Muutke küpsiste eelistusi

E-raamat: (ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide, 2nd Edition 2nd Edition [Wiley Online]

  • Formaat: 688 pages
  • Ilmumisaeg: 07-Jun-2019
  • Kirjastus: Sybex Inc.,U.S.
  • ISBN-10: 111954792X
  • ISBN-13: 9781119547921
Teised raamatud teemal:
  • Wiley Online
  • Hind: 63,44 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Formaat: 688 pages
  • Ilmumisaeg: 07-Jun-2019
  • Kirjastus: Sybex Inc.,U.S.
  • ISBN-10: 111954792X
  • ISBN-13: 9781119547921
Teised raamatud teemal:
The only SSCP study guide officially approved by (ISC)2

The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is a well-known vendor-neutral global IT security certification. The SSCP is designed to show that holders have the technical skills to implement, monitor, and administer IT infrastructure using information security policies and procedures.

This comprehensive Official Study Guidethe only study guide officially approved by (ISC)2covers all objectives of the seven SSCP domains.





Access Controls Security Operations and Administration Risk Identification, Monitoring, and Analysis Incident Response and Recovery Cryptography Network and Communications Security Systems and Application Security

If youre an information security professional or student of cybersecurity looking to tackle one or more of the seven domains of the SSCP, this guide gets you prepared to pass the exam and enter the information security workforce with confidence. 
Foreword xxi
Introduction xxiii
Self-Assessment xlv
Part I Getting Started as an SSCP 1(50)
Chapter 1 The Business Case for Decision Assurance and Information Security
3(22)
Information: The Lifeblood of Business
4(6)
Data, Information, Knowledge, Wisdom
5(3)
Information Is Not Information Technology
8(2)
Policy, Procedure, and Process: How Business Gets Business Done
10(9)
Who Is the Business?
11(1)
"What's Your Business Plan?"
12(1)
Purpose, Intent, Goals, Objectives
13(1)
Business Logic and Business Processes: Transforming Assets into Opportunity, Wealth, and Success
14(1)
The Value Chain
15(2)
Being Accountable
17(2)
Who Runs the Business?
19(4)
Owners and Investors
19(1)
Boards of Directors
20(1)
Managing or Executive Directors and the "C-Suite"
20(1)
Layers of Function, Structure, Management, and Responsibility
21(1)
Plans and Budgets, Policies, and Directives
22(1)
Summary
23(2)
Chapter 2 Information Security Fundamentals
25(26)
The Common Needs for Privacy, Confidentiality, Integrity, and Availability
26(12)
Privacy
26(3)
Confidentiality
29(1)
Integrity
30(1)
Availability
31(1)
Privacy vs. Security, or Privacy and Security?
32(2)
CIA Needs of Individuals
34(1)
Private Business's Need for CIA
35(1)
Government's Need for CIA
36(1)
The Modern Military's Need for CIA
36(1)
Do Societies Need CIA?
36(2)
Training and Educating Everybody
38(1)
SSCPs and Professional Ethics
38(2)
Summary
40(1)
Exam Essentials
40(4)
Review Questions
44(7)
Part II Integrated Risk Management and Mitigation 51(122)
Chapter 3 Integrated Information Risk Management
53(58)
It's a Dangerous World
54(11)
What Is Risk?
55(4)
Risk: When Surprise Becomes Disruption
59(1)
Information Security: Delivering Decision Assurance
60(3)
"Common Sense" and Risk Management
63(2)
The Four Faces of Risk
65(7)
Outcomes-Based Risk
67(1)
Process-Based Risk
67(1)
Asset-Based Risk
68(1)
Threat-Based (or Vulnerability-Based) Risk
69(3)
Getting Integrated and Proactive with Information Defense
72(6)
Trust, but Verify
76(1)
Due Care and Due Diligence: Whose Jobs Are These?
76(1)
Be Prepared: First, Set Priorities
77(1)
Risk Management: Concepts and Frameworks
78(6)
The SSCP and Risk Management
81(1)
Plan, Do, Check, Act
82(2)
Risk Assessment
84(10)
Establish Consensus about Information Risk
84(1)
Information Risk Impact Assessment
85(7)
The Business Impact Analysis
92(1)
From Assessments to Information Security Requirements
92(2)
Four Choices for Limiting or Containing Damage
94(6)
Deter
96(1)
Detect
96(1)
Prevent
97(1)
Avoid
97(3)
Summary
100(1)
Exam Essentials
101(4)
Review Questions
105(6)
Chapter 4 Operationalizing Risk Mitigation
111(62)
From Tactical Planning to Information Security Operations
112(6)
Operationally Outthinking Your Adversaries
114(2)
Getting Inside the Other Side's OODA Loop
116(1)
Defeating the Kill Chain
117(1)
Operationalizing Risk Mitigation: Step by Step
118(28)
Step 1: Assess the Existing Architectures
119(7)
Step 2: Assess Vulnerabilities and Threats
126(9)
Step 3: Select Risk Treatment and Controls
135(6)
Step 4: Implement Controls
141(5)
Step 5: Authorize: Senior Leader Acceptance and Ownership
146(1)
The Ongoing Job of Keeping Your Baseline Secure
146(6)
Build and Maintain User Engagement with Risk Controls
147(1)
Participate in Security Assessments
148(3)
Manage the Architectures: Asset Management and Configuration Control
151(1)
Ongoing, Continuous Monitoring
152(8)
Exploiting What Monitoring and Event Data Is Telling You
155(4)
Incident Investigation, Analysis, and Reporting
159(1)
Reporting to and Engaging with Management
160(1)
Summary
161(1)
Exam Essentials
161(5)
Review Questions
166(7)
Part III The Technologies of Information Security 173(304)
Chapter 5 Communications and Network Security
175(74)
Trusting Our Communications in a Converged World
176(5)
Introducing CIANA
179(1)
Threat Modeling for Communications Systems
180(1)
Internet Systems Concepts
181(13)
Datagrams and Protocol Data Units
182(2)
Handshakes
184(1)
Packets and Encapsulation
185(2)
Addressing, Routing, and Switching
187(1)
Network Segmentation
188(1)
URLs and the Web
188(1)
Topologies
189(4)
"Best Effort" and Trusting Designs
193(1)
Two Protocol Stacks, One Internet
194(23)
Complementary, Not Competing, Frameworks
194(4)
Layer 1: The Physical Layer
198(1)
Layer 2: The Data Link Layer
199(2)
Layer 3: The Network Layer
201(1)
Layer 4: The Transport Layer
202(4)
Layer 5: The Session Layer
206(1)
Layer 6: The Presentation Layer
207(1)
Layer 7: The Application Layer
208(1)
Cross-Layer Protocols and Services
209(1)
IP and Security
210(1)
Layers or Planes?
211(1)
Software-Defined Networks
212(1)
Virtual Private Networks
213(1)
A Few Words about Wireless
214(3)
IP Addresses, DHCP, and Subnets
217(4)
IPv4 Address Classes
217(2)
Subnetting in IPv4
219(2)
IPv4 vs. IPv6: Key Differences and Options
221(2)
CIANA Layer by Layer
223(10)
CIANA at Layer 1: Physical
223(3)
CIANA at Layer 2: Data Link
226(2)
CIANA at Layer 3: Network
228(1)
CIANA at Layer 4: Transport
229(1)
CIANA at Layer 5: Session
230(1)
CIANA at Layer 6: Presentation
231(1)
CIANA at Layer 7: Application
232(1)
Securing Networks as Systems
233(5)
A SOC Is Not a NOC
234(1)
Tools for the SOC and the NOC
235(1)
Integrating Network and Security Management
236(2)
Summary
238(1)
Exam Essentials
238(5)
Review Questions
243(6)
Chapter 6 Identity and Access Control
249(48)
Identity and Access: Two Sides of the Same CIANA Coin
250(1)
Identity Management Concepts
251(4)
Identity Provisioning and Management
252(2)
Identity and AAA
254(1)
Access Control Concepts
255(10)
Subjects and Objects-Everywhere!
257(1)
Data Classification and Access Control
258(2)
Bell-LaPadula and Biba Models
260(3)
Role-Based
263(1)
Attribute-Based
263(1)
Subject-Based
264(1)
Object-Based
264(1)
Mandatory vs. Discretionary Access Control
264(1)
Network Access Control
265(5)
IEEE 802.1X Concepts
267(1)
RADIUS Authentication
268(1)
TACACS and TACACS+
269(1)
Implementing and Scaling IAM
270(11)
Choices for Access Control Implementations
271(2)
"Built-in" Solutions?
273(1)
Multifactor Authentication
274(2)
Server-Based IAM
276(1)
Integrated IAM systems
277(4)
Zero Trust Architectures
281(1)
Summary
282(1)
Exam Essentials
283(7)
Review Questions
290(7)
Chapter 7 Cryptography
297(74)
Cryptography: What and Why
298(8)
Codes and Ciphers: Defining Our Terms
300(5)
Cryptography, Cryptology, or...?
305(1)
Building Blocks of Digital Cryptographic Systems
306(8)
Cryptographic Algorithms
307(1)
Cryptographic Keys
308(2)
Hashing as One-Way Cryptography
310(3)
A Race Against Time
313(1)
"The Enemy Knows Your System"
314(1)
Keys and Key Management
314(3)
Key Storage and Protection
315(1)
Key Revocation and Zeroization
315(2)
Modern Cryptography: Beyond the "Secret Decoder Ring"
317(3)
Symmetric Key Cryptography
317(1)
Asymmetric Key (or Public Key) Cryptography
318(1)
Hybrid Cryptosystems
318(1)
Design and Use of Cryptosystems
319(1)
Cryptanalysis (White Hat and Black Hat)
319(1)
Cryptographic Primitives
320(1)
Cryptographic Engineering
320(1)
"Why Isn't All of This Stuff Secret?"
320(2)
Cryptography and CIANA
322(5)
Confidentiality
322(1)
Authentication
323(1)
Integrity
323(1)
Nonrepudiation
324(1)
"But I Didn't Get That Email..."
324(1)
Availability
325(2)
Public Key Infrastructures
327(17)
Diffie-Hellman-Merkle Public Key Exchange
328(3)
RSA Encryption and Key Exchange
331(1)
EIGamal Encryption
331(1)
Digital Signatures
332(1)
Digital Certificates and Certificate Authorities
332(1)
Hierarchies (or Webs) of Trust
333(4)
Pretty Good Privacy
337(1)
TLS
338(2)
HTTPS
340(1)
Symmetric Key Algorithms and PKI
341(1)
PKI and Trust: A Recap
342(2)
Other Protocols: Applying Cryptography to Meet Different Needs
344(4)
IPSec
344(1)
S/MIME
345(1)
DKIM
345(1)
Blockchain
346(2)
Access Control Protocols
348(1)
Measures of Merit for Cryptographic Solutions
348(1)
Attacks and Countermeasures
349(8)
Brute Force and Dictionary Attacks
350(1)
Side Channel Attacks
350(1)
Numeric (Algorithm or Key) Attacks
351(1)
Traffic Analysis, "Op Intel," and Social Engineering Attacks
352(1)
Massively Parallel Systems Attacks
353(1)
Supply Chain Vulnerabilities
354(1)
The "Sprinkle a Little Crypto Dust on It" Fallacy
354(1)
Countermeasures
355(2)
On the Near Horizon
357(4)
Pervasive and Homomorphic Encryption
358(1)
Quantum Cryptography and Post-Quantum Cryptography
358(2)
AI, Machine Learning, and Cryptography
360(1)
Summary
361(1)
Exam Essentials
361(5)
Review Questions
366(5)
Chapter 8 Hardware and Systems Security
371(42)
Infrastructure Security Is Baseline Management
372(4)
It's About Access Control
373(1)
It's Also About Supply Chain Security
374(1)
Do Clouds Have Boundaries?
375(1)
Infrastructures 101 and Threat Modeling
376(15)
Hardware Vulnerabilities
379(1)
Firmware Vulnerabilities
380(2)
Operating Systems Vulnerabilities
382(3)
Virtual Machines and Vulnerabilities
385(1)
Network Operating Systems
386(2)
MDM, COPE, and BYOD
388(1)
BYOI? BYOC?
389(2)
Malware: Exploiting the Infrastructure's Vulnerabilities
391(4)
Countering the Malware Threat
394(1)
Privacy and Secure Browsing
395(2)
"The Sin of Aggregation"
397(1)
Updating the Threat Model
398(1)
Managing Your Systems' Security
399(1)
Summary
399(1)
Exam Essentials
400(7)
Review Questions
407(6)
Chapter 9 Applications, Data, and Cloud Security
413(64)
It's a Data-Driven World...At the Endpoint
414(3)
Software as Appliances
417(3)
Applications Lifecycles and Security
420(8)
The Software Development Lifecycle (SDLC)
421(3)
Why Is (Most) Software So Insecure?
424(3)
Hard to Design It Right, Easy to Fix It?
427(1)
CIANA and Applications Software Requirements
428(6)
Positive and Negative Models for Software Security
431(1)
Is Blacklisting Dead? Or Dying?
432(2)
Application Vulnerabilities
434(2)
Vulnerabilities Across the Lifecycle
434(2)
Human Failures and Frailties
436(1)
"Shadow IT:" The Dilemma of the User as Builder
436(4)
Data and Metadata as Procedural Knowledge
438(2)
Information Quality and Information Assurance
440(3)
Information Quality Lifecycle
441(1)
Preventing (or Limiting) the "Garbage In" Problem
442(1)
Protecting Data in Motion, in Use, and at Rest
443(5)
Data Exfiltration I: The Traditional Threat
445(1)
Detecting Unauthorized Data Acquisition
446(1)
Preventing Data Loss
447(1)
Into the Clouds: Endpoint App and Data Security Considerations
448(8)
Cloud Deployment Models and Information Security
449(1)
Cloud Service Models and Information Security
450(2)
Clouds, Continuity, and Resiliency
452(1)
Clouds and Threat Modeling
453(2)
Cloud Security Methods
455(1)
SLAs, TORs, and Penetration Testing
456(1)
Data Exfiltration II: Hiding in the Clouds
456(1)
Legal and Regulatory Issues
456(2)
Countermeasures: Keeping Your Apps and Data Safe and Secure
458(1)
Summary
459(1)
Exam Essentials
460(10)
Review Questions
470(7)
Part IV People Power: What Makes or Breaks Information Security 477(92)
Chapter 10 Incident Response and Recovery
479(46)
Defeating the Kill Chain One Skirmish at a Time
480(5)
Kill Chains: Reviewing the Basics
482(2)
Events vs. Incidents
484(1)
Incident Response Framework
485(6)
Incident Response Team: Roles and Structures
487(3)
Incident Response Priorities
490(1)
Preparation
491(6)
Preparation Planning
491(2)
Put the Preparation Plan in Motion
493(1)
Are You Prepared?
494(3)
Detection and Analysis
497(5)
Warning Signs
497(2)
Initial Detection
499(1)
Timeline Analysis
500(1)
Notification
500(1)
Prioritization
501(1)
Containment and Eradication
502(3)
Evidence Gathering, Preservation, and Use
504(1)
Constant Monitoring
505(1)
Recovery: Getting Back to Business
505(3)
Data Recovery
506(2)
Post-Recovery: Notification and Monitoring
508(1)
Post-Incident Activities
508(4)
Learning the Lessons
509(1)
Support Ongoing Forensics Investigations
510(1)
Information and Evidence Retention
511(1)
Information Sharing with the Larger IT Security Community
511(1)
Summary
512(1)
Exam Essentials
512(6)
Review Questions
518(7)
Chapter 11 Business Continuity via Information Security and People Power
525(28)
A Spectrum of Disruption
526(3)
Surviving to Operate: Plan for It!
529(2)
Cloud-Based "Do-Over" Buttons for Continuity, Security, and Resilience
531(6)
CIANA at Layer 8 and Above
537(6)
It Is a Dangerous World Out There
539(2)
People Power for Secure Communications
541(1)
POTS and VoIP Security
542(1)
Summary
543(1)
Exam Essentials
544(3)
Review Questions
547(6)
Chapter 12 Risks, Issues, and Opportunities, Starting Tomorrow
553(16)
On Our Way to the Future
554(8)
Access Control and Zero Trust
555(1)
AI, ML, BI, and Trustworthiness
556(1)
Quantum Communications, Computing, and Cryptography
557(1)
Paradigm Shifts in Information Security?
558(1)
Perception Management and Information Security
559(1)
Widespread Lack of Useful Understanding of Core Technologies
560(1)
IT Supply Chain Vulnerabilities
561(1)
Government Overreactions
561(1)
CIA, CIANA, or CIANAPS?
562(1)
Enduring Lessons
563(4)
You Cannot Legislate Security
563(1)
It's About Managing Our Security and Our Systems
563(1)
People Put It Together
564(1)
Maintain Flexibility of Vision
565(1)
Accountability-It's Personal. Make It So.
565(1)
Stay Sharp
566(1)
Your Next Steps
567(1)
At the Close
568(1)
Appendix Answers to Review Questions 569(36)
Self-Assessment
570(6)
Chapter 2 Information Security Fundamentals
576(3)
Chapter 3 Integrated Information Risk Management
579(2)
Chapter 4 Operationalizing Risk Mitigation
581(2)
Chapter 5 Communications and Network Security
583(3)
Chapter 6 Identity and Access Control
586(3)
Chapter 7 Cryptography
589(3)
Chapter 8 Hardware and Systems Security
592(2)
Chapter 9 Applications, Data, and Cloud Security
594(3)
Chapter 10 Incident Response and Recovery
597(4)
Chapter 11 Business Continuity via Information Security and People Power
601(4)
Index 605
Mike Wills, SSCP, CISSP, Assistant Professor and Program Chair of Applied Information Technologies in the College of Business at Embry-Riddle Aeronautical University's Worldwide Campus. Mike has been a pioneer in ethical hacking since his days as a phone phreak. His many years of cutting-edge experience in secure systems design, development, and operation have enriched the dozens of courses he's built and taught. He created ERAU's Master of Science in Information Security and Assurance degree program and leads the university's teaching and courseware development for the Microsoft Software & Systems Academy at ERAU's 13 US teaching sites.