Complete Download The CISSP and CAP Prep Guide Platinum Edition Ronald L. Krutz PDF All Chapters
Complete Download The CISSP and CAP Prep Guide Platinum Edition Ronald L. Krutz PDF All Chapters
Complete Download The CISSP and CAP Prep Guide Platinum Edition Ronald L. Krutz PDF All Chapters
com
https://ebookname.com/product/the-cissp-and-cap-prep-guide-
platinum-edition-ronald-l-krutz/
OR CLICK BUTTON
DOWLOAD EBOOK
https://ebookname.com/product/the-cissp-prep-guide-gold-edition-
ronald-l-krutz/
ebookname.com
The CISSP Prep Guide Mastering the CISSP and ISSEP Exams
Second Edition Ronald L. Krutz Russell Dean Vines
https://ebookname.com/product/the-cissp-prep-guide-mastering-the-
cissp-and-issep-exams-second-edition-ronald-l-krutz-russell-dean-
vines/
ebookname.com
https://ebookname.com/product/official-isc-2-guide-to-the-cissp-issep-
cbk-1st-edition-susan-hansche-cissp/
ebookname.com
https://ebookname.com/product/success-with-finishing-cass/
ebookname.com
Pragmatism without Foundations Reconciling Realism and
Relativism 2nd Edition Joseph Margolis
https://ebookname.com/product/pragmatism-without-foundations-
reconciling-realism-and-relativism-2nd-edition-joseph-margolis/
ebookname.com
https://ebookname.com/product/youtube-for-dummies-1st-edition-doug-
sahlin/
ebookname.com
https://ebookname.com/product/advanced-paediatric-life-support-3rd-
edition-kevin-mackway-jones/
ebookname.com
https://ebookname.com/product/expert-oracle-exadata-2nd-edition-
martin-bach/
ebookname.com
https://ebookname.com/product/vertical-specialization-and-trade-
surplus-in-china-1st-edition-wang-wei-auth/
ebookname.com
The 21st Century Parent Multicultural Parent Engagement
Leadership Strategies Handbook 1st Edition Mary Johnson
https://ebookname.com/product/the-21st-century-parent-multicultural-
parent-engagement-leadership-strategies-handbook-1st-edition-mary-
johnson/
ebookname.com
01_007923 ffirs.qxp 9/15/06 3:32 PM Page iii
Prep Guide:
Platinum Edition
Prep Guide:
Platinum Edition
01_007923 ffirs.qxp 9/15/06 3:32 PM Page ii
01_007923 ffirs.qxp 9/15/06 3:32 PM Page iii
Prep Guide:
Platinum Edition
Published by
Wiley Publishing, Inc.
10475 Crosspoint Boulevard
Indianapolis, IN 46256
www.wiley.com
Copyright © 2007 by Ronald L. Krutz and Russell Dean Vines, Gibson, Pennsylvania, and White Plaines, New York
ISBN-13: 978-0-470-00792-1
ISBN-10: 0-470-00792-3
10 9 8 7 6 5 4 3 2 1
3B/RY/RQ/QW/IN
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, elec-
tronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976
United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of
the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax
(978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc.,
10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/
permissions.
LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO REPRESENTA-
TIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS
WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF
FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR PROMO-
TIONAL MATERIALS. THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SIT-
UATION. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN
RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS
REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT. NEITHER THE PUB-
LISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM. THE FACT THAT AN ORGANI-
ZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION AND/OR A POTENTIAL SOURCE OF
FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFORMA-
TION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE. FURTHER, READ-
ERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR
DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ.
For general information on our other products and services or to obtain technical support, please contact our Customer Care
Department within the U.S. at (800) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.
Trademarks: Wiley, the Wiley logo, and related trade dress are are trademarks or registered trademarks of John Wiley & Sons,
Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. CISSP is
a registered certification mark and CAP is a service mark of International Information Systems Security Certification Consor-
tium, Inc. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any
product or vendor mentioned in this book.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in
electronic books.
01_007923 ffirs.qxp 9/15/06 3:32 PM Page v
—R.L.K
—R.D.V.
01_007923 ffirs.qxp 9/15/06 3:32 PM Page vi
01_007923 ffirs.qxp 9/15/06 3:32 PM Page vii
RONALD L. KRUTZ, Ph.D., P.E., CISSP, ISSEP. Dr. Krutz is the Chief Knowl-
edge Officer of Cybrinth, LLC, a firm that provides innovative information
protection, analysis, assurance, and management services to government and
the commercial sector. Prior to this position, Dr. Krutz was a Senior Informa-
tion Security Researcher in the Advanced Technology Research Center of
Lockheed Martin/Sytex, Inc. In this capacity he worked with a team responsi-
ble for advancing the state of the art in information systems security. He has
more than 40 years of experience in distributed computing systems, computer
architectures, real-time systems, information assurance methodologies, and
information security training.
Dr. Krutz has been an information security consultant at REALTECH Sys-
tems Corporation and BAE Systems, an associate director of the Carnegie Mel-
lon Research Institute (CMRI), and a professor in the Carnegie Mellon
University Department of Electrical and Computer Engineering. Dr. Krutz
founded the CMRI Cybersecurity Center and was founder and director of the
CMRI Computer, Automation, and Robotics Group. He is a former lead
instructor for the (ISC)2 CISSP Common Body of Knowledge review seminars.
Dr. Krutz is also a Distinguished Special Lecturer in the Center for Forensic
Computer Investigation at the University of New Haven, a part-time instruc-
tor in the University of Pittsburgh Department of Electrical and Computer
Engineering, and a Registered Professional Engineer.
In addition to being a former lead instructor for the ISC2 CBK review seminars
and contributing material to the CBK, Dr. Krutz is the author of nine best-selling
publications in the area of information systems security, and is a consulting edi-
tor for John Wiley and Sons for its information security book series. Dr. Krutz
holds B.S., M.S., and Ph.D. degrees in Electrical and Computer Engineering.
vii
01_007923 ffirs.qxp 9/15/06 3:32 PM Page viii
Credits
ix
01_007923 ffirs.qxp 9/15/06 3:32 PM Page x
02_007923 ftoc.qxp 9/15/06 3:37 PM Page xi
Contents
xi
02_007923 ftoc.qxp 9/15/06 3:37 PM Page xii
xii Contents
Security Awareness 42
Awareness 44
Training and Education 45
Assessment Questions 46
Chapter 2 Access Control 55
Rationale 55
Controls 56
Models for Controlling Access 57
Control Combinations 59
Access Control Attacks 61
Denial of Service/Distributed Denial of Service (DoS/DDoS) 61
Back Door 62
Spoofing 62
Man-in-the-Middle 63
Replay 63
TCP Hijacking 63
Social Engineering 64
Dumpster Diving 64
Password Guessing 65
Software Exploitation 65
Mobile Code 66
Trojan Horses 66
Logic Bomb 67
System Scanning 67
Penetration Testing 68
Identification and Authentication 69
Passwords 70
Biometrics 72
Single Sign-On (SSO) 74
Kerberos 75
Kerberos Operation 76
SESAME 79
KryptoKnight 79
Access Control Methodologies 79
Centralized Access Control 80
Decentralized/Distributed Access Control 81
Intrusion Detection 86
Some Access Control Issues 88
Assessment Questions 89
Chapter 3 Telecommunications and Network Security 95
The C.I.A. Triad 96
Confidentiality 96
Integrity 96
Availability 97
02_007923 ftoc.qxp 9/15/06 3:37 PM Page xiii
Contents xiii
Protocols 98
The Layered Architecture Concept 98
Open Systems Interconnect (OSI) Model 99
Transmission Control Protocol/Internet Protocol (TCP/IP) 103
LAN Technologies 110
Ethernet 110
ARCnet 112
Token Ring 112
Fiber Distributed Data Interface (FDDI) 113
Cabling Types 113
Coaxial Cable (Coax) 113
Twisted Pair 114
Fiber-Optic Cable 116
Cabling Vulnerabilities 116
Transmission Types 117
Network Topologies 118
Bus 118
Ring 118
Star 118
Tree 120
Mesh 120
LAN Transmission Protocols 121
Carrier-Sense Multiple Access (CSMA) 121
Polling 122
Token Passing 122
Unicast, Multicast, Broadcast 123
Networking Devices 123
Hubs and Repeaters 123
Bridges 124
Spanning Tree 125
Switches 125
Transparent Bridging 125
Routers 126
VLANs 129
Gateways 130
LAN Extenders 130
Firewall Types 130
Packet-Filtering Firewalls 131
Application-Level Firewalls 132
Circuit-Level Firewalls 133
Stateful Inspection Firewalls 133
Firewall Architectures 133
Packet-Filtering Routers 134
Screened-Host Firewalls 134
Dual-Homed Host Firewalls 134
Screened-Subnet Firewalls 135
SOCKS 137
02_007923 ftoc.qxp 9/15/06 3:37 PM Page xiv
xiv Contents
Contents xv
xvi Contents
Contents xvii
xviii Contents
Contents xix
Investigation 496
Computer Investigation Issues 496
Export Issues and Technology 502
Liability 502
Ethics 504
(ISC)2 Code of Ethics 506
The Computer Ethics Institute’s Ten Commandments of
Computer Ethics 506
The Internet Architecture Board (IAB) Ethics and the
Internet (RFC 1087) 507
The U.S. Department of Health and Human Services Code
of Fair Information Practices 507
The Organization for Economic Cooperation and
Development (OECD) 508
Assessment Questions 510
Chapter 10 Physical (Environmental) Security 517
Threats to Physical Security 518
Controls for Physical Security 520
Administrative Controls 520
Environmental and Life Safety Controls 524
Physical and Technical Controls 534
Assessment Questions 550
Part 2 The Certification and Accreditation Professional
(CAP) Credential 557
Chapter 11 Understanding Certification and Accreditation 559
System Authorization 559
A Select History of Systems Authorization 560
More and More Standards 572
What Is Certification and Accreditation? 572
NIST C&A Documents 573
C&A Roles and Responsibilities 573
C&A Phases 577
DIACAP Phases 578
Assessment Questions 580
Chapter 12 Initiation of the System Authorization Process 585
Security Categorization 586
Identification of Information Types 588
Potential Harmful Impact Levels 589
Assignment of Impact Level Scores 590
Assignment of System Impact Level 592
Initial Risk Estimation 593
Threat-Source Identification 594
Threat Likelihood of Occurrence 597
Analyzing for Vulnerabilities 597
System Accreditation Boundary 601
Legal and Regulatory Requirements 603
02_007923 ftoc.qxp 9/15/06 3:37 PM Page xx
xx Contents
Contents xxi
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookname.com