high
cohesion. Coupling describes how much interaction one module requires from
another module to do its job. Low or loose coupling indicates that a module
does not need much help from other modules, whereas high coupling indicates
the opposite.
7. c. Component Object Model (COM) is a model for communication between
processes on the same computer, while, as the name implies, the Distributed
Component Object Model (DCOM) is a model for communication between
processes in different parts of the network.
8. a. ActiveX is a Microsoft technology that uses object-oriented programming
(OOP) and is based on the COM and DCOM.
9. a. The security perimeter is the dividing line between the trusted parts of
the system and those that are untrusted. According to security design best
practices, components that lie within this boundary (which means they lie
within the TCB) should never permit untrusted components to access critical
resources in an insecure manner.
10. b. A reference monitor is a system component that enforces access controls on
an object. It is an access control concept that refers to an abstract machine that
mediates all accesses to objects by subjects.
11. b. Acceptance testing ensures that the customer (either internal or external) is
satisfied with the functionality of the software. Integration testing assesses how
the modules work together and determines whether functional and security
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
788 CISSP Cert Guide
specifications have been met. Regression testing takes place after changes are
made to the code to ensure that the changes have reduced neither functional-
ity nor security. Accreditation is the formal acceptance of the adequacy of a
system’s overall security by management.
12. a. With the Agile model, less time is spent on upfront analysis, and more empha-
sis is placed on learning from the process and incorporating lessons learned
in real time. There is also more interaction with the customer throughout the
process. In the Rapid Application Development (RAD) model, less time is spent
up front on design, while emphasis is placed on rapidly producing prototypes
with the assumption that crucial knowledge can only be gained through trial
and error. In contrast to the JAD model, the Cleanroom model strictly adheres
to formal steps and a more structured method. It attempts to prevent errors and
mistakes through extensive testing. In the modified Waterfall model, each phase
in the development process is considered its own milestone in the project man-
agement process. Unlimited backward iteration (returning to earlier stages to
address problems) is not allowed in this model.
13. a, b, c. Security professionals should ensure that the software development risk
analysis and mitigation strategy follows these guidelines:
■ Integrate risk analysis and mitigation in the Software Development Life
Cycle.
■ Use qualitative, quantitative, and hybrid risk analysis approaches based on
standardized risk analysis methods.
■ Track and manage weaknesses that are discovered throughout risk assess-
ment, change management, and continuous monitoring.
14. a, b, c, d. Comprehensive security must protect the entire spectrum of devices
in the digital workplace, including apps and APIs. API security is critical for an
organization that is exposing digital assets. Guidelines for providing API
security include
■ Use the same security controls for APIs as for any web application in the
enterprise.
■ Use Hash-based Message Authentication Code (HMAC).
■ Use encryption when passing static keys.
■ Use a framework or an existing library to implement security solutions
for APIs.
■ Implement password encryption instead of single key-based
authentication.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 8: Software Development Security 789
15. c. In the Software Development Life Cycle, the code or instructions that make
the software work are written in the Develop phase. The process of acquiring
software has the following four phases:
1. Planning: During this phase, the organization performs a needs assess-
ment, develops the software requirements, creates the acquisition strategy,
and develops evaluation criteria and a plan.
2. Contracting: When planning is complete, the organization creates a request
for proposal (RFP) or other supplier solicitation forms, evaluates the sup-
plier proposals, and negotiates the final contract with the selected seller.
3. Monitoring and accepting: When a contract is in place, the organiza-
tion establishes the contract work schedule, implements change control
procedures, and reviews and accepts the software deliverables.
4. Follow-up: When the software is in place, the organization must sustain
the software, including managing risks and changes. At some point, the
organization may need to decommission the software.
16. a, b, c, d. Developers and security professionals should adhere to the following
secure coding best practices:
■ Sanitize all data passed to other systems, including command shells,
processes, relational databases, and application components.
■ Security professionals should ensure that, by default, access is denied
and the protection scheme identifies conditions under which access is
permitted.
■ Developers should validate any input into an application from all
untrusted data sources.
■ When developers use a compiler, they should compile the code using the
highest warning level available in the compiler.
■ Design software to implement and enforce security policies.
■ Adhere to the principle of least privilege, and practice defense in depth.
17. d. An app vetting process is a sequence of activities that aims to determine
whether an app conforms to the organization’s security requirements. An app
vetting process comprises a sequence of two main activities: app testing and app
approval/rejection. The Component-Based Development method uses build-
ing blocks to assemble an application instead of build it. The advantage of this
method in regard to security is that the components are tested for security
prior to being used in the application. The purpose of the change management
process is to ensure that all changes to the configuration of the source code
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
790 CISSP Cert Guide
and to the source code itself are approved by the proper personnel and are
implemented in a safe and logical manner. The IDEAL model was developed
by the Software Engineering Institute to provide guidance on software devel-
opment. Its name is an acronym that stands for the five phases:
1. Initiate: Outline the business reasons behind the change, build support for
the initiative, and implement the infrastructure needed.
2. Diagnose: Analyze the current organizational state and make change
recommendations.
3. Establish: Take the recommendations from the previous phase and use
them to develop an action plan.
4. Act: Develop, test, refine, and implement the solutions according to the
action plan from the previous phase.
5. Learn: Use the quality improvement process to determine whether goals
have been met and develop new actions based on the analysis.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
CHAPTER 9
Final Preparation
The first eight chapters of this book cover the technologies, protocols, design
concepts, and considerations required to be prepared to pass the ISC2 Certified
Information Systems Security Professional (CISSP) exam. While these chapters
supply the detailed information, most people need more preparation than just
reading the first eight chapters of this book. This chapter details a set of tools
and a study plan to help you complete your preparation for the exams.
This short chapter has two main sections. The first section lists the exam
preparation tools useful at this point in the study process. The second section
lists a suggested study plan now that you have completed all the earlier chapters
in this book.
Pearson Test Prep Practice Test Engine and Questions on the Website
Register this book to get access to the Pearson Test Prep practice test engine
(software that displays and grades a set of exam-realistic, multiple-choice ques-
tions). Using the Pearson Test Prep practice test engine, you can either study by
going through the questions in Study mode or take a simulated (timed) CISSP
exam.
The Pearson Test Prep practice test software comes with two full practice
exams. These practice tests are available to you either online or as an offline
Windows application. To access the practice exams that were developed with
this book, please see the instructions in the card inserted in the sleeve in the
back of the book. This card includes a unique access code that enables you to
activate your exams in the Pearson Test Prep software.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
792 CISSP Cert Guide
http://www.pearsonitcertification.com/content/downloads/pcpt/engine.zip
To access the book’s companion website and the software, simply follow these steps:
Step 1. Register your book by going to PearsonITCertification.com/register and
entering the ISBN: 9780137507474.
Step 2. Answer the challenge questions.
Step 3. Go to your account page and click the Registered Products tab.
Step 4. Click the Access Bonus Content link under the product listing.
Step 5. Click the Install Pearson Test Prep Desktop Version link under the
Practice Exams section of the page to download the software.
Step 6. After the software finishes downloading, unzip all the files on your
computer.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 9: Final Preparation 793
Step 7. Double-click the application file to start the installation, and follow the
onscreen instructions to complete the registration.
Step 8. After the installation is complete, launch the application and click the
Activate Exam button on the My Products tab.
Step 9. Click the Activate a Product button in the Activate Product Wizard.
Step 10. Enter the unique access code found on the card in the sleeve in the back
of your book and click the Activate button.
Step 11. Click Next, and then click Finish to download the exam data to your
application.
Step 12. Start using the practice exams by selecting the product and clicking the
Open Exam button to open the exam settings screen.
Note that the offline and online versions will sync together, so saved exams and
grade results recorded on one version will be available to you on the other as well.
In addition to these three modes, you will be able to select the source of your ques-
tions. You can choose to take exams that cover all of the chapters or you can narrow
your selection to just a single chapter or the chapters that make up specific parts in
the book. All chapters are selected by default. If you want to narrow your focus to
individual chapters, simply deselect all the chapters; then select only those on which
you wish to focus in the Objectives area.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
794 CISSP Cert Guide
You can also select the exam banks on which to focus. Each exam bank comes
complete with a full exam of questions that cover topics in every chapter. You can
have the test engine serve up exams from all banks or just from one individual bank
by selecting the desired banks in the exam bank area.
There are several other customizations you can make to your exam from the exam
settings screen, such as the time of the exam, the number of questions served up,
whether to randomize questions and answers, whether to show the number of cor-
rect answers for multiple-answer questions, and whether to serve up only specific
types of questions. You can also create custom test banks by selecting only questions
that you have marked or questions on which you have added notes.
Premium Edition
In addition to the free practice exams provided on the book’s companion website,
you can purchase additional exams with expanded functionality directly from Pear-
son IT Certification. The Premium Edition of this title contains an additional two
full practice exams and an eBook (in both PDF and ePub format). In addition, the
Premium Edition title offers remediation for each question by pointing you to the
specific part of the eBook that relates to that question.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Chapter 9: Final Preparation 795
Because you have purchased the print version of this title, you can purchase the
Premium Edition at a deep discount. There is a coupon code in the book sleeve
that contains a one-time-use code and instructions for where you can purchase the
Premium Edition.
To view the Premium Edition product page, go to www.informit.com/
title/9780137507573.
Memory Tables
Like most Pearson Cert Guides, this book purposely organizes information into
tables and lists for easier study and review. Rereading these tables can be very useful
before the exam. However, it is easy to skim over the tables without paying attention
to every detail, especially when you remember having seen the table’s contents when
reading the chapter.
As an alternative to simply reading the tables in the various chapters, Appendixes A
and B give you another review tool. Appendix A lists partially completed versions
of many of the tables from the book. You can open Appendix A (a PDF available on
the companion website after registering) and print the appendix. For review, you
can attempt to complete the tables. This exercise can help you focus on the review.
It also exercises the memory connectors in your brain, plus it makes you think about
the information without as much contextual information, which forces a little more
contemplation about the facts.
Appendix B, also a PDF available on the companion website, lists the completed
tables to check yourself. You can also just refer to the tables as printed in the book.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
796 CISSP Cert Guide
Summary
The tools and suggestions listed in this chapter have been designed with one goal in
mind: to help you develop the skills required to pass the CISSP exam. This book has
been developed from the beginning to not only tell you the facts but also help you
learn how to apply the facts. Regardless of your experience level leading up to when
you take the exam, it is our hope that the broad range of preparation tools provided
in this book, and even the structure of the book, helps you pass the exam with ease.
We hope you do well on the exam.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Index
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
798 access control
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
algorithms 799
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
800 algorithms
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
assets 801
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
802 assets
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
authorization 803
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
804 authorization
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
cardinality 805
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
806 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
collusion 807
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
808 COM (Component Object Model)
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
critical infrastructure protection (CIP) plan 809
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
810 critical processes/resources, identification of
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
data 811
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
812 data
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
devices, network 813
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
814 devices, network
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
DRPs (disaster recovery plans) 815
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
816 dry pipe extinguishers
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
evidence collection and handling 817
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
818 exam preparation
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
frameworks 819
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
820 frameworks
OSSTMM (Open Source Security Testing frequency-division multiplexing (FDM), 401, 451
Methodology Manual), 127 frequency-hopping spread spectrum (FHSS), 432
A Risk Management Standard FRR (false rejection rate), 554
(FERMA), 128 FTP (File Transfer Protocol), 424–425, 581
security control, 20–37 FTPS (FTP Secure), 424–425
bottom-up approach, 36 full backups, 696–697
CIS Critical Security Controls, 31–32 full-interruption tests, 712
CMMI (Capability Maturity Model full-knowledge tests, 610
Integration), 35 functional drills, 713
COBIT (Control Objectives for fuzz testing, 619
Information and Related
Technology), 27 G
COSO (Committee of Sponsoring gates/fences, 714–716
Organizations), 32 gateways, 455
CRAMM (CCTA Risk Analysis and Gather Requirements phase, Software
Management Method), 36 Development Life Cycle, 747
definition of, 20 General Data Protection Regulation (GDPR),
DoDAF (Department of Defense 17, 61–62, 189
Architecture Framework), 25 General Packet Radio Service (GPRS), 503
HITRUST CSF (Common Security geo-fences, 715
Framework), 30–31 geographical threats, 129–137
ISO/IEC 27000 series, 21–24 human-caused, 133–135
ITIL (Information Technology internal/external, 129–130
Infrastructure Library), 33 natural, 130–131
MODAF (British Ministry of Defence politically motivated, 135–137
Architecture Framework), 25 system, 131–133
NIST (National Institute of Standards GFI LanGuard, 605
and Technology) SP 800 series, 27–30 GFS (grandfather/father/son), 699
OCTAVE (Operationally Critical Gigabit Ethernet, 480
Threat, Asset, and Vulnerability glass entryways, 356
Evaluation), 32 GLBA (Gramm-Leach-Bliley Act), 16–17
SABSA (Sherwood Applied Business global IPv6 addresses, 416
Security Architecture), 25–26 Global System for Mobile communications
security program life cycle, 37 (GSM), 433
Six Sigma, 34 Gmail, 609
standards compared to, 20 goals, organizational, 12–13
TOGAF (The Open Group Architecture Goguen-Meseguer model, 230
Framework), 25 going dark, 51
top-down approach, 36 Google, 192
Zachman Framework, 25 Google Docs, 609
fraud, 135 Google Pay, 449
Freedom of Information Act (FOIA), 177 governance, security. See security governance
freeware, 49 government data classification, 176–177
frequency analysis, 343 GPRS (General Packet Radio Service), 503
frequency-division multiple access (FDMA), 433 Grabber, 609
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
hiring personnel 821
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
822 HITRUST CSF (Common Security Framework)
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
information life cycle 823
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
824 information security continuous monitoring (ISCM) programs
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
IP (Internet Protocol) networking 825
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
826 IP (Internet Protocol) networking
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
leaks, memory 827
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
828 Lean
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
maturity models, software development 829
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
830 maturity models, software development
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
MODAF (British Ministry of Defence Architecture Framework) 831
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
832 models
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
networks 833
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
834 networks
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
NIST (National Institute of Standards and Technology) 835
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
836 NIST (National Institute of Standards and Technology)
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
OWASP (Open Web Application Security Project) 837
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
838 owners
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
plans 839
Personal Information Protection and Electronic PII (personally identifiable information), 40,
Documents Act (PIPEDA), 56 52, 171–173, 449
Personal Information Protection Law (PIPL) ping command, 387, 425, 512, 513
in China, 58 PINs (personal identification numbers), 542
personal-area networks (PANs), 421 PIPEDA (Personal Information Protection
personally identifiable information (PII), 40, and Electronic Documents Act), 56
52, 171–173, 449 pipelined processors, 243
personnel. See also teams PIPL (Personal Information Protection Law)
disaster recovery, 707–709 in China, 58
policies/procedures, 85–90 PIR (passive infrared) systems, 716
candidate screening/hiring, 85–87 piracy, software, 49
compliance policy, 89 PKCS (Public Key Cryptography
employee onboarding/offboarding, 88 Standards), 447
employment agreements, 87 PKI (public key infrastructure), 322–328, 501
job rotation, 89 CAs (certificate authorities), 323
privacy policy, 89 CRLs (certificate revocation lists), 327
separation of duties, 89 cross-certification, 328
privacy issues, 60 digital certificates, 323–327
safety and security, 719–721 classes of, 324
testing, 605 definition of, 293
training, 699 life cycle of, 324–327
PGP (Pretty Good Privacy), 446–447 requesting, 327–328
pharming, 586–587 X.509, 323
PHI (protected health information), 173–175 OCSP (Online Certificate Status
phishing/pharming, 449, 517, 586–587 Protocol), 327
photoelectric systems, 717 RAs (registration authorities), 323
photometric systems, 717 steps of, 327–328
physical addressing. See addressing, IP plain old telephone service (POTS), 490
(Internet Protocol) plaintext, 260–261, 293
physical assets, 90, 662 Plan-Do-Check-Act cycle, 34, 108
physical controls, 105, 537–538 Plan/Initiate Project phase, Software
Physical layer, OSI model, 383–389 Development Life Cycle, 746–747
physical security, 350, 713–721 plans
building and internal security, 719 BCPs (business continuity plans), 76, 77–78,
equipment, 362–364 79, 624, 713
perimeter security, 713–719 BIA (business impact analysis), 76, 81–85
access control, 719 CIP (critical infrastructure protection)
gates/fences, 714–716 plan, 79
lighting, 718–719 continency planning, 76, 78–81
patrol force, 719 COOP (continuity of operations plan), 79
perimeter intrusion detection systems, crisis communications plan, 79
716–718 cyber incident response plan, 79
personnel safety and security, 719–721 DRPs (disaster recovery plans), 75–76, 79,
physical testing, 605 624, 711–713
physiological biometric systems, 550–551 checklist tests, 712
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
840 plans
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
provisioning life cycle 841
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
842 proxies
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
resource protection 843
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
844 resource protection
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Ruby 845
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
846 rules
rules scareware, 43
of engagement, 681–682 SCAs (security control assessments), 105–108
of evidence, 646 schemas, 183
rule-based access control, 574–579 Scientific Working Group on Digital
rule-based IDSs (intrusion detection Evidence, 642–643
systems), 462 scope, 201
RUM (real user monitoring), 616 BCPs (business continuity plans), 78
running key ciphers, 305 incident response, 681–682
IPv6 addresses, 415–416
screen scrapers, 506
S screened hosts, 459
SABSA (Sherwood Applied Business Security screened subnet, 459
Architecture), 25–26 script malware, 768
safe harbor, 61 scrubbing, 569
safeguards, 92, 98–99 scytale cipher, 294
SafeKey, 449 SDLC. See Software Development Life Cycle;
safes, 364 System Development Life Cycle
sag, power, 360 SDN (software-defined networking), 507–508
salting, 339 SDRAM (synchronous dynamic random-
salvage teams, 709 access memory), 238
SAM (Security Accounts Manager), SDSL (Symmetric DSL), 499
549–550 searching for evidence, 649
SAML (Security Assertion Markup Language), secondary evidence, 647
564, 565 secondary memory, 240
sandboxes, 686, 739 Secret data, 176
sanitization, 193–194, 678–679, 781 secret key encryption. See symmetric
SANs (storage-area networks), 181, algorithms
420, 676, 705 Secure Boot, 242
Sarbanes-Oxley (SOX) Act, 16–17, 54 secure coding guidelines/standards, 776–781
SAs (security associations), 502 APIs (application programming interfaces),
SAS (Statement on Auditing Standards) 780
70, 625 backdoors, 778
SASE (specific application service best practices, 780–781
element), 380 buffer overflow, 776–778
SAST (Static Application Security covert channels, 779
Testing), 750 mobile code, 779
satellite networks, 435 object reuse, 779
SBU (Sensitive but Unclassified) data, 176 privilege escalation, 778
scans, 772 rogue programmers, 778
network discovery, 606–607 TOC (time of check) attacks, 779
network vulnerability, 607–608 TOU (time of use) attacks, 779
ping, 513 trapdoors, 778
port, 513, 520 secure communication channels, 495–521
server-based versus agent-based, 608 data communications, 507
web application vulnerability, 609 multimedia collaboration, 495–496
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
security architecture and engineering 847
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
848 security architecture and engineering
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
security governance 849
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
850 security governance
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
security operations 851
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
852 security operations
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
simple passwords 853
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
854 simplicity, design
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
software development 855
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
856 software development
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
switches 857
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
858 symmetric algorithms
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
threats 859
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
860 threats
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
trusted computer base (TCB) 861
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
862 Trusted Computer System Evaluation Criteria (TCSEC)
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
vulnerabilities 863
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
864 vulnerabilities
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
zombies 865
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
This page intentionally left blank
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Exclusive Offer – 40% OFF
Pearson IT Certification
Video Training
pearsonitcertification.com/video
Use coupon code PITCVIDEO40 during checkout.
pearsonitcertification.com/video
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
REGISTER YOUR PRODUCT at PearsonITcertification.com/register
Access Additional Benefits and SAVE 35% on Your Next Purchase
• Download available product updates.
• Access bonus material when applicable.
• Receive exclusive offers on new editions and related products.
(Just check the box to hear from us when setting up your account.)
• Get a coupon for 35% for your next purchase, valid for 30 days. Your code will
be available in your PITC cart. (You will also find it in the Manage Codes
section of your account page.)
Registration benefits vary by product. Benefits will be listed on your account page
under Registered Products.
Addison-Wesley • Cisco Press • IBM Press • Microsoft Press • Pearson IT Certification • Prentice Hall • Que • Sams • VMware Press
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
APPENDIX A
Memory Tables
Chapter 1
As part of determining how critical an asset is, you need to understand the
following terms:
■ Maximum tolerable downtime (MTD): The ______________ amount
of time that an organization can tolerate a single resource or function
being down. This is also referred to as ______________________________
_____________________.
■ Mean time to repair (MTTR): The _________________ required to
______________ a single failed component or device when a disaster or
disruption occurs.
■ Mean time between failure (MTBF): The ________________________
__________ a device will operate before a _______________ occurs. This
amount is calculated by the ___________________. System reliability is
increased by a _______________ MTBF and ______________ MTTR.
■ Recovery time objective (RTO): The _______________ after a disas-
ter or disruptive event within which a resource or function must be
_______________ to avoid unacceptable consequences. RTO assumes that
an acceptable period of downtime exists. RTO should be smaller than
____________.
■ Work recovery time (WRT): The _________________ that is needed to
verify _____________ and/or _______________.
■ Recovery point objective (RPO): The _______________ targeted period
in which data might be ______ from an IT service due to a major incident.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
2
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Table 1-4 Logical (Technical) Controls
Logical (Technical) Compensative Corrective Detective Deterrent Directive Preventive Recovery
Controls
Password
Biometrics
Smart cards
Encryption
Protocols
Firewalls
IDS
IPS
Access control lists
Routers
Auditing
Monitoring
Data backups
Antivirus software
Configuration standards
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Warning banners
Connection isolation and
termination
Appendix A: Memory Tables
3
4
Fencing
Locks
Guards
Fire extinguisher
Badges
Swipe cards
Dogs
Man traps
Biometrics
Lighting
Motion detectors
CCTV
Data backups
Antivirus software
Configuration standards
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Warning banner
Hot, warm, and cold sites
Appendix A: Memory Tables 5
Chapter 2
Determining the impact from a loss of confidentiality of PII should take into
account relevant factors including
■ _________________: How easily PII can be used to identify specific individuals
■ ______________of PII: How many individuals are identified in the
information
■ ___________________: The sensitivity of each individual PII data field, as well
as the sensitivity of the PII data fields together
■ ___________________: The purpose for which PII is collected, stored, used,
processed, disclosed, or disseminated
■ ________________________________: The laws, regulations, standards, and
operating practices that dictate an organization’s responsibility for protecting
PII
■ ________________________________: The nature of authorized access to PII
■ Foreign key: An _____________ in one relation that has values matching the
_____________ key in another relation. Matches between the foreign key and
the primary key are important because they represent references from one
relation to another and establish the connection among these relations.
■ Candidate key: An attribute in a __________ that uniquely identifies that row.
■ Referential integrity: A requirement that for any foreign key attribute the
referenced relation must have a _____________ with the _____________ value
for its _____________ key.
Chapter 3
3DES
AES
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Appendix A: Memory Tables 7
RC4
RC5
RC6
RC7
CAST-128
CAST-256
Chapter 4
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
8 CISSP Cert Guide
CIFS/SMB
NFSv4
SIP
XMPP
IRC
RADIUS
rlogin
rsh and RCP
IMAP
HTTPS
RDP
AFP over TCP
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Appendix A: Memory Tables 9
Table 4-4 Differences Between IPv4 and IPv6 (Adapted from NIST SP 800-119)
Property IPv4 IPv6
Address size and ________ bits, network size ________ bits, network size 64
network size 8–30 bits bits
Packet header size ________ bytes ________ bytes
Header-level extension ________ number of small IP ________ number of IPv6
options ________ headers
Fragmentation ________ or any intermediate Only ________ may fragment
________ allowed to fragment
Control protocols ________ of non-IP (ARP), All control protocols based on
ICMP, and other protocols ________
Minimum allowed MTU ________ bytes ________ bytes
Path MTU discovery ________, not widely used Strongly _________________
Address assignment Usually ________ address per Usually ________ addresses per
host interface
Address types Use of ________, ________, ____________ addressing
and ________ address types no longer used; use of
____________, ____________,
and ____________ address types
Address configuration Devices configured ________ Devices configure themselves
or with __________________ independently using __________
protocols like DHCP ___________________________
(SLAAC) or use ____________
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
10 CISSP Cert Guide
Wi-Fi security
Chapter 5
When considering biometric technologies, security professionals should understand
the following terms:
■ Enrollment time: The process of ____________ the ____________ that is
used by the biometric system. This process requires actions that must be
repeated several times.
■ Feature extraction: The approach to ____________ biometric information
from a collected ____________ of a user’s ____________ or ____________
characteristics.
■ Accuracy: The most important characteristic of biometric systems. It is how
____________ the overall readings will be.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Appendix A: Memory Tables 11
■ Throughput rate: The rate at which the biometric system will be able to
____________ characteristics and ____________ the analysis to permit or deny
____________. The acceptable rate is 6–10 subjects per minute. A single user
should be able to complete the process in 5–10 seconds.
■ Acceptability: The ____________ that users will accept and follow the system.
■ False rejection rate (FRR): A measurement of ____________ users that will
be ____________________ by the system. This is called a ____________ error.
■ False acceptance rate (FAR): A measurement of the percentage of
___________________ that will be _________________________ by the
system. This is called a ____________ error. Type II FAR errors are more
____________ than Type I FRR errors.
■ ______________________________: The point at which FRR equals FAR.
Expressed as a percentage, this is the most important metric.
Chapter 6
Vulnerability assessments usually fall into one of three categories:
■ ____________________: Reviews standard practices and procedures that users
follow.
■ ____________________: Reviews facility and perimeter protections.
■ ____________________: Reviews systems, devices, and network topology.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
12 CISSP Cert Guide
Chapter 7
The following types of media analysis can be used:
■ Disk imaging: Creates an _________ of the _________ of the hard drive.
■ Slack space analysis: Analyzes the _________ (marked as _________ or
_________) space on the drive to see whether any _________ (marked for
_________) data can be _________.
■ Content analysis: Analyzes the contents of the drive and gives a report
detailing the _________ of _________ by percentage.
■ Steganography analysis: Analyzes the _________ on a drive to see whether
the _________ have been _________ or to discover the _________ used
on the file.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Appendix A: Memory Tables 13
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
14
_________________
RAID 1 Disk _________________ Very high _________________; High _________________
very high data overhead; because all data
_________________; very is _________________,
_________________ penalty on _________________ the storage
write performance capacity is required
RAID 3 Byte-level data Excellent performance Not well suited for
_________________ for _________________, _________________ network
with dedicated _________________ data applications; single parity
_________________ _________________ _________________ does
not support multiple,
simultaneous read and write
_________________
RAID 5 Block-level data Best _________________ Write performance is
_________________ with for transaction-oriented _________________ than
_________________ parity networks; very high RAID 0 or RAID 1
_________________, very
high data _________________;
supports _________________
simultaneous reads and writes;
can also be optimized for large,
sequential requests
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
RAID 10 Disk _________________ Same _________________ Very _________________;
with _________________ as RAID 1; same all drives must move in
_________________ as with _________________ to
mirroring; provides high I/O properly track, which reduces
_________________; can sustain sustained performance; very
multiple simultaneous drive limited _________________ at
_________________ a very high _________________
APPENDIX B
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
2
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Table 1-4 Logical (Technical) Controls
Logical (Technical) Compensative Corrective Detective Deterrent Directive Preventive Recovery
Controls
Password X
Biometrics X
Smart cards X
Encryption X
Protocols X
Firewalls X
IDS X
IPS X
Access control lists X
Routers X
Auditing X
Monitoring X
Data backups X
Antivirus software X
Configuration standards X
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Warning banners X
Connection isolation and X
termination
Appendix B: Memory Tables Answer Key
3
4
Fencing X X
Locks X
Guards X X
Fire extinguisher X
Badges X
Swipe cards X
Dogs X X
Man traps X
Biometrics X
Lighting X
Motion detectors X
CCTV X X X
Data backups X
Antivirus software X
Configuration standards X
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Warning banner X
Hot, warm, and cold sites X
Appendix B: Memory Tables Answer Key 5
Chapter 2
Determining the impact from a loss of confidentiality of PII should take into
account relevant factors including
■ Identifiability: How easily PII can be used to identify specific individuals
■ Quantity of PII: How many individuals are identified in the information
■ Data field sensitivity: The sensitivity of each individual PII data field, as well
as the sensitivity of the PII data fields together
■ Context of use: The purpose for which PII is collected, stored, used,
processed, disclosed, or disseminated
■ Obligation to protect confidentiality: The laws, regulations, standards, and
operating practices that dictate an organization’s responsibility for protecting
PII
■ Access to and location of PII: The nature of authorized access to PII
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
6 CISSP Cert Guide
■ Foreign key: An attribute in one relation that has values matching the primary
key in another relation. Matches between the foreign key and the primary key
are important because they represent references from one relation to another
and establish the connection among these relations.
■ Candidate key: An attribute in a row that uniquely identifies that row.
■ Referential integrity: A requirement that for any foreign key attribute the
referenced relation must have a tuple with the same value for its primary key.
Chapter 3
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Appendix B: Memory Tables Answer Key 7
Chapter 4
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
8 CISSP Cert Guide
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Appendix B: Memory Tables Answer Key 9
Table 4-4 Differences Between IPv4 and IPv6 (Adapted from NIST SP 800-119)
Property IPv4 IPv6
Address size and 32 bits, network size 8–30 bits 128 bits, network size 64 bits
network size
Packet header size 20–60 bytes 40 bytes
Header-level extension Limited number of small IP Unlimited number of IPv6
options extension headers
Fragmentation Sender or any intermediate Only sender may fragment
router allowed to fragment
Control protocols Mixture of non-IP (ARP), All control protocols based on
ICMP, and other protocols ICMPv6
Minimum allowed MTU 576 bytes 1280 bytes
Path MTU discovery Optional, not widely used Strongly recommended
Address assignment Usually one address per host Usually multiple addresses per
interface
Address types Use of unicast, multicast, and Broadcast addressing no longer
broadcast address types used; use of unicast, multicast,
and anycast address types
Address configuration Devices configured manually Devices configure themselves
or with host configuration independently using stateless
protocols like DHCP address autoconfiguration
(SLAAC) or use DHCP
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
10 CISSP Cert Guide
Chapter 5
When considering biometric technologies, security professionals should understand
the following terms:
■ Enrollment time: The process of obtaining the sample that is used by the
biometric system. This process requires actions that must be repeated several
times.
■ Feature extraction: The approach to obtaining biometric information from a
collected sample of a user’s physiological or behavioral characteristics.
■ Accuracy: The most important characteristic of biometric systems. It is how
correct the overall readings will be.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Appendix B: Memory Tables Answer Key 11
■ Throughput rate: The rate at which the biometric system will be able to scan
characteristics and complete the analysis to permit or deny access. The accept-
able rate is 6–10 subjects per minute. A single user should be able to complete
the process in 5–10 seconds.
■ Acceptability: The likelihood that users will accept and follow the system.
■ False rejection rate (FRR): A measurement of valid users that will be falsely
rejected by the system. This is called a Type I error.
■ False acceptance rate (FAR): A measurement of the percentage of invalid
users that will be falsely accepted by the system. This is called a Type II error.
Type II FAR errors are more dangerous than Type I FRR errors.
■ Crossover error rate (CER): The point at which FRR equals FAR. Expressed
as a percentage, this is the most important metric.
Chapter 6
Vulnerability assessments usually fall into one of three categories:
■ Personnel testing: Reviews standard practices and procedures that users
follow.
■ Physical testing: Reviews facility and perimeter protections.
■ System and network testing: Reviews systems, devices, and network
topology.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
12 CISSP Cert Guide
Chapter 7
The following types of media analysis can be used:
■ Disk imaging: Creates an exact image of the contents of the hard drive.
■ Slack space analysis: Analyzes the slack (marked as empty or reusable)
space on the drive to see whether any old (marked for deletion) data can be
retrieved.
■ Content analysis: Analyzes the contents of the drive and gives a report detail-
ing the types of data by percentage.
■ Steganography analysis: Analyzes the files on a drive to see whether the files
have been altered or to discover the encryption used on the file.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Appendix B: Memory Tables Answer Key 13
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
14
is lost
RAID 1 2 Disk mirroring Very high performance; High redundancy cost
very high data protection; overhead; because all
very minimal penalty on data is duplicated, twice
write performance the storage capacity is
required
RAID 3 3 Byte-level data striping Excellent performance Not well suited for
with dedicated parity for large, sequential data transaction-oriented
drive requests network applications;
single parity drive does
not support multiple,
simultaneous read and
write requests
RAID 5 3 Block-level data Best cost/performance Write performance is slower
striping with for transaction-oriented than RAID 0 or RAID 1
distributed parity networks; very high
performance, very high
data protection; supports
multiple simultaneous
reads and writes; can also
be optimized for large,
sequential requests
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
RAID 10 4 Disk mirroring with Same fault tolerance as Very expensive; all
striping RAID 1; same overhead as drives must move in
with mirroring; provides parallel to properly track,
high I/O rates; can sustain which reduces sustained
multiple simultaneous drive performance; very limited
failures scalability at a very high cost
Glossary
Numbers
3DES See Triple DES (3DES).
5G The fifth generation of cellular technologies. It facilitates speeds that are
much faster than its predecessor—4G. 5G does not just benefit cellphone
consumers but will provide greater support for the needs of autonomous cars
and the growth of IoT devices.
802.1X A port access protocol that protects networks via authentication. It
is used widely in wireless environments. When 802.1X authentication is used,
the access point opens a virtual port for communication. If authorization is
unsuccessful, the virtual port is unavailable, and communication is blocked.
802.11a A communication standard that operates in the 5 GHz frequency
with a maximum speed of 54 Mbps.
802.11ac A communication standard that operates in the 5 GHz frequency
with a maximum speed of at least 1 gigabit per second (Gbps) and a single-link
throughput of 500 megabits per second (Mbps).
802.11ax Also referred to as Wi-Fi 6. A standard developed by the Wi-Fi
Alliance. Wi-Fi 6 operates on 2.4 GHz or 5 GHz and has a theoretical maximum
throughput of 10.53 Gbps, while in reality there is about a 30 percent increase in
speed. Wi-Fi 6 is 1024-QAM and can transmit 10 bits at a time, which is 2 bits
more than Wi-Fi 5.
802.11b A communication standard that operates in the 2.4 GHz frequency
with a maximum speed of 11 Mbps.
802.11be Also called Wi-Fi 7. A wireless protocol that has throughput greater
than 30 Gbps and low latency. This protocol will support Extremely High
Throughput (EHT) devices, while targeting newer technologies, such as
augmented reality (AR), virtual reality, and cloud computing.
802.11f A standard for communication between access points.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
2 Glossary
802.11g A communication standard that operates in the 2.4 GHz frequency with a
maximum speed of 54 Mbps.
802.11n A communication standard that operates in both the 2.4 GHz and 5.0
GHz frequencies with a maximum theoretical speed of 600 Mbps.
A
absolute addressing Addresses the entire primary memory space.
abstraction The process of taking away or removing characteristics from
something to reduce it to a set of essential characteristics.
acceptance testing Testing to ensure that the customer (either internal or
external) is satisfied with the functionality of the software.
access aggregation Occurs when users gain more access across more systems.
Often used synonymously with privilege creep.
access control The means by which a subject’s ability to communicate with
or access an object is allowed or denied based on an organization’s security
requirements.
access control list (ACL) A table that consists of the access rights that subjects
have to a particular object. An ACL is about the object.
access control matrix A table that consists of a list of subjects, a list of objects,
and a list of the actions that a subject can take upon each object.
access control policy A security policy that defines the method for identifying
and authenticating users and the level of access that is granted to users.
access point A wireless transmitter and receiver that hooks into the wired portion
of the network and provides an access point to this network for wireless devices.
account management Involves the addition and deletion of accounts that are
granted access to systems or networks. It also involves changing the permissions or
privileges granted to those accounts.
accounting The process whereby auditing results are used to hold users and
organizations accountable for their actions or inaction.
accreditation The formal acceptance of the adequacy of a system’s overall security
by the management.
ACL See access control list (ACL).
acoustical systems Detection systems that use strategically placed microphones
to detect any sound made during a forced entry.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Glossary 3
acrylic glass A type of glass made of polycarbonate acrylic that is much stronger
than regular glass but produces toxic fumes when burned.
active vulnerability scanner (AVS) Can take action to block an attack, such
as block a dangerous IP address, whereas a passive scanner can only gather
information.
ActiveX A Microsoft technology that uses object-oriented programming (OOP)
and is based on COM and DCOM.
Ad Hoc mode A wireless implementation in which there is no AP and stations
communicate directly with one another.
Address Resolution Protocol (ARP) A protocol that resolves the IP address
placed in the packet to a physical or layer 2 address (called a MAC address in
Ethernet).
administrative control A security control that is implemented to administer
the organization’s assets and personnel and includes security policies, procedures,
standards, and guidelines that are established by management.
administrative law A type of law where standards of performance or conduct
are set by government agencies for organizations and industries to follow.
Common areas that are covered include public utilities, communications, banking,
environmental protection, and healthcare.
ADSL See Asymmetric DSL (ADSL).
advanced persistent threat (APT) An attack in which an unauthorized person
gains access to a network and remains for a long period of time with the intention
being to steal data.
adware Software that tracks Internet usage in an attempt to tailor ads and junk
emails to a user’s interests.
aggregation The process of assembling or compiling units of information at one
sensitivity level and having the resultant totality of data being of a higher sensitivity
level than the individual components.
Agile A development model emphasizing continuous feedback and cross-
functional teamwork.
AH See Authentication Header (AH).
ALE See annualized loss expectancy.
algorithm A mathematical function that encrypts and decrypts data. Also referred
to as a cipher.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
4 Glossary
annualized loss expectancy The expected risk factor of an annual threat event.
The equation used is ALE = SLE × ARO.
annualized rate of occurrence (ARO) An estimate of how often a given threat
might occur annually.
app approval/rejection Approving or rejecting an app based on the test results;
part of the app vetting process.
app testing Testing an app to ensure that it conforms to the organization’s
security requirements; part of the app vetting process.
app vetting A sequence of activities that aims to determine if an app conforms to
the organization’s security requirements. It includes two main activities: app testing
and app approval/rejection.
Application layer (layer 7) The OSI reference model layer where the
encapsulation process begins. This layer receives the raw data from the application
in use and provides services such as file transfer and message exchange to the
application (and thus the user).
application-level proxy A type of firewall that performs deep packet inspection. It
understands the details of the communication process at layer 7 for the application
of interest.
ARC See Authenticated Receive Chain.
architecture The organization of a system, including its components and their
interrelationships, along with the principles that guided the system’s design and
evolution.
ARO See annualized rate of occurrence.
ARP See Address Resolution Protocol (ARP).
artifact Items like registry keys, files, timestamps, and event logs that are observed,
documented, and collected during a digital investigation. They will vary depending
on the device type, operating system, and other factors.
assembly languages Languages that use symbols or mnemonics to represent
sections of complicated binary code. Consequently, these languages use an
assembler to convert the code to machine level.
asset Any resource, product, process, system, or digital or physical entity that has
value to an organization and must be protected.
asset valuation The process of assigning a monetary value to an asset based on its
value to the organization.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Glossary 5
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
6 Glossary
authenticating server The RADIUS server, which works with the RADIUS
client.
authentication The act of validating a user with a unique identifier by providing
the appropriate credentials.
Authentication Header (AH) Part of IPsec that provides data integrity, data
origin authentication, and protection from replay attacks.
authenticator The component in a RADIUS environment to which an applicant
is attempting to connect (AP, switch, remote access server).
authorization The point after identification and authentication at which a user is
granted the rights and permissions to resources.
Automatic Private IP Addressing (APIPA) Assigns an IP address to a device
if the device is unable to communicate with the DHCP server and is primarily
implemented in Windows. The range of IP addresses assigned is 169.254.0.1 to
169.254.255.254 with a subnet mask of 255.255.0.0.
auxiliary station alarm A mechanism that automatically causes an alarm
originating in a data center to be transmitted over the local municipal fire or police
alarm circuits for relaying to both the local police/fire station and the appropriate
headquarters.
availability A value that describes what percentage of the time the resource or the
data is available. The tenet of the CIA triad that ensures that data is accessible when
and where it is needed.
avalanche effect The condition where any change in the key or plaintext, no
matter how minor, will significantly change the ciphertext.
B
backdoor A mechanism implemented in many devices or applications that gives
the user who uses the backdoor unlimited access to the device or application. It is a
piece of software installed by a hacker that allows him to return later and connect to
the computer without going through the normal authentication process. Also known
as a trapdoor.
BACnet2 A master/slave industrial control system protocol that uses port 47808.
base relation In SQL, a relation that is actually existent in the database.
baseband Transmissions where the entire medium is used for a single transmission
and then multiple transmission types are assigned time slots to use this single circuit.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Glossary 7
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
8 Glossary
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Glossary 9
C
CA See certification authority (CA).
cable lock A vinyl-coated steel cable that connects to a laptop and then locks
around an object.
cable modems An Internet access solution that can provide up to more than 50
Mbps over the coaxial cabling used for cable TV.
cache A relatively small amount (when compared to primary memory) of very
high-speed RAM, which holds the instructions and data from primary memory, that
has a high probability of being accessed during the currently executing portion of a
program.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
10 Glossary
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Glossary 11
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
12 Glossary
chosen plaintext attack An attack that occurs when an attacker chooses the
plaintext to get encrypted to obtain the ciphertext.
CIA triad The three fundamentals of security: confidentiality, integrity, and
availability.
CIP plan See critical infrastructure protection plan.
cipher See algorithm.
Cipher Block Chaining (CBC) A DES mode in which each 64-bit block is
chained together because each resultant 64-bit ciphertext block is applied to the
next block. So plaintext message block one is processed by the algorithm using an
initialization vector (IV). The resultant ciphertext message block one is XORed
with plaintext message block two, resulting in ciphertext message two. This process
continues until the message is complete.
Cipher Block Chaining MAC (CBC-MAC) A block-cipher MAC that operates
in CBC mode.
Cipher Feedback (CFB) A DES mode that works with 8-bit (or smaller) blocks
and uses a combination of stream ciphering and block ciphering. Like CBC, the first
8-bit block of the plaintext message is XORed by the algorithm using a keystream,
which is the result of an IV and the key. The resultant ciphertext message is applied
to the next plaintext message block.
cipher locks A lock that is opened by entering the correct code on a key pad.
ciphertext An altered form of a message that is unreadable without knowing the
key and the encryption system used. Also referred to as a cryptogram.
ciphertext-only attack An attack that occurs when an attacker uses several
encrypted messages (ciphertext) to figure out the key used in the encryption process.
circuit-level proxy A firewall that operates at the Session layer (layer 5) of the
OSI model.
circuit-switching network A network in which there is an established path to the
destination that is the only path for the entire communication.
circumstantial evidence Evidence that provides inference of information from
other intermediate relevant facts.
civil code law A type of law based on written laws. It is a rule-based law and does
not rely on precedence in any way.
civil disobedience The intentional refusal to obey certain laws, demands, and
commands of a government and is commonly, though not always, defined as being
nonviolent resistance.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Glossary 13
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
14 Glossary
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Glossary 15
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
16 Glossary
confinement When a process is only allowed to read from and write to certain
memory locations and resources.
confusion The process of changing a key value during each round of encryption.
Confusion is often carried out by substitution.
consistency The degree to which a transaction follows an integrity process which
ensures that data is consistent in all places where it exists.
contamination The intermingling or mixing of data of one sensitivity or
need-to-know level with that of another.
content analysis Analysis of the contents of a drive or software. Drive content
analysis gives a report detailing the types of data by percentage. Software content
analysis determines the purpose of the software.
content distribution network (CDN) A distributed network of servers that is
usually located in multiple data centers connected over the Internet.
context-dependent access control A type of access that is based on subject
or object attributes or environmental characteristics. Bases the access to data on
multiple factors to help prevent inference.
continuity of operations plan (COOP) A plan that focuses on restoring
an organization’s mission-essential functions (MEFs) at an alternate site and
performing those functions for up to 30 days before returning to normal operations.
Continuous Integration and Continuous Delivery (CI/CD) Continuous
integration (CI) refers to the process of frequently integrating code changes
and updates, provided by the development team, during software development.
Continuous delivery (CD) refers to the frequent transfer of changes to production.
These changes may include bug fixes or configuration changes.
continuous lighting An array of lights that provides an even amount of
illumination across an area.
Control and User Plane Separation (CUPS) A 3GPP specification that
facilitates Multi-access Edge Computing (MEC), whereby control functions, like
establishing a connection with another device, take a different route through a
network. The goal of MEC and CUPS is to create more bandwidth for users and
significantly reduce latency by facilitating connections at the network edge, while
moving away from a centralized network.
COOP See continuity of operations plan.
copy backup A backup that backs up all the files, much like a full backup, but does
not reset the file’s archive bit.
Humble Bundle Pearson Networking and Security Certification Bundle – © Pearson. Do Not Distribute.
Glossary 17
copyright An intellectual property type that ensures that a work that is authored is
protected for any form of reproduction or use without the consent of the copyright
holder, usually the author or artist that created the original work.
CORBA See Common Object Request Broker Architecture (CORBA).
corrective control A security control that reduces the effect of an attack or other
undesirable event.
corroborative evidence Evidence that supports another piece of evidence.
Counter Mode (CTR) A DES mode similar to OFB mode that uses an
incrementing IV counter to ensure that each block is encrypted with a unique
keystream. Also, the ciphertext is not chaining into the encryption process. Because
this chaining does not occur, CTR performance is much better than the other modes.
countermeasure A control that is implemented to reduce potential risk.
coupling Refers to how much interaction one module requires from another
module to do its job. Low or loose coupling indicates that a module does not need
much help from other modules, whereas high coupling indicates the opposite.
CPTED See Crime Prevention Through Environmental Design (CPTED).
Crime Prevention Through Environmental Design (CPTED) Facility design
from the ground up to support security.
crime scene The environment in which potential evidence exists.
criminal investigation An investigation that is carried out because a federal, state,
or local law has been violated wherein information related to the crime is collected
by law enforcement. Law enforcement must determine whether a crime has been
committed, identify a suspected perpetrator (or perpetrators) of a crime, apprehend
the criminal suspect(s), and produce evidence to potentially prosecute a suspect or
suspects.
criminal law A type of law that covers any actions that are considered harmful to
others. It deals with conduct that violates public protection laws.
crisis communications plan A plan that documents standard procedures for
internal and external communications in the event of a disruption using a crisis
communications plan. It also provides various formats for communications
appropriate to the incident.
critical infrastructure protection (CIP) plan A set of policies and procedures
that serve to protect and recover these assets and mitigate risks and vulnerabilities.
criticality See data criticality.
CRL See certificate revocation list (CRL).
18 Glossary
D
D2D See device-to-device communication.
DAC See discretionary access control (DAC).
Glossary 19
demultiplexer A device that takes a single input signal that carries many channels
and separates them into multiple output signals.
deprovisioning The act of removing or disabling an access account.
DES See Digital Encryption Standard (DES).
DES-X A variant of DES that uses multiple 64-bit keys in addition to the 56-bit
DES key. The first 64-bit key is XORed to the plaintext, which is then encrypted
with DES. The second 64-bit key is XORed to the resulting cipher.
detective control A security control that detects an attack while it is occurring to
alert appropriate personnel.
deterrent control A security control that deters potential attacks.
device authentication A form of authentication that relies on the identity of the
device as part of the authentication process.
device-to-device (D2D) communication Technology that enables user
equipment (UE) to communicate with one another, with or without a network
infrastructure. The UE can be a mobile device or can be vehicle-to-vehicle
communication. The primary benefit of D2D communication is ultra-low latency.
DevSecOps Development, security, operations; a methodology that focuses on
integrating security during each stage of the software development life cycle. When
security is integrated at all stages, it becomes a shared responsibility for developers,
operations, and IT security.
DHCP See Dynamic Host Configuration Protocol (DHCP).
dial-up connection A communication connection that uses the PSTN. If it is
initiated over an analog phone line, it requires a modem that converts the digital
data to analog on the sending end and a modem on the receiving end to convert it
back to digital.
Dictionary attack A type of password attack where attackers use a dictionary of
common words to discover passwords.
differential backup A backup in which all files that have been changed since the
last full backup are backed up and the archive bit for each file is not cleared.
diffusion The process of changing the location of the plaintext within the
ciphertext. Diffusion is often carried out using transposition.
digital Signaling used in most computer transmissions, which has only two
possible values: on and off.
digital certificate An electronic document that identifies the certificate holder.
22 Glossary
software contain this functionality, which uses digital signatures to validate the
source of all messages to ensure that they are not spoofed.
DomainKeys Identified Mail (DKIM) A pair of cryptographic keys that are used
to sign an outgoing message, while validating incoming messages.
double-blind test A blind test in which the organization’s security team does
not know that an attack is coming. Only a few individuals at the organization know
about the attack, and they do not share this information with the security team. This
test usually requires equal effort for both the testing team and the organization’s
security team.
Double-DES A DES version that uses a 112-bit key length.
DRM See digital rights management.
DRP See disaster recovery plan.
dry pipe extinguisher A system in which water is not held in the pipes but in a
holding tank. The pipes hold pressurized air, which is reduced when fire is detected,
allowing the water to enter the pipe and the sprinklers. This minimizes the chance
of an accidental discharge.
DSL See Digital Subscriber Line (DSL).
DSRC See dedicated short-range communications.
DSS See Digital Signature Standard (DSS).
DSSS See Direct Sequence Spread Spectrum (DSSS).
dual control A security measure that requires two employees to be available to
complete a specific task. This security measure is part of separation of duties.
dual-homed firewall A firewall that has two network interfaces, one pointing to
the internal network and another connected to the untrusted network.
due care A legal term that is used when an organization took all reasonable
measures to prevent security breaches and also took steps to mitigate damages
caused by successful breaches.
due diligence A legal term that is used when an organization investigated all
vulnerabilities.
dumpster diving A social engineering attack that occurs when attackers examine
garbage contents to obtain confidential information.
durability A property in which, after it’s verified, the transaction is committed and
cannot be rolled back.
Glossary 25
E
EAP See Extensible Authentication Protocol (EAP).
E-carriers In Europe, a similar technology to T-carrier lines.
ECB See Electronic Code Book (ECB).
Economic Espionage Act of 1996 A U.S. act that affects companies that have
trade secrets and any individuals who plan to use encryption technology for criminal
activities.
ECPA See Electronic Communications Privacy Act (ECPA) of 1986.
eDiscovery See electronic discovery (eDiscovery).
EDR See Endpoint Detection and Response.
EF See exposure factor.
egress monitoring Monitoring that occurs when an organization monitors the
outbound flow of information from one network to another.
EHT See Extremely High Throughput.
EIGRP See Enhanced IGRP (EIGRP).
electromagnetic interference (EMI) Interference from power lines and other
power sources.
26 Glossary
F
fail safe state Leaving system processes and components in a secure state when a
failure occurs or is detected in the system.
fail soft state The termination of selected, non-critical processing when a
hardware or software failure occurs.
failover The capacity of a system to switch over to a backup system if a failure in
the primary system occurs.
failsoft The capability of a system to terminate non-critical processes when a
failure occurs.
false acceptance rate (FAR) A measurement of the percentage of invalid users
that will be falsely accepted by the system. This is called a Type II error.
false rejection rate (FRR) A measurement of valid users that will be falsely
rejected by a biometric system. This is called a Type I error.
FAR See false acceptance rate (FAR).
fault A momentary power outage.
fault tolerance A concept that includes redundancy but refers to any process
that allows a system to continue making information assets available in the case of a
failure.
FCoE See Fibre Channel over Ethernet (FCoE).
FDDI See Fiber Distributed Data Interface (FDDI).
FDM See Frequency Division Multiplexing (FDM).
FDMA See Frequency Division Multiple Access (FDMA).
Federal Information Security Management Act (FISMA) of 2002 A U.S.
act that affects every federal agency. It requires the federal agencies to develop,
document, and implement an agency-wide information security program.
Federal Intelligence Surveillance Act (FISA) of 1978 A U.S. act that affects
law enforcement and intelligence agencies. It gives procedures for the physical and
electronic surveillance and collection of “foreign intelligence information” between
“foreign powers” and “agents of foreign powers” and only applies to traffic within
the United States.
Federal Privacy Act of 1974 A U.S. act that provides guidelines on the collection,
maintenance, use, and dissemination of personally identifiable information (PII)
about individuals on systems maintained by federal agencies.
Glossary 29
federated identity A portable identity that can be used across businesses and
domains.
Federated Identity Management (FIM) An arrangement that supports a
single login to provide access to multiple trusted networks. Organizations have
partnerships with other enterprises, which are referred to as trust domains. These
trust domains maintain their own identity management but will also use a third
party that will store user credentials, as part of FIM.
federated identity services Identity services that participate in a federated
structure with other organizations. Each organization that joins the federation
agrees to enforce a common set of policies and standards.
feet of illumination A measurement of lighting.
fetching The process of a CPU getting instructions from memory.
FHSS See Frequency Hopping Spread Spectrum (FHSS).
Fiber Distributed Data Interface (FDDI) A layer 2 protocol that uses a ring
topology and a fiber infrastructure.
fiber optic Cabling that uses a source of light that shoots down an inner glass or
plastic core.
Fibre Channel over Ethernet (FCoE) A protocol that encapsulates Fibre
Channel frames over Ethernet networks, thereby allowing Fibre Channel to use 10
Gigabit Ethernet networks or higher while preserving the Fibre Channel protocol.
Field-Programmable Gate Array (FPGA) A type of programmable logic device
(PLD) that is programmed by blowing fuse connections on the chip or using an
antifuse that makes a connection when a high voltage is applied to the junction.
File Transfer Protocol (FTP) A protocol used to transfer files from one system
to another.
firewall A physical or software device that inspects and controls the type of traffic
allowed.
firmware A type of ROM where a program is stored.
first in, first out (FIFO) Backup rotation scheme where the newest backup is
saved to the oldest media. Although this is the simplest rotation scheme, it does not
protect against data errors.
FIM See Federated Identity Management.
30 Glossary
fuzz testing A dynamic testing tool that provides input to the software to test the
software’s limits and discover flaws. The input provided can be randomly generated
by the tool or specially created to test for known vulnerabilities.
G
gateway A device that performs some sort of translation or acts as a control point
to entry and exit.
GLBA See Gramm-Leach-Bliley Act (GLBA) of 1999.
Global System for Mobile Communications (GSM) A standard for digital
cellular networks.
Graham-Denning model A security model that deals with the delegation and
transfer of rights.
Gramm-Leach-Bliley Act (GLBA) of 1999 A U.S. act that affects all financial
institutions, including banks, loan companies, insurance companies, investment
companies, and credit card providers. It provides guidelines for securing all financial
information and prohibits sharing financial information with third parties.
grandfather/father/son (GFS) Backup rotation scheme where three sets of
backups are defined. Most often these three definitions are daily, weekly, and
monthly. The daily backups are the sons, the weekly backups are the fathers, and the
monthly backups are the grandfathers. Each week, one son advances to the father
set. Each month, one father advances to the grandfather set.
gray-box testing The testing team is provided more information than in black-
box testing, while not as much as in white-box testing. Gray-box testing has the
advantage of being nonintrusive while maintaining the boundary between developer
and tester. This term is used to refer to network security tests as well as application
tests.
graylisting Entities that cannot be identified as whitelist or blacklist items.
The new entity must pass through a series of tests to determine whether it will be
whitelisted or blacklisted.
grid computing The process of harnessing the CPU power of multiple physical
machines to perform a job.
GSM See Global System for Mobile Communications (GSM).
guideline An information security governance component that gives
recommended actions that are much more flexible than standards, thereby providing
allowance for circumstances that can occur.
32 Glossary
H
Harrison-Ruzzo-Ullman model A security model that deals with access rights
and restricts the set of operations that can be performed on an object to a finite set
to ensure integrity.
hash A one-way function that reduces a message to a hash value. If the sender’s
hash value is compared to the receiver’s hash value, message integrity is determined.
If the resultant hash values are different, then the message has been altered in some
way, provided that both the sender and receiver used the same hash function.
hash MAC (HMAC) A keyed-hash MAC that involves a hash function with
symmetric key.
HAVAL A one-way function that produces variable-length hash values, including
128 bits, 160 bits, 192 bits, 224 bits, and 256 bits, and uses 1,024-bit blocks.
HDSL See High-Bit-Data-Rate DSL (HDSL).
Health Care and Education Reconciliation Act of 2010 A U.S. law that affects
healthcare and educational organizations. It increased some of the security measures
that must be taken to protect healthcare information.
Health Insurance Portability and Accountability Act (HIPAA) A U.S. act
that affects all healthcare facilities, health insurance companies, and healthcare
clearinghouses. It provides standards and procedures for storing, using, and
transmitting medical information and healthcare data.
hearsay evidence Evidence that is secondhand, where the witness does not have
direct knowledge of the fact asserted but knows it only from being told by someone.
heat-activated sensor A sensor that operates by detecting temperature changes,
which can either alert when a predefined temperature is met or alert when the rate
of rise is a certain value.
hierarchical database A model in which data is organized into a hierarchy. An
object can have one child (an object that is a subset of the parent object), multiple
children, or no children.
hierarchical storage management (HSM) system A type of backup
management system that provides a continuous online backup by using optical or
tape “jukeboxes.”
high availability A level of availability which ensures that data is always available,
using redundancy and fault tolerance.
High-Bit-Data-Rate DSL (HDSL) A form of DSL that provides T1 speeds.
Glossary 33
I
IaaS See infrastructure as a service (IaaS).
ICMP See Internet Control Message Protocol (ICMP).
IDaaS See Identity as a Service (IDaaS).
IDEA See International Data Encryption Algorithm (IDEA).
IDEAL model Model developed by the Software Engineering Institute to provide
guidance on software development. Its name is an acronym that stands for the five
phases: Initiate, Diagnose, Establish, Act, and Learn.
identification A process in which a user professes an identity to an access control
system.
Identity as a Service (IDaaS) A cloud-based service that provides a set of identity
and access management functions to target systems on customers’ premises and/or
in the cloud.
IGMP See Internet Group Management Protocol (IGMP).
IGP See Interior Gateway Protocol (IGP).
IKE See Internet Key Exchange (IKE).
IMAP See Internet Message Access Protocol (IMAP).
implied addressing A type of memory addressing that refers to registers usually
contained inside the CPU.
incident A series of events that negatively impact an organization’s operations and
security.
incidental computer crime A computer crime that occurs in which the computer
is not the victim of the attack or the attacker.
incremental backup A backup in which all files that have been changed since
the last full or incremental backup are backed up and the archive bit for each file is
cleared.
Incremental model A refinement to the basic Waterfall model, which states that
software should be developed in increments of functional capability.
indirect addressing A type of memory addressing where the address location
that is specified in the program instruction contains the address of the final desired
location.
inference A process that occurs when someone has access to information at one
level that allows them to infer information about another level.
Glossary 35
information assets Recipes, processes, trade secrets, product plans, and any other
type of information that enables the enterprise to maintain competitiveness within
its industry.
information flow model A model that focuses on controlling flows that relate
two versions of the same object.
information security continuous monitoring (ISCM) A program that involves
maintaining ongoing awareness of information security, vulnerabilities, and threats
to support organizational risk management decisions.
information system contingency plan (ISCP) Provides established procedures
for the assessment and recovery of a system following a system disruption.
Information Technology (Reasonable Security Practices and Procedures and
Sensitive Personal Data or Information) Rules 2011 (India) Privacy legislation
introduced in India in April 2011. The legislation was introduced to protect the
privacy of online consumers. It impacts U.S. companies that outsource services to
India.
Information Technology Security Evaluation Criteria (ITSEC) A model that
addresses integrity and availability as well as confidentiality.
Infrared A short-distance wireless process that uses light, in this case infrared
light, rather than radio waves.
infrastructure as a service (IaaS) A cloud computing service that involves the
vendor providing the hardware platform or data center and the company installing
and managing its own operating systems and application systems. The vendor
simply provides access to the data center and maintains that access.
Infrastructure mode A mode in which all transmissions between stations go
through the AP, and no direct communication between stations occurs.
input validation A process whereby input is checked for format and length before
it is used.
intangible assets Assets such as intellectual property, data, and organizational
reputation that are vital and hold value to a company but cannot be touched.
Integrated Services Digital Network (ISDN) Sometimes referred to as digital
dial-up, a communications method that is now only used as a backup connection.
integrity A characteristic provided if you can be assured that the data has not
changed in any way. The tenet of the CIA triad that ensures that data is accurate and
reliable.
36 Glossary
J–K
JAD See Joint Analysis Development (JAD) model.
Java applet A small component created using Java that runs in a web browser. It
is platform independent and creates intermediate code called byte code that is not
processor specific.
Java Database Connectivity (JDBC) An API that makes it possible for Java
applications to communicate with a database.
Java Platform, Enterprise Edition (J2EE) A distributed component model that
relies on the Java programming language. It is a framework used to develop software
that provides APIs for networking services and uses an interprocess communication
process that is based on CORBA.
JDBC See Java Database Connectivity (JDBC).
JIT See Just In Time.
job rotation A security measure that ensures that more than one person fulfills the
job tasks of a single position within an organization. Refers to training of multiple
users to perform the duties of a position to help prevent fraud by any individual
employee.
Glossary 39
Joint Analysis Development (JAD) model Also called the Joint Application
Development (JAD), a development model that uses a team approach to both
agree on requirements and to resolve differences. The theory is that by bringing all
parties together at all stages, a more satisfying product will emerge at the end of the
process.
Just In Time (JIT) An access method that enables organizations to grant access
to applications or systems for predetermined periods of time, on an as-needed
basis. With JIT provisioning, if a user does not already have an account in a target
application, the IAM system creates the account for a user on the fly when the user
first accesses the application.
Kennedy-Kassebaum Act See Health Insurance Portability and Accountability
Act (HIPAA).
Kerberos An authentication protocol that uses a client/server model developed by
MIT’s Project Athena. It is the default authentication model in the recent editions
of Windows Server and is also used in Apple, Sun, and Linux operating systems.
kernel proxy firewall An example of a fifth-generation firewall that inspects a
packet at every layer of the OSI model but does not introduce the performance hit
that an Application layer firewall will because it does this at the kernel layer.
key A parameter that controls the transformation of plaintext into ciphertext or
vice versa. Determining the original plaintext data without the key is impossible.
Also referred to as a cryptovariable.
key clustering The process that occurs when different encryption keys generate
the same ciphertext from the same plaintext message.
keylogger Malware that records a user’s keystrokes. After these keystrokes are
sent back to the hacker, the hacker can in turn use those recorded keystrokes to the
user’s credentials into a website.
keyspace All the possible key values when using a particular algorithm or other
security measure. A 40-bit key would have 240 possible values, whereas a 128-bit
key would have 2,128 possible values.
knowledge factors Factors that are something a person knows.
known plaintext attack An attack that occurs when an attacker uses the plaintext
and ciphertext versions of a message to discover the key used.
L
L2TP See Layer 2 Tunneling Protocol (L2TP).
Label Distribution Protocol (LDP) Allows routers capable of Multiprotocol
Label Switching (MPLS) to exchange label mapping information.
40 Glossary
laminated glass Two sheets of glass with a plastic film between that makes it
more difficult to break.
LAN See local-area network (LAN).
Layer 2 Tunneling Protocol (L2TP) A protocol that operates at layer 2 of the
OSI model. It can use various authentication mechanisms like PPTP can, but it does
not provide any encryption. It is typically used with IPsec, a very strong encryption
mechanism.
layer 3 switch A switch that has routing functionality also built in.
layer 4 switch A switch that provides additional routing above layer 3 by using
the port numbers found in the Transport layer header to make routing decisions.
layered defense model A model in which reliance is not based on any single
physical security concept but on the use of multiple approaches that support one
another.
LDAP See Lightweight Directory Access Protocol (LDAP).
least privilege A security principle which requires that a user or process is given
only the minimum access privilege needed to perform a particular task. Also known
as need to know.
liability The status of being legally responsible to another entity because of your
actions or negligence.
Lightweight Directory Access Protocol (LDAP) A directory access protocol
(DAP) that is based on X.500’s DAP and is simpler than X.500.
link state protocol A routing protocol that only shares network changes (link
outages and recoveries) with neighbors, thereby greatly reducing the amount of
traffic generated. This type of protocol also uses a sophisticated metric that is based
on many factors, such as the bandwidth of each link on the path and the congestion
on each link.
Lipner model A security model that shares characteristics with the Clark-Wilson
model in that it separates objects into data and programs.
local-area network (LAN) A group of systems that are connected with a fast
network connection. For purposes of this discussion, that is any connection over 10
Mbps and usually in a single location.
location factors Factors for authenticating a user based on the location from
which the user is authenticating.
Glossary 41
M
MAC See mandatory access control (MAC).
MAC address See media access control (MAC) address.
machine languages Languages that deliver instructions directly to the processor.
macro viruses Viruses that infect programs written in Word, Basic, Visual Basic,
or VBScript that are used to automate functions. These viruses infect Microsoft
Office files and are easy to create because the underlying language is simple and
intuitive to apply. These viruses are especially dangerous in that they infect the
operating system itself. They also can be transported between different operating
systems as the languages are platform independent.
maintenance hook A set of instructions built into code that allows for one who
knows about the “back door” to use the instructions to connect to view and edit the
code without using the normal access controls.
malware Any software that harms a computer, deletes data, or takes actions the
user did not authorize.
MAN See metropolitan area network (MAN).
management control See administrative control.
mandatory access control (MAC) An access control model in which subject
authorization is based on security labels.
42 Glossary
misuse case testing A type of testing that tests an application to ensure that the
application can handle invalid input or unexpected behavior. Also known as negative
testing.
mixed law A type of law that combines two or more of the other law types. The
most often mixed law uses civil law and common law.
mobile code A code type that can be transferred across a network and then
executed on a remote system or device.
Mobile IPv6 (MIPv6) An enhanced protocol supporting roaming for a mobile
node, so that it can move from one network to another without losing IP-layer
connectivity (as defined in RFC 3775).
mobile malware Malicious programs that are developed for use on mobile
devices, such as smartphones and tablets.
Modbus A master/slave industrial control system protocol that uses port 50.
mono-alphabetic substation cipher A cipher that uses only one alphabet.
motive Why a crime was committed and who committed the crime. MOM stands
for motive, opportunity, and means.
movable lighting Lighting that can be repositioned as needed.
MPLS See Multiprotocol Label Switching (MPLS).
MTBF See mean time between failure (MTBF).
MTD See maximum tolerable downtime.
MTTR See mean time to repair (MTTR).
MU MIMO See multi-user multiple input, multiple output (MU MIMO).
Multi-access Edge Computing (MEC) A networking protocol whereby mobile
users can establish direct connections, using available network infrastructure, at
the edge of the network, rather than being routed through the mobile network
operator’s core network.
multicast A signal received by all others in a multicast group. It is considered
one-to-many.
multifactor authentication An authentication type that includes two or more
types of authentication factors. Adding more factor types increases the security of
authentication.
multilevel lattice model A model developed mainly to deal with confidentiality
issues that focuses mainly on information flow.
44 Glossary
multi-mode Fiber optic cable that uses several beams of light at the same time
and uses LEDs as a light source.
multipartite virus A virus that can infect both program files and boot sectors.
multiple input, multiple output (MIMO) Using multiple antennas, which allow
for up to four spatial streams at a time.
multiplexer A physical (layer 1) device that combines several input information
signals into one output signal, which carries several communication channels, by
means of some multiplex technique.
Multiprotocol Label Switching (MPLS) A protocol that routes data from one
node to the next based on short-path labels rather than long network addresses,
avoiding complex lookups in a routing table. It includes the ability to control how
and where traffic is routed, delivers data transport services across the same network,
and improves network resiliency through MPLS Fast Reroute.
multitasking The process of carrying out more than one task at a time.
multithreading A feature that allows multiple tasks to be performed within a
single process.
multi-user multiple input, multiple output (MU MIMO) A set of MIMO
technologies for wireless communication in which users or wireless access points,
each with one or more antennas, communicate with each other.
N
NAS See network-attached storage (NAS) or network access server (NAS).
NAT See network address translation (NAT).
natural access control A concept that applies to the entrances of the facility and
encompasses the placement of the doors, lights, fences, and even landscaping. It aims
to satisfy security goals in the least obtrusive and most aesthetically appealing manner.
natural languages Languages whose goal is to create software that can solve
problems on its own rather than require a programmer to create code to deal
with the problem. Although it’s not fully realized, it is a goal worth pursuing using
knowledge-based processing and artificial intelligence.
natural surveillance The use of physical environmental features to promote
visibility of all areas and thus discourage crime in those areas. The idea is to
encourage the flow of people such that the largest possible percentage of the
building is always populated, because people in an area discourage crime.
natural territorials reinforcement Creating a feeling of community in an area by
extending the sense of ownership to the employees.
Glossary 45
natural threats Physical threats that must be addressed and mitigated that are
caused by the forces of nature.
Near Field Communication (NFC) A set of communication protocols that
allow two electronic devices, one of which is usually a mobile device, to establish
communication by bringing them within 2 inches of each other.
need to know The concept that users should only be given access to resources
required to do their job. It defines what the actual minimum privileges for each job
or business function are.
negative testing See misuse case testing.
network access control (NAC) A service that goes beyond authentication of the
user and includes an examination of the state of the computer the user is introducing
to the network when making a remote access or VPN connection to the network.
network access server (NAS) A device that controls access to a network.
network address translation (NAT) A service that changes a private IP address
to a public address that is routable on the Internet. When the response is returned
from the web, the NAT service receives it and translates the address back to the
original private IP address and sends it back to the originator.
network-attached storage (NAS) A form of network storage that uses the
existing LAN network for access using file access protocols such as NFS or SMB.
network discovery scan Examines a range of IP addresses to determine which
ports are open. This type of scan only shows a list of systems on the network and the
ports in use on the network.
Network layer (layer 3) The OSI reference model layer in which information
required to route a packet is added in the form of a source and destination logical
address.
network node intrusion detection system (NNIDS) A system used to monitor
traffic between a network and a host. One example of an NNIDS would be used for
monitoring traffic connected to a VPN.
network vulnerability scan Probes a targeted system or network to identify
vulnerabilities. It is a more complex scan of the network than a network discovery
scan.
NIST SP 800-92 A guide to computer security log management.
NIST SP 800-137 A guide to information security continuous monitoring
(ISCM) for federal information systems and organizations.
NNIDS See network node intrusion detection system.
46 Glossary
noise Interference that can be introduced to the cable that causes problems.
nonce A random number that is used only once and acts as a placeholder variable
in functions.
noninterference model A model less concerned with the flow of information
than with a subject’s knowledge of the state of the system at a point in time; it
concentrates on preventing the actions that take place at one level from altering the
state presented to another level.
non-repudiation The assurance that a user cannot deny an action.
nonvolatile memory Long-term persistent storage that remains even when the
device shuts down.
null cipher See concealment cipher.
NYS DFS Rule 500 Legislation known as the New York State (NYS)
Department of Financial Services (DFS) Section 500 announced in 2017, in an
effort to ensure that the financial services industry creates an effective cybersecurity
plan to protect its networks and customers. With fines of up to $250,000 or 1
percent of banking assets, banks and other financial institutions in the financial
capital of the world have taken notice, and taken action, to ensure compliance. For
a financial institution to comply, it needs to ensure that it has developed effective
planning and policies.
O
OAuth See Open Authorization.
object A resource that a user or process wants to access.
object linking and embedding (OLE) A method for sharing objects on a local
computer that uses COM as its foundation.
object linking and embedding database (OLE DB) A replacement for ODBC
that extends the functionality of ODBC to non-relational databases.
object-oriented database (OODB) A model that has the ability to handle a
variety of data types and is more dynamic than a relational database. OODB systems
are useful in storing and manipulating complex data, such as images and graphics.
object-oriented programming (OOP) A type of programming in which objects
are organized in a hierarchy in classes with characteristics called attributes attached
to each. OOP emphasizes the employment of objects and methods rather than types
or transformations as in other software approaches.
object-relational database A model that is a marriage of object-oriented and
relational technologies, combining the attributes of both.
Glossary 47
open system A system that conforms to industry standards and can work with
systems that support the same standard.
Open Systems Interconnection (OSI) model A model created in the 1980s by
the International Organization for Standardization (ISO) as a part of its mission to
create a protocol set to be used as a standard for all vendors.
Open Web Application Security Project (OWASP) An open-source application
security project. This group creates guidelines, testing procedures, and tools to assist
with web security. A group that monitors attacks, specifically web attacks. OWASP
maintains a list of top 10 attacks on an ongoing basis.
OpenID Connect (OIDC) An identity layer built on top of the OAuth 2.0
framework. It allows third-party applications to verify the identity of the end user
and to obtain basic user profile information.
operating system fingerprinting The process of using some method to
determine the operating system running on a host or a server.
operations investigation An investigation into an event or incident that does not
result in any criminal, civil, or regulatory issue. Also referred to as administrative
investigations. In most cases, this type of investigation is completed to determine
the root cause of an incident so that steps can be taken to prevent it from occurring
again in the future.
operations security The activities that support continual maintenance of the
security of a system on a daily basis.
opinion evidence Evidence that is based on what the witness thinks, feels, or
infers regarding the facts.
opportunity Where and when a crime occurred.
Orange Book A collection of criteria based on the Bell-LaPadula model that is
used to grade or rate the security offered by a computer system product.
organizational security policy The highest-level security policy adopted by an
organization that outlines security goals.
Orthogonal Frequency Division Multiplexing (OFDM) A more advanced
technique of modulation in which a large number of closely spaced orthogonal
subcarrier signals are used to carry the data on several parallel data streams. It is
used in 802.11a, 802.11ac, and 802.11g and makes speed of up to 54 Mbps possible.
OSI See Open Systems Interconnection (OSI) model.
OSPF See Open Shortest Path First (OSPF).
Glossary 49
Output Feedback (OFB) A DES mode that works with 8-bit (or smaller) blocks
that uses a combination of stream ciphering and block ciphering. However, OFB
uses the previous keystream with the key to create the next keystream.
OWASP See Open Web Application Security Project (OWASP).
ownership factors Factors that are something a person possesses, such as a
password.
P
PaaS See platform as a service (PaaS).
packet filtering firewall A firewall that only inspects the header of a packet for
allowed IP addresses or port numbers.
packet-switching network A network that groups all transmitted data blocks,
called packets. Each packet is treated individually with respect to routing.
PAP See Password Authentication Protocol (PAP).
parallel test A test that involves bringing a recovery site to a state of operational
readiness but maintaining operations at the primary site.
parasitic virus A virus that attaches itself to a file, usually an executable file, and
then delivers the payload when the program is used.
partial-knowledge test A test in which the testing team is provided with public
knowledge regarding the organization’s network. Boundaries might be set for this
type of test.
passive infrared (PIR) system A detection system that operates by identifying
changes in heat waves in an area.
passive vulnerability scanner (PVS) Monitors network traffic at the packet layer
to determine topology, services, and vulnerabilities.
Password Authentication Protocol (PAP) A protocol that provides
authentication but in which credentials are sent in cleartext and can be read with a
sniffer.
password masking A measure that prevents a password from being learned
through shoulder surfing by obscuring the characters entered except for the last one.
PAT See port address translation (PAT).
patch panel A panel that operates at the Physical layer of the OSI model and
simply functions as a central termination point for all the cables running through
the walls from wall outlets, which in turn are connected to computers with cables.
50 Glossary
Presentation layer (layer 6) The OSI reference model layer responsible for the
manner in which the data from the Application layer is represented (or presented) to
the Application layer on the destination device. If any translation between formats is
required, this layer takes care of it.
preventive control A security control that prevents an attack from occurring.
PRI ISDN See Primary Rate ISDN (PRI).
Primary Rate ISDN (PRI) A solution that provides up to 23 B channels and a
D channel for a total of 1.544 Mbps.
private branch exchange (PBX) A private telephone switch that resides on a
customer’s premises. It has a direct connection to the telecommunication provider’s
switch and performs call routing within the internal phone system.
private cloud A cloud deployment solution owned and managed by one company
solely for that company’s use.
private IP addresses Three ranges of IPv4 addresses set aside to be used only
within private networks and not on the Internet.
private key encryption See symmetric encryption.
privilege creep See privilege escalation.
privilege escalation A situation in which a user account has accumulated
permissions over time, thereby resulting in an account with unnecessary elevated
permissions and privileges.
procedure An information security governance component that includes all the
detailed actions that personnel are required to follow.
process A set of actions, steps, or threads that are part of the same larger piece of
work done for a specific application or to achieve a particular end.
protected health information (PHI) Any individually identifiable health
information.
prototyping Using a sample of code to explore a specific approach to solving a
problem before investing extensive time and money in the approach.
provisioning The act of creating an access account.
provisioning life cycle A formal process for creating, changing, and removing
users.
proximity authentication device A programmable card used to deliver an access
code to the device either by swiping the card or in some cases just being in the
vicinity of the reader.
54 Glossary
proxy firewall A firewall that creates a web connection between systems on their
behalf typically lets the systems allow and disallow traffic on a more granular basis.
Proxy firewalls actually stand between each connection from the outside to the
inside and make the connection on behalf of the endpoints.
PSTN See public switched telephone network (PSTN).
public cloud A cloud deployment solution provided by a third party that offloads
the details to that third party but gives up some control and can introduce security
issues.
public key encryption See asymmetric encryption.
public switched telephone network (PSTN) Also referred to as the Plain Old
Telephone Service (POTS), the circuit-switched network that has been used for
analog phone service for years and is now mostly a digital operation.
Q
QoS See quality of service (QoS).
qualitative risk analysis A method of analyzing risk whereby intuition,
experience, and best practice techniques are used to determine risk.
quality of service (QoS) A technology that manages network resources to ensure
a predefined level of service. It assigns traffic priorities to the different types of
traffic on a network.
quantitative risk analysis A risk analysis method that assigns monetary and
numeric values to all facets of the risk analysis process, including asset value, threat
frequency, vulnerability severity, impact, safeguard costs, and so on.
quartz lamp A lamp consisting of an ultraviolet light source, such as mercury
vapor, contained in a fused-silica bulb that transmits ultraviolet light with little
absorption.
R
RA See registration authority (RA).
RAD See Rapid Application Development (RAD).
radio frequency interference (RFI) Interference from radio sources in the area.
RADIUS See Remote Access Dial-In User Service (RADIUS).
RAID 0 Also called disk striping, a method that writes the data across multiple
drives but while it improves performance, it does not provide fault tolerance.
Glossary 55
RAID 1 Also called disk mirroring, a method that uses two disks and writes a
copy of the data to both disks, providing fault tolerance in the case of a single drive
failure.
RAID 2 A system in which the data is striped across all drives at the bit level and
uses a hamming code for error detection. Hamming codes can detect up to two-bit
errors or correct one-bit errors without detection of uncorrected errors.
RAID 3 A method that requires at least three drives. The data is written across all
drives like striping and then parity information is written to a single dedicated drive;
the parity information is used to regenerate the data in the case of a single drive
failure.
RAID 5 A method that requires at least three drives. The data is written across
all drives like striping and then parity information is spread across all drives as well.
The parity information is used to regenerate the data in the case of a single drive
failure.
RAID 7 While not a standard but a proprietary implementation, a system that
incorporates the same principles as RAID 5 but enables the drive array to continue
to operate if any disk or any path to any disk fails. The multiple disks in the array
operate as a single virtual disk.
RAID 10 Also called disk striping with mirroring, a method that requires at least
four drives and is a combination of RAID 0 and RAID 1. First, a RAID 1 volume
is created by mirroring two drives together. Then a RAID 0 stripe set is created on
each mirrored pair.
rainbow table attack An attack in which comparisons are used against known
hash values. However, in a rainbow attack, a rainbow table is used that contains the
cryptographic hashes of passwords.
ransomware Malware that prevents or limits user access to their system or device.
Usually it forces victims to pay the ransom for the return of system access.
Rapid Application Development (RAD) A development model in which less
time is spent up front on design, while emphasis is placed on rapidly producing
prototypes, with the assumption that crucial knowledge can be gained only through
trial and error.
RBAC See role-based access control (RBAC).
RC4 A stream cipher that uses a variable key size of 40 to 2,048 bits and up to
256 rounds of transformation.
RC5 A block cipher that uses a key size of up to 2,048 bits and up to 255 rounds of
transformation. Block sizes supported are 32, 64, or 128 bits.
56 Glossary
RC6 A block cipher based on RC5 that uses the same key size, rounds, and
block size.
RC7 A block cipher based on RC6 that uses the same key size and rounds but has
a block size of 256 bits. In addition, it uses six working registers instead of four. As a
result, it is much faster than RC6.
RCA See root cause analysis.
read-through test A test that involves the teams that are part of any recovery
plan. These teams read through the plan that has been developed and attempt to
identify any inaccuracies or omissions in the plan.
real user monitoring (RUM) A type of passive monitoring that captures and
analyzes every transaction of every application or website user.
reciprocal agreement An agreement between two organizations that have similar
technological needs and infrastructures.
record A collection of related data items.
recovery control A security control that recovers a system or device after an
attack has occurred.
recovery point objective The point in time to which the disrupted resource or
function must be returned.
recovery time objective The shortest time period after a disaster or disruptive
event within which a resource or function must be restored to avoid unacceptable
consequences.
Red Book A collection of criteria based on the Bell-LaPadula model that
addresses network security.
Red Team The team composed of offensive security professionals who attempt
to breach an organization’s environment—primarily its network’s defenses—to
thwart the efforts of a blue team, with the latter being responsible for defending the
environment and its network security. The Red Team simulates the actions of an
adversary, such as a computer hacker. A Red Team can be the existing employees
for an organization or be external consultants.
redundancy Refers to providing multiple instances of either a physical or logical
component such that a second component is available if the first fails.
redundant site A site that is configured identically to the primary site.
reference monitor A system component that enforces access controls on an
object.
Glossary 57
referential integrity A characteristic which requires that for any foreign key
attribute, the referenced relation must have a tuple with the same value for its
primary key.
registration authority The entity in a PKI that verifies the requestor’s identity
and registers the requestor.
regulatory investigation An investigation that occurs when a regulatory body
investigates an organization for a regulatory infraction.
regulatory law See administrative law.
regulatory security policy A security policy that addresses specific industry
regulations, including mandatory standards.
relation A fundamental entity in a relational database in the form of a table.
relational database A database that uses attributes (columns) and tuples (rows) to
organize the data in two-dimensional tables.
reliability The ability of a function or system to consistently perform according to
specifications.
religious law A type of law based on religious beliefs.
remanence Any data left after the media has been erased.
remote access Allows users to access an organization’s resources from a remote
connection. These remote connections can be direct dial-in connections but more
commonly use the Internet as the network over which the data is transmitted.
Remote Access Dial-In User Service (RADIUS) A remote authentication
standard defined in RFC 2138. RADIUS is designed to provide a framework that
includes three components: supplicant, authenticator, and authenticating server.
residual risk Risk that is left over after safeguards have been implemented.
resource provisioning The process in security operations which ensures that the
organization deploys only the assets that it currently needs.
reverse ARP (RARP) Resolves MAC addresses to IP addresses.
revocation The process whereby a certificate, access account, group account, or
role is revoked or terminated.
RFI See radio frequency interference (RFI).
Rijndael algorithm An algorithm that uses three block sizes of 128, 192, and
256 bits. A 128-bit key with a 128-bit block size undergoes 10 transformation
rounds. A 192-bit key with a 192-bit block size undergoes 12 transformation rounds.
Finally, a 256-bit key with a 256-bit block size undergoes 14 transformation rounds.
58 Glossary
ring A physical topology in which the devices are daisy-chained one to another in
a circle or ring.
RIP See Routing Information Protocol (RIP).
RIPEMD-160 A message digest algorithm that produces a 160-bit hash value
after performing 160 rounds of computations on 512-bit blocks.
risk The probability that a threat agent will exploit a vulnerability and the impact
of the probability.
risk acceptance A method of handling risk that involves understanding and
accepting the level of risk as well as the cost of damages that can occur.
risk avoidance A method of handling risk that involves terminating the activity
that causes a risk or choosing an alternative that is not as risky.
risk-based access control An access control method that uses risk probability to
make access decisions. It performs a risk analysis to estimate the risk value related
to each access request. The estimated risk value is then compared against access
policies to determine the access decision.
risk management The process that occurs when organizations identify, measure,
and control organizational risks.
risk mitigation A method of handling risk that involves defining the acceptable
risk level the organization can tolerate and reducing the risk to that level.
risk transfer A method of handling risk that involves passing the risk on to a third
party.
role-based access control (RBAC) An access control model in which each
subject is assigned to one or more roles.
root cause analysis (RCA) Analysis performed to determine the cause of an
incident in an effort to prevent a similar incident from occurring again. Often
an incident responder will complete a root cause analysis form, which
documents the incident that occurred, why the incident occurred, and provides
recommendations to prevent a reoccurrence, such as a change in policy, employee
retraining, or even disciplinary action.
router A device that uses a routing table to determine which direction to send
traffic destined for a particular network.
Routing Information Protocol (RIP) A standards-based distance vector protocol
that has two versions, RIPv1 and RIPv2. Both use hop count as a metric.
row A row in a table.
RPO See recovery point objective.
Glossary 59
S
SaaS See software as a service (SaaS).
safeguard See countermeasure.
salting Randomly adding data to a one-way function that “hashes” a password or
passphrase to defend against dictionary attacks versus a list of password hashes and
against precomputed rainbow table attacks.
SAML See Security Assertion Markup Language (SAML).
SAN See storage area network (SAN).
sandboxing A software virtualization technique that allows applications and
processes to run in an isolated virtual environment.
Sarbanes-Oxley (SOX) Act A U.S. act that controls the accounting methods
and financial reporting for the organizations and stipulates penalties and even jail
time for executive officers and affects any organization that is publicly traded in the
United States.
schema A description of a relational database.
screened host A firewall that is between the final router and the internal network.
screened subnet Two firewalls used to inspect traffic before it can enter the
internal network.
SDN See software-defined networking (SDN).
search The act of pursuing items or information.
secondary evidence Evidence that has been reproduced from an original or
substituted for an original item.
secondary memory Magnetic, optical, or flash-based media or other storage
devices that contain data that must first be read by the operating system and stored
into memory.
secret key encryption See symmetric encryption.
60 Glossary
single-mode Fiber optic that uses a single beam of light provided by a laser as a
light source.
single sign-on (SSO) A system in which a user enters login credentials once and
can then access all resources in the network.
SIP See Session Initiation Protocol (SIP).
Skipjack A block-cipher, symmetric algorithm developed by the U.S. NSA that
uses an 80-bit key to encrypt 64-bit blocks. It is used in the Clipper chip.
SLA See service-level agreement (SLA).
slack space analysis Analysis of the slack (marked as empty or reusable) space on
a drive to see whether any old (marked for deletion) data can be retrieved.
SLIP See Serial Line Interface Protocol (SLIP).
SMDS See Switched Multimegabit Data Service (SMDS).
smoke-activated sensor A sensor that operates using a photoelectric device to
detect variations in light caused by smoke particles.
SMTP See Simple Mail Transfer Protocol (SMTP).
smurf attack An attack in which an attacker sends a large amount of UDP echo
traffic to an IP broadcast address, all of it having a fake source address, which will, of
course, be the target system.
sniffer attack An attack in which a sniffer is used to capture an unencrypted or
plaintext password.
SNMP See Simple Network Management Protocol (SNMP).
SOA See service-oriented architecture (SOA).
SOCKS firewall An example of a circuit-level firewall.
sodium vapor A lighting system that uses sodium in an excited state to produce
light.
software as a service (SaaS) A cloud computing service that involves the vendor
providing the entire solution. They might provide you with an email system, for
example, whereby they host and manage everything for you.
software-defined networking (SDN) A technology that accelerates software
deployment and delivery, thereby reducing IT costs through policy-enabled
workflow automation. It enables cloud architectures by delivering automated,
on-demand application delivery and mobility at scale.
Glossary 63
stateful NAT (SNAT) Implements two or more NAT devices to work together
as a translation group. One member provides network translation of IP address
information. The other member uses that information to create duplicate translation
table entries. It maintains a table about the communication sessions between
internal and external systems.
Static Application Security Testing (SAST) Also referred to as white-box
testing; the analysis of code at rest. This type of security testing goes through the
code line-by-line to identify security vulnerabilities.
static NAT Maps an internal private IP address to a specific external public IP
address. This is a one-to-one mapping.
static testing Analyzes software security without actually running the software.
This is usually provided by reviewing the source code or compiled application.
stealth virus A virus that hides the modifications that it is making to the system to
help avoid detection.
steganography The process of hiding a message inside another object, such as a
picture or document.
steganography analysis Analysis of the files on a drive to see whether the files
have been altered or to discover the encryption used on the files.
storage area network (SAN) A network comprising high-capacity storage devices
that are connected by a high-speed private (separate from the LAN) network using
storage-specific switches.
stream-based cipher A cipher that performs encryption on a bit-by-bit basis and
uses keystream generators.
structured walk-through test A test that involves representatives of each
department or functional area thoroughly reviewing the BCP’s accuracy.
subject The user or process requesting access.
substitution The process of exchanging one byte in a message for another.
substitution cipher A cipher that uses a key to substitute characters or character
blocks with different characters or character blocks.
superscalar A computer architecture characterized by a processor that enables
concurrent execution of multiple instructions in the same pipeline stage.
supervisor mode A mode used when a computer system processes input/output
instructions.
supplicant The component in a RADIUS environment seeking authentication.
Glossary 65
T
table-top exercise An informal brainstorming BCP session that encourages
participation from business leaders and other key employees.
TACACS+ See Terminal Access Controller Access-Control System Plus
(TACACS+).
tactical plans (or goals) Plans that achieve the goals of the strategic plan and are
shorter in length (6–18 months).
tangible assets Any assets that you can physically touch, including computers,
facilities, supplies, and personnel.
target test A test in which both the testing team and the organization’s security
team are given maximum information about the network and the type of test that
will occur. This is the easiest test to complete but does not provide a full picture of
the organization’s security.
T-carrier A dedicated line to which the subscriber has private access and does not
share with another customer.
TCB See Trusted Computer Base (TCB).
TCP three-way handshake A process that involves creating a state of connection
between the two hosts before any data is transferred.
TCP/IP A four-layer model that focuses on TCP/IP.
TCSEC See Trusted Computer System Evaluation Criteria (TCSEC).
TDM See Time Division Multiplexing (TDM).
teardrop A process in which a hacker sends malformed fragments of packets that,
when reassembled by the receiver, cause the receiver to crash or become unstable.
technological disasters Disasters that occur when a device fails.
Telnet An unsecure remote access protocol used to connect to a device for the
purpose of executing commands on the device.
tempered glass Glass that is heated to give it extra strength.
Glossary 67
U
UBA See user behavior analytics.
UEBA See user and entity behavior analytics.
unicast A transmission from a single system to another single system. It is
considered one-to-one.
unified threat management (UTM) A security appliance that provides multiple
layers of security and its functionality includes content filtering, web filtering, and
antivirus. UTM devices are marketed as network security appliances, which can be
a network hardware appliance, virtual appliance or cloud service. Unified threat
management can include intrusion detection and intrusion prevention technologies.
uninterruptible power supply (UPS) A device that goes between the wall outlet
and an electronic device and uses a battery to provide power if the source from the
wall is lost.
United States Federal Sentencing Guidelines of 1991 A U.S. act that
affects individuals and organizations convicted of felonies and serious (Class A)
misdemeanors.
Uniting and Strengthening America by Providing Appropriate Tools Required
to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001 A U.S.
law that affects law enforcement and intelligence agencies in the United States.
Its purpose is to enhance the investigatory tools that law enforcement can use,
including email communications, telephone records, Internet communications,
medical records, and financial records.
UPS See uninterruptible power supply (UPS).
URL hiding An attack that takes advantage of the ability to embed URLs in web
pages and email.
USA Freedom Act of 2015 This U.S. Congressional act preserved and modified
many tenets of the USA PATRIOT Act, including the bulk collection of personal
information related to U.S. citizens under certain authorities.
USA PATRIOT Act See Uniting and Strengthening America by Providing
Appropriate Tools Required to Intercept and Obstruct Terrorism (USA
PATRIOT) Act of 2001.
user behavior analytics (UBA) See user and entity behavior analytics.
user and entity behavior analytics (UEBA) The process of gathering data
regarding daily user network events so that normal conduct by users is understood.
UTM See unified threat management.
Glossary 71
V
VDSL See Very High Bit-Rate DSL (VDSL).
verification The process whereby an application verifies that a certificate is valid.
Very High Bit-Rate DSL (VDSL) A form of DSL capable of supporting HDTV
and VoIP.
very-high-level languages A fourth generation of languages that focuses on
abstract algorithms that hide some of the complexity from the programmer. This
frees the programmer to focus on the real-world problems she is trying to solve
rather than the details that go on behind the scenes.
view The representation of the system from the perspective of a stakeholder or a
set of stakeholders. Security is enforced through the use of views, which is the set of
data available to a given user.
virtual firewall Software that has been specifically written to provide a security
firewall in the virtual environment.
virtual LAN (VLAN) A logical subdivision of a switch that segregates ports
from one another as if they were in different LANs. VLANs can also span multiple
switches, meaning that devices connected to switches in different parts of a network
can be placed in the same VLAN regardless of physical location.
virtual private network (VPN) A network that uses an untrusted carrier network
but provides protection of information through strong authentication protocols and
encryption mechanisms.
Virtual Router Redundancy Protocol (VRRP) A protocol that is used to
provide multiple gateways to clients for fault tolerance in the case of a router going
down.
virtual storage area network (VSAN) A software-defined storage method that
allows pooling of storage capabilities and instant and automatic provisioning of
virtual machine storage.
virus A self-replicating program that infects software. It uses a host application to
reproduce and deliver its payload and typically attaches itself to a file.
vishing A type of phishing that uses a phone system or VoIP technologies. The
user initially receives a call, text, or email saying to call a specific number and
provide personal information such as name, birth date, Social Security number, and
credit card information.
VLAN See virtual LAN (VLAN).
Vo5G See Voice over 5G.
72 Glossary
W
WAN See wide area network (WAN).
war chalking A practice that is typically used to accompany war driving. After the
war driver has located a WLAN, he indicates in chalk on the sidewalk the SSID and
the types of security used on the network.
war driving Driving around and locating WLANs with a laptop and a high-power
antenna.
Glossary 73
warded lock A lock with a spring-loaded bolt that has a notch in it. The lock has
wards, or metal projections, inside the lock with which the key matches to enable
opening the lock.
warm site A leased facility that contains electrical and communications wiring,
full utilities, and networking equipment.
WASC See Web Application Security Consortium (WASC).
Waterfall A development model that breaks the process up into distinct phases.
While somewhat of a rigid approach, it sees the process as a sequential series of
steps that are followed without going back to earlier steps. This approach is called
incremental development.
WAVE See wireless access in vehicle environments.
wave motion detector A device that generates a wave pattern in the area and
detects any motion that disturbs the accepted wave pattern. When the pattern is
disturbed, an alarm sounds.
Web Application Security Consortium (WASC) An organization that provides
best practices for web-based applications along with a variety of resources, tools, and
information that organizations can make use of in developing web applications.
WEP See Wired Equivalent Privacy (WEP).
wet pipe extinguisher An extinguisher that uses water contained in pipes to
extinguish fire. In some areas, the water might freeze and burst the pipes, causing
damage. Such a system is not recommended for rooms where equipment would be
damaged by the water.
whaling A practice that involves targeting a single person who is someone of
significance or importance, such as a CEO, CFO, CSO, COO, or CTO.
white-box testing The testing team goes into the testing process with a deep
understanding of the application or system. Using this knowledge, the team builds
test cases to exercise each path, input field, and processing routine. This term is used
to refer to network security tests as well as application tests.
whitelisting Configuring acceptable email addresses, Internet addresses, websites,
applications, or some other identifiers as good senders or as allowed.
wide area network (WAN) A network used to connect LANs together (including
MANs).
Wi-Fi 4 Also called 802.11n; a standard that uses several newer concepts to
achieve up to 650 Mbps. It does this using channels that are 40 MHz wide, using
multiple antennas that allow for up to four spatial streams at a time (a feature called
multiple input, multiple output [MIMO]).
74 Glossary
Wi-Fi 5 Also called 802.11ac; a standard, like the 802.11a standard, that operates
on the 5 GHz frequency. The most important feature of this standard is its
multistation WLAN throughput of at least 1 Gbps and single-link throughput of
500 Mbps. It provides this by implementing multi-user multiple input, multiple
output (MU MIMO) technologies in which the wireless access points have multiple
antennas.
Wi-Fi 6 A standard developed by the Wi-Fi Alliance. With so many Internet-
enabled devices today, this standard helps to solve the need to ensure that Wi-Fi can
handle all of these additional devices. It is not just the addition of more devices that
needs to be considered but also the increase in data with advances in technology,
including 4K video.
Wi-Fi 7 A standard that will have throughput greater than 30 Gbps and have low
latency. This protocol will support Extremely High Throughput (EHT) devices,
while targeting newer technologies, such as augmented reality (AR), virtual reality,
and cloud computing. Wi-Fi 7 will work on three frequency bands—2.4 GHz,
5 GHz, and 6 GHz—to take advantage of an additional 1200 MHz of spectrum, in
countries where it is allowed.
Wi-Fi Protected Access (WPA) A security measure created to address the
widespread concern with the inadequacy of WEP.
Wired Equivalent Privacy (WEP) The first security measure used with 802.11.
It was specified as the algorithm in the original specification. It can be used to
both authenticate a device and encrypt the information between the AP and the
device. However, WEP is considered insecure today, and the use of WPA2 is
recommended.
wireless access in vehicle environments (WAVE) An architecture and
technologies that support device communication in vehicle environments.
wireless local-area network (WLAN) Allows devices to connect wirelessly to
each other via a wireless access point (WAP). Multiple WAPs can work together to
extend the range of the WLAN.
work factor (encryption) The amount of time and resources needed to break
encryption.
worm A type of malware that can spread without assistance from the user.
WPA See Wi-Fi Protected Access (WPA).
WPA2 An improvement over WPA that uses CCMP, based on Advanced
Encryption Standard (AES) rather than TKIP.
Glossary 75
X–Y–Z
X.25 A protocol somewhat like Frame Relay in that traffic moves through a
packet-switching network. Uses mechanisms for reliability that are no longer
required in today’s phone lines and that create overhead.
XML See Extensible Markup Language (XML).
Zachman Framework An enterprise architecture framework that uses a two-
dimensional classification system based on six communication questions (What,
Where, When, Why, Who, and How) that intersect with different perspectives
(Executive, Business Management, Architect, Engineer, Technician, and
Enterprise).
zero-knowledge test A test in which the testing team is provided with no
knowledge regarding the organization’s network. The testing team can use any
means available to obtain information about the organization’s network. This is also
referred to as closed- or black-box testing.
CISSP
Cert Guide, Fourth Edition
ISBN: 978-0-13-750747-4
See inside uuu
for your Pearson Test Prep activation code
and special offers
Complete Video Course
To enhance your preparation, Pearson IT Certification also sells Complete
Video Courses for both streaming and download. Complete Video Courses
provide you with hours of expert-level instruction mapped directly to exam
objectives.
Coupon Code:
Where are the companion
content files?
Register this digital version of
CISSP Cert Guide, Fourth Edition
to access important downloads.
Register this eBook to unlock the This eBook version of the print title does
companion files. Follow these steps: not contain the practice test software that
accompanies the print book.
1. Go to
pearsonITcertification.com/ You May Also Like—Premium Edition
account and log in or create a new eBook and Practice Test. To learn about
account. the Premium Edition eBook and Practice
Test series, visit
2. Enter the ISBN: 9780137507474
pearsonITcertification.com/
(NOTE: Please enter the print
practicetest
book ISBN provided to register
the eBook you purchased.)
3. Answer the challenge question as
proof of purchase.
4. Click on the “Access Bonus Content”
link in the Registered Products section
of your account page, to be taken to
the page where your downloadable
content is available.