CISSP Essential Concepts
CISSP Essential Concepts
Prepared by
G. M. Faruk Ahmed, CISSP, CISA
https://www.linkedin.com/in/gmfaruk/
Security Governance
- Policies: High-level objectives (mandatory)
- Standards: Technical requirements (mandatory)
- Procedures: Step-by-step processes (mandatory)
- Guidelines: Best practices (optional)
Risk Management
- Risk= Threat × Vulnerability
- SLE(Single Loss Expectancy)=Asset Value × Exposure Factor
- ALE (Annual Loss Expectancy)=ARO×SLE
- Risk Responses:
o Avoid: Change business practices
o Mitigate: Implement controls
o Transfer: Insurance/contracts
o Accept: Continue operations
Network Security
OSI Model Layers
1. Physical: Bits transmission
2. Data Link: MAC addresses, frames
3. Network: IP routing, packets
4. Transport: TCP/UDP, connections
5. Session: Session management
6. Presentation: Data formatting
7. Application: User interface
Cryptography
Types
- Symmetric: Same key for encryption/decryption
o AES,3DES
- Asymmetric: Public/private key pairs
o RSA,ECC
- Hashing: One-way functions(MD5, SHA)
Digital Certificates
- X.509 standard
- Contains public key
- Signed by Certificate Authority
- Used in PKI
Business Continuity & Disaster Recovery
Backup Types
- Full: Complete backup of all data
- Incremental: Changes since last full backup
- Differential: Changes since last full or incremental
Recovery Sites
- Hot Site: Fully equipped, immediate
- Warm Site: Partial equipment, some delay
- Cold Site: Basic facility only
Security Operations
Incident Response Steps
1. Detection
2. Response
3. Mitigation
4. Reporting
5. Recovery
6. Lessons Learned
Investigation Types
- Criminal: Beyond reasonable doubt
- Civil: Preponderance of evidence
- Administrative: Internal matters
- Regulatory: Compliance verification
Software Security
SDLC Security
- Requirements: Security requirements
- Design: Threat modeling
- Development: Secure coding
- Testing: Security testing
- Deployment: Secure configuration
- Maintenance: Patch management
Common Web Vulnerabilities
1. Injection attacks
2. Authentication issues
3. XSS(Cross-site scripting)
4. CSRF(Cross-site request forgery)
5. Access control issues
Personnel Security
Key Principles
- Need to Know: Business requirement
- Least Privilege: Minimum access
- Separation of Duties: Split sensitive tasks
- Job Rotation: Prevent fraud
- Mandatory Vacations: Detect misconduct
Physical Security
Environmental Controls
- Fire Suppression:
o Class A: Common materials
o Class B: Liquids
o Class C: Electrical
o Class D: Metals
- Power Protection:
o UPS systems
o Generators
o Surge protectors
Access Controls
- Preventive: Guards, locks
- Detective: Cameras, alarms
- Deterrent: Signs, lighting
- Compensating: Alternative controls
Domain1: Security and Risk Management
Core Security Concepts
Concept Description Key Components
CIA Triad Core security goals • Confidentiality: Prevents unauthorized disclosure
• Integrity: Prevents unauthorized modification
• Availability: Ensures timely access
Policy Framework
Type Compliance Purpose Example
Policies Mandatory High-level direction Acceptable Use Policy
Standards Mandatory Specific requirements Password complexity
Procedures Mandatory Step-by-step instructions Incident response steps
Guidelines Optional Best practices Security recommendations
Risk Management
Component Formula/Description Examples
SLE Asset Value × Exposure Factor $100,000asset×0.3=$30,000
ALE ARO×SLE 0.1×$30,000 =$3,000
Risk Responses Strategic decisions • Avoid
• Mitigate
• Transfer
• Accept
IAM Processes
Process Purpose Components Best Practices
Provisioning Account creation • Workflow Automation
• Approval
Business Continuity
Component Purpose Elements Metrics
BCP Business continuation • Processes RTO
• Resources
DRP IT recovery • Systems RPO
• Data
Crisis Management Leadership • Decision making MTD
• Communication
Domain 8: Software Security
Secure SDLC
Phase Security Activities Deliverables Controls
Planning • Requirements Security plan Review
• Risk assessment
Design • Threat modeling Security architecture Validation
• Architecture review
Development • Secure coding Secure code Testing
• Code review
Common Vulnerabilities
Category Examples Prevention Detection
Injection • SQL Input validation SAST/DAST
• Command
Authentication • Weak passwords Strong auth Monitoring
• Session hijacking
Prepared by
G. M. Faruk Ahmed, CISSP, CISA
https://www.linkedin.com/in/gmfaruk/