Introduction |
|
xxxvii | |
|
Chapter 1 The Importance of Threat Data and Intelligence |
|
|
3 | (16) |
|
"Do I Know This Already?" Quiz |
|
|
3 | (3) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
Proprietary/Closed-Source Intelligence |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
7 | (2) |
|
Structured Threat Information eXpression (STIX) |
|
|
8 | (1) |
|
Trusted Automated eXchange of Indicator Information (TAXII) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
9 | (3) |
|
Known Threat vs. Unknown Threat |
|
|
10 | (1) |
|
|
10 | (1) |
|
Advanced Persistent Threat |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
Information Sharing and Analysis Communities |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
17 | (2) |
|
Chapter 2 Utilizing Threat Intelligence to Support Organizational Security |
|
|
19 | (20) |
|
"Do I Know This Already?" Quiz |
|
|
19 | (2) |
|
|
21 | (1) |
|
|
21 | (2) |
|
|
21 | (1) |
|
The Diamond Model of Intrusion Analysis |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
23 | (6) |
|
|
24 | (1) |
|
|
24 | (1) |
|
Indicator of Compromise (IoC) |
|
|
25 | (1) |
|
Common Vulnerability Scoring System (CVSS) |
|
|
25 | (4) |
|
Threat Modeling Methodologies |
|
|
29 | (4) |
|
|
29 | (2) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
Threat Intelligence Sharing with Supported Functions |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (4) |
|
Chapter 3 Vulnerability Management Activities |
|
|
39 | (28) |
|
"Do I Know This Already?" Quiz |
|
|
39 | (2) |
|
|
41 | (1) |
|
Vulnerability Identification |
|
|
41 | (3) |
|
|
42 | (1) |
|
Active vs. Passive Scanning |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
45 | (4) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
47 | (1) |
|
Verification of Mitigation |
|
|
47 | (2) |
|
Scanning Parameters and Criteria |
|
|
49 | (13) |
|
Risks Associated with Scanning Activities |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
49 | (2) |
|
Credentialed vs. Non-credentialed |
|
|
51 | (1) |
|
Server-based vs. Agent-based |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
Intrusion Prevention System (IPS), Intrusion Detection System (IDS), and Firewall Settings |
|
|
57 | (2) |
|
|
59 | (3) |
|
Inhibitors to Remediation |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
64 | (3) |
|
Chapter 4 Analyzing Assessment Output |
|
|
67 | (26) |
|
"Do I Know This Already?" Quiz |
|
|
67 | (2) |
|
|
69 | (1) |
|
|
69 | (2) |
|
|
69 | (1) |
|
OWASP Zed Attack Proxy (ZAP) |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
Infrastructure Vulnerability Scanner |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
Software Assessment Tools and Techniques |
|
|
72 | (4) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
76 | (6) |
|
|
76 | (3) |
|
|
79 | (1) |
|
|
80 | (2) |
|
|
82 | (1) |
|
|
82 | (1) |
|
Wireless Assessment Tools |
|
|
82 | (4) |
|
|
83 | (1) |
|
|
84 | (2) |
|
|
86 | (1) |
|
Cloud Infrastructure Assessment Tools |
|
|
86 | (2) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
89 | (4) |
|
Chapter 5 Threats and Vulnerabilities Associated with Specialized Technology |
|
|
93 | (30) |
|
"Do I Know This Already?" Quiz |
|
|
93 | (4) |
|
|
97 | (1) |
|
|
97 | (6) |
|
Unsigned Apps/System Apps |
|
|
98 | (1) |
|
Security Implications/Privacy Concerns |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
99 | (1) |
|
Transfer/Back Up Data to Uncontrolled Storage |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
100 | (1) |
|
Push Notification Services |
|
|
100 | (1) |
|
|
100 | (1) |
|
OEM/Carrier Android Fragmentation |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
Peripheral-Enabled Payments (Credit Card Reader) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
Unauthorized Domain Bridging |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
103 | (2) |
|
|
104 | (1) |
|
Methods of Securing IoT Devices |
|
|
104 | (1) |
|
|
105 | (1) |
|
Real-Time Operating System (RTOS) |
|
|
105 | (1) |
|
|
105 | (1) |
|
Field Programmable Gate Array (FPGA) |
|
|
105 | (1) |
|
|
106 | (3) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
107 | (2) |
|
Building Automation Systems |
|
|
109 | (2) |
|
|
109 | (2) |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
111 | (2) |
|
|
112 | (1) |
|
|
113 | (1) |
|
Workflow and Process Automation Systems |
|
|
113 | (1) |
|
Incident Command System (ICS) |
|
|
114 | (1) |
|
Supervisory Control and Data Acquisition (SCADA) |
|
|
114 | (4) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
120 | (3) |
|
Chapter 6 Threats and Vulnerabilities Associated with Operating in the Cloud |
|
|
123 | (18) |
|
"Do I Know This Already?" Quiz |
|
|
123 | (3) |
|
|
126 | (1) |
|
|
126 | (1) |
|
|
127 | (1) |
|
Function as a Service (FaaS)/Serverless Architecture |
|
|
128 | (2) |
|
Infrastructure as Code (IaC) |
|
|
130 | (1) |
|
Insecure Application Programming Interface (API) |
|
|
131 | (1) |
|
|
132 | (2) |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
134 | (2) |
|
Transfer/Back Up Data to Uncontrolled Storage |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
|
Insufficient Logging and Monitoring |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
138 | (3) |
|
Chapter 7 Implementing Controls to Mitigate Attacks and Software Vulnerabilities |
|
|
141 | (32) |
|
"Do I Know This Already?" Quiz |
|
|
141 | (2) |
|
|
143 | (1) |
|
|
143 | (20) |
|
Extensible Markup Language (XML) Attack |
|
|
143 | (2) |
|
Structured Query Language (SQL) Injection |
|
|
145 | (2) |
|
|
147 | (1) |
|
|
147 | (2) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
152 | (2) |
|
|
154 | (1) |
|
|
154 | (2) |
|
|
156 | (2) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
161 | (1) |
|
Document Object Model (DOM) |
|
|
162 | (1) |
|
|
163 | (6) |
|
|
163 | (1) |
|
|
163 | (1) |
|
Insecure Object Reference |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
166 | (1) |
|
Insufficient Logging and Monitoring |
|
|
166 | (1) |
|
Weak or Default Configurations |
|
|
167 | (1) |
|
Use of Insecure Functions |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
170 | (3) |
|
Chapter 8 Security Solutions for Infrastructure Management |
|
|
173 | (80) |
|
"Do I Know This Already?" Quiz |
|
|
173 | (4) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
178 | (2) |
|
|
178 | (1) |
|
Device-Tracking Technologies |
|
|
178 | (1) |
|
|
179 | (1) |
|
Object-Tracking and Object-Containment Technologies |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
180 | (5) |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
185 | (16) |
|
|
186 | (2) |
|
|
188 | (5) |
|
Software-Defined Networking |
|
|
193 | (1) |
|
|
194 | (1) |
|
Virtual Private Cloud (VPC) |
|
|
195 | (1) |
|
Virtual Private Network (VPN) |
|
|
195 | (2) |
|
|
197 | (2) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
201 | (7) |
|
Security Advantages and Disadvantages of Virtualization |
|
|
201 | (2) |
|
Type 1 vs. Type 2 Hypervisors |
|
|
203 | (1) |
|
Virtualization Attacks and Vulnerabilities |
|
|
203 | (2) |
|
|
205 | (1) |
|
|
205 | (1) |
|
Vulnerabilities Associated with a Single Physical Server Hosting Multiple Companies' Virtual Machines |
|
|
206 | (1) |
|
Vulnerabilities Associated with a Single Platform Hosting Multiple Companies' Virtual Machines |
|
|
207 | (1) |
|
Virtual Desktop Infrastructure (VDI) |
|
|
207 | (1) |
|
Terminal Services/Application Delivery Services |
|
|
208 | (1) |
|
|
208 | (1) |
|
Identity and Access Management |
|
|
209 | (20) |
|
|
210 | (1) |
|
|
210 | (1) |
|
Identify Relationships Between Resources and Users |
|
|
210 | (1) |
|
|
211 | (1) |
|
Multifactor Authentication (MFA) |
|
|
211 | (1) |
|
|
211 | (1) |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
214 | (1) |
|
|
215 | (2) |
|
|
217 | (2) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
222 | (2) |
|
|
224 | (1) |
|
Role-Based Access Control |
|
|
224 | (1) |
|
Attribute-Based Access Control |
|
|
225 | (3) |
|
|
228 | (1) |
|
|
229 | (1) |
|
Cloud Access Security Broker (CASB) |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
230 | (2) |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
232 | (10) |
|
|
233 | (1) |
|
|
233 | (3) |
|
|
236 | (1) |
|
|
236 | (2) |
|
|
238 | (1) |
|
|
238 | (1) |
|
|
239 | (1) |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
242 | (1) |
|
|
242 | (4) |
|
Certificate Authority and Registration Authority |
|
|
243 | (1) |
|
|
243 | (1) |
|
Certificate Revocation List |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
246 | (1) |
|
|
247 | (1) |
|
|
247 | (1) |
|
|
247 | (3) |
|
|
250 | (1) |
|
|
250 | (3) |
|
Chapter 9 Software Assurance Best Practices |
|
|
253 | (42) |
|
"Do I Know This Already?" Quiz |
|
|
253 | (3) |
|
|
256 | (1) |
|
|
256 | (11) |
|
|
256 | (1) |
|
|
256 | (1) |
|
Configuration Profiles and Payloads |
|
|
256 | (1) |
|
Personally Owned, Corporate Enabled |
|
|
256 | (1) |
|
Corporate-Owned, Personally Enabled |
|
|
257 | (1) |
|
|
257 | (1) |
|
Application, Content, and Data Management |
|
|
257 | (1) |
|
|
257 | (1) |
|
|
258 | (1) |
|
|
258 | (2) |
|
|
260 | (1) |
|
|
260 | (1) |
|
Time-of-Check/Time-of- Use Attacks |
|
|
260 | (1) |
|
Cross-Site Request Forgery (CSRF) |
|
|
261 | (1) |
|
|
262 | (1) |
|
|
263 | (1) |
|
|
263 | (1) |
|
Hardware/Embedded Device Analysis |
|
|
264 | (1) |
|
|
265 | (1) |
|
|
265 | (1) |
|
Central Security Breach Response |
|
|
265 | (1) |
|
|
266 | (1) |
|
Software Development Life Cycle (SDLC) Integration |
|
|
267 | (3) |
|
Step 1 Plan/Initiate Project |
|
|
267 | (1) |
|
Step 2 Gather Requirements |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
270 | (1) |
|
Step 8 Change Management and Configuration Management/Replacement |
|
|
270 | (1) |
|
|
270 | (2) |
|
|
270 | (2) |
|
Software Assessment Methods |
|
|
272 | (3) |
|
|
272 | (1) |
|
|
272 | (1) |
|
Security Regression Testing |
|
|
273 | (1) |
|
|
273 | (1) |
|
|
274 | (1) |
|
|
275 | (1) |
|
Secure Coding Best Practices |
|
|
275 | (11) |
|
|
275 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
277 | (1) |
|
Context-based Authentication |
|
|
277 | (2) |
|
Network Authentication Methods |
|
|
279 | (2) |
|
|
281 | (1) |
|
|
282 | (2) |
|
Certificate-Based Authentication |
|
|
284 | (1) |
|
|
285 | (1) |
|
|
285 | (1) |
|
|
286 | (1) |
|
|
286 | (1) |
|
Formal Methods for Verification of Critical Software |
|
|
286 | (1) |
|
Service-Oriented Architecture |
|
|
287 | (2) |
|
Security Assertions Markup Language (SAML) |
|
|
287 | (1) |
|
Simple Object Access Protocol (SOAP) |
|
|
287 | (1) |
|
Representational State Transfer (REST) |
|
|
288 | (1) |
|
|
288 | (1) |
|
|
289 | (1) |
|
|
289 | (1) |
|
|
290 | (1) |
|
|
291 | (4) |
|
Chapter 10 Hardware Assurance Best Practices |
|
|
295 | (22) |
|
"Do I Know This Already?" Quiz |
|
|
295 | (3) |
|
|
298 | (1) |
|
|
298 | (5) |
|
Trusted Platform Module (TPM) |
|
|
299 | (1) |
|
|
300 | (2) |
|
Hardware Security Module (HSM) |
|
|
302 | (1) |
|
|
302 | (1) |
|
|
303 | (1) |
|
Unified Extensible Firmware Interface (UEFI) |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
305 | (3) |
|
|
305 | (2) |
|
|
307 | (1) |
|
Processor Security Extensions |
|
|
307 | (1) |
|
|
307 | (1) |
|
|
308 | (1) |
|
|
308 | (1) |
|
|
308 | (2) |
|
Measured Boot and Attestation |
|
|
310 | (1) |
|
|
311 | (1) |
|
Integrity Measurement Architecture |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
312 | (1) |
|
|
312 | (1) |
|
|
312 | (1) |
|
|
313 | (4) |
|
Chapter 11 Analyzing Data as Part of Security Monitoring Activities |
|
|
317 | (60) |
|
"Do I Know This Already?" Quiz |
|
|
317 | (3) |
|
|
320 | (1) |
|
|
320 | (1) |
|
|
320 | (1) |
|
|
321 | (21) |
|
|
323 | (1) |
|
|
323 | (1) |
|
|
324 | (1) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
326 | (1) |
|
|
326 | (1) |
|
|
327 | (2) |
|
|
329 | (1) |
|
|
329 | (1) |
|
|
330 | (1) |
|
Runtime Data Integrity Check |
|
|
330 | (2) |
|
Memory Dumping, Runtime Debugging |
|
|
332 | (1) |
|
System and Application Behavior |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
335 | (4) |
|
|
339 | (1) |
|
File Integrity Monitoring |
|
|
340 | (1) |
|
User and Entity Behavior Analytics (UEBA) |
|
|
341 | (1) |
|
|
342 | (6) |
|
Uniform Resource Locator (URL) and Domain Name System (DNS) Analysis |
|
|
342 | (1) |
|
|
342 | (1) |
|
Domain Generation Algorithm |
|
|
343 | (2) |
|
|
345 | (1) |
|
|
346 | (2) |
|
Packet and Protocol Analysis |
|
|
348 | (1) |
|
|
348 | (1) |
|
|
348 | (1) |
|
|
348 | (1) |
|
|
348 | (13) |
|
|
349 | (1) |
|
|
350 | (2) |
|
|
352 | (1) |
|
|
353 | (1) |
|
|
353 | (1) |
|
|
353 | (2) |
|
Web Application Firewall (WAF) |
|
|
355 | (1) |
|
|
356 | (1) |
|
Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) |
|
|
357 | (1) |
|
|
358 | (1) |
|
|
359 | (1) |
|
|
360 | (1) |
|
|
360 | (1) |
|
|
361 | (1) |
|
Organization Impact vs. Localized Impact |
|
|
361 | (1) |
|
Immediate Impact vs. Total Impact |
|
|
361 | (1) |
|
Security Information and Event Management (SIEM) Review |
|
|
361 | (5) |
|
|
362 | (1) |
|
Known-Bad Internet Protocol (IP) |
|
|
363 | (1) |
|
|
363 | (3) |
|
|
366 | (1) |
|
|
366 | (1) |
|
|
366 | (1) |
|
|
367 | (1) |
|
|
367 | (5) |
|
|
368 | (1) |
|
|
368 | (1) |
|
DomainKeys Identified Mail (DKIM) |
|
|
368 | (1) |
|
Sender Policy Framework (SPF) |
|
|
369 | (1) |
|
Domain-based Message Authentication, Reporting, and Conformance (DMARC) |
|
|
369 | (1) |
|
|
369 | (1) |
|
|
369 | (1) |
|
|
370 | (1) |
|
|
370 | (1) |
|
|
371 | (1) |
|
|
372 | (1) |
|
|
372 | (1) |
|
|
372 | (1) |
|
|
372 | (1) |
|
|
372 | (2) |
|
|
374 | (1) |
|
|
374 | (3) |
|
Chapter 12 Implementing Configuration Changes to Existing Controls to Improve Security |
|
|
377 | (24) |
|
"Do I Know This Already?" Quiz |
|
|
377 | (4) |
|
|
381 | (1) |
|
|
381 | (1) |
|
Whitelisting and Blacklisting |
|
|
381 | (2) |
|
Application Whitelisting and Blacklisting |
|
|
382 | (1) |
|
|
382 | (1) |
|
|
383 | (3) |
|
|
383 | (1) |
|
|
384 | (2) |
|
Intrusion Prevention System (IPS) Rules |
|
|
386 | (1) |
|
Data Loss Prevention (DLP) |
|
|
386 | (1) |
|
Endpoint Detection and Response (EDR) |
|
|
387 | (1) |
|
Network Access Control (NAC) |
|
|
387 | (4) |
|
|
389 | (1) |
|
Agent-Based vs. Agentless NAC |
|
|
389 | (1) |
|
|
389 | (2) |
|
|
391 | (1) |
|
|
391 | (1) |
|
|
392 | (1) |
|
|
392 | (2) |
|
|
394 | (2) |
|
|
395 | (1) |
|
|
395 | (1) |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
397 | (4) |
|
Chapter 13 The Importance of Proactive Threat Hunting |
|
|
401 | (18) |
|
"Do I Know This Already?" Quiz |
|
|
401 | (3) |
|
|
404 | (1) |
|
Establishing a Hypothesis |
|
|
404 | (1) |
|
Profiling Threat Actors and Activities |
|
|
405 | (1) |
|
|
406 | (3) |
|
|
406 | (1) |
|
|
406 | (1) |
|
Executable Process Analysis |
|
|
407 | (2) |
|
|
409 | (1) |
|
Reducing the Attack Surface Area |
|
|
409 | (2) |
|
|
410 | (1) |
|
|
410 | (1) |
|
|
411 | (1) |
|
Commercial Business Classifications |
|
|
411 | (1) |
|
Military and Government Classifications |
|
|
412 | (1) |
|
Distribution of Critical Assets |
|
|
412 | (1) |
|
|
412 | (1) |
|
|
413 | (1) |
|
Improving Detection Capabilities |
|
|
413 | (1) |
|
|
413 | (1) |
|
|
414 | (1) |
|
|
414 | (1) |
|
|
414 | (1) |
|
|
415 | (1) |
|
|
415 | (4) |
|
Chapter 14 Automation Concepts and Technologies |
|
|
419 | (14) |
|
"Do I Know This Already?" Quiz |
|
|
419 | (3) |
|
|
422 | (1) |
|
|
422 | (1) |
|
|
423 | (1) |
|
Application Programming Interface (API) Integration |
|
|
424 | (1) |
|
Automated Malware Signature Creation |
|
|
424 | (1) |
|
|
425 | (1) |
|
|
426 | (1) |
|
|
426 | (1) |
|
Use of Automation Protocols and Standards |
|
|
427 | (1) |
|
Security Content Automation Protocol (SCAP) |
|
|
427 | (1) |
|
|
428 | (1) |
|
Continuous Deployment/Delivery |
|
|
428 | (1) |
|
|
429 | (1) |
|
|
429 | (1) |
|
|
430 | (1) |
|
|
430 | (3) |
|
Chapter 15 The Incident Response Process |
|
|
433 | (16) |
|
"Do I Know This Already?" Quiz |
|
|
433 | (2) |
|
|
435 | (1) |
|
|
435 | (1) |
|
Limiting Communication to Trusted Parties |
|
|
435 | (1) |
|
Disclosing Based on Regulatory/Legislative Requirements |
|
|
435 | (1) |
|
Preventing Inadvertent Release of Information |
|
|
435 | (1) |
|
Using a Secure Method of Communication |
|
|
435 | (1) |
|
|
436 | (1) |
|
Response Coordination with Relevant Entities |
|
|
436 | (3) |
|
|
436 | (1) |
|
|
437 | (1) |
|
|
437 | (1) |
|
|
437 | (1) |
|
|
437 | (1) |
|
|
438 | (1) |
|
|
438 | (1) |
|
Factors Contributing to Data Criticality |
|
|
439 | (6) |
|
Personally Identifiable Information (PII) |
|
|
439 | (1) |
|
Personal Health Information (PHI) |
|
|
440 | (1) |
|
Sensitive Personal Information (SPI) |
|
|
441 | (1) |
|
|
441 | (1) |
|
|
441 | (1) |
|
|
442 | (1) |
|
|
442 | (1) |
|
|
443 | (1) |
|
|
443 | (1) |
|
|
444 | (1) |
|
Securing Intellectual Property |
|
|
444 | (1) |
|
|
444 | (1) |
|
|
445 | (1) |
|
|
445 | (1) |
|
|
446 | (1) |
|
|
446 | (3) |
|
Chapter 16 Applying the Appropriate Incident Response Procedure |
|
|
449 | (20) |
|
"Do I Know This Already?" Quiz |
|
|
449 | (3) |
|
|
452 | (1) |
|
|
452 | (2) |
|
|
452 | (1) |
|
|
453 | (1) |
|
Documentation of Procedures |
|
|
453 | (1) |
|
|
454 | (4) |
|
Characteristics Contributing to Severity Level Classification |
|
|
455 | (1) |
|
Downtime and Recovery Time |
|
|
455 | (1) |
|
|
456 | (1) |
|
|
456 | (1) |
|
System Process Criticality |
|
|
457 | (1) |
|
|
457 | (1) |
|
|
458 | (1) |
|
|
458 | (1) |
|
|
458 | (1) |
|
|
459 | (1) |
|
|
459 | (4) |
|
|
459 | (1) |
|
|
460 | (1) |
|
|
460 | (1) |
|
|
460 | (1) |
|
|
461 | (1) |
|
Restoration of Permissions |
|
|
461 | (1) |
|
Reconstitution of Resources |
|
|
462 | (1) |
|
Restoration of Capabilities and Services |
|
|
462 | (1) |
|
Verification of Logging/Communication to Security Monitoring |
|
|
462 | (1) |
|
|
463 | (2) |
|
|
463 | (1) |
|
|
463 | (1) |
|
|
464 | (1) |
|
Incident Response Plan Update |
|
|
464 | (1) |
|
|
464 | (1) |
|
Indicator of Compromise (IoC) Generation |
|
|
465 | (1) |
|
|
465 | (1) |
|
|
465 | (1) |
|
|
465 | (1) |
|
|
466 | (1) |
|
|
466 | (3) |
|
Chapter 17 Analyzing Potential Indicators of Compromise |
|
|
469 | (16) |
|
"Do I Know This Already?" Quiz |
|
|
469 | (3) |
|
|
472 | (1) |
|
Network-Related Indicators of Compromise |
|
|
472 | (5) |
|
|
472 | (1) |
|
|
473 | (1) |
|
Irregular Peer-to-Peer Communication |
|
|
473 | (2) |
|
Rogue Device on the Network |
|
|
475 | (1) |
|
|
476 | (1) |
|
|
476 | (1) |
|
Common Protocol over Non-standard Port |
|
|
476 | (1) |
|
Host-Related Indicators of Compromise |
|
|
477 | (3) |
|
|
477 | (1) |
|
|
477 | (1) |
|
Drive Capacity Consumption |
|
|
477 | (1) |
|
|
477 | (1) |
|
|
478 | (1) |
|
|
479 | (1) |
|
|
479 | (1) |
|
|
479 | (1) |
|
Abnormal OS Process Behavior |
|
|
479 | (1) |
|
File System Change or Anomaly |
|
|
479 | (1) |
|
Registry Change or Anomaly |
|
|
480 | (1) |
|
Unauthorized Scheduled Task |
|
|
480 | (1) |
|
Application-Related Indicators of Compromise |
|
|
480 | (2) |
|
|
480 | (1) |
|
Introduction of New Accounts |
|
|
480 | (1) |
|
|
480 | (1) |
|
Unexpected Outbound Communication |
|
|
481 | (1) |
|
|
481 | (1) |
|
|
481 | (1) |
|
|
482 | (1) |
|
|
482 | (1) |
|
|
482 | (1) |
|
|
482 | (3) |
|
Chapter 18 Utilizing Basic Digital Forensics Techniques |
|
|
485 | (20) |
|
"Do I Know This Already?" Quiz |
|
|
485 | (3) |
|
|
488 | (1) |
|
|
488 | (2) |
|
|
488 | (2) |
|
|
490 | (1) |
|
|
490 | (4) |
|
|
491 | (1) |
|
|
491 | (1) |
|
|
491 | (1) |
|
|
491 | (1) |
|
|
492 | (1) |
|
|
493 | (1) |
|
|
494 | (1) |
|
|
495 | (2) |
|
|
497 | (1) |
|
|
497 | (1) |
|
|
497 | (2) |
|
|
498 | (1) |
|
|
498 | (1) |
|
Forensic Investigation Suite |
|
|
498 | (1) |
|
|
499 | (1) |
|
|
499 | (1) |
|
|
500 | (1) |
|
|
500 | (1) |
|
|
501 | (1) |
|
|
501 | (1) |
|
|
501 | (1) |
|
|
501 | (1) |
|
|
502 | (3) |
|
Chapter 19 The Importance of Data Privacy and Protection |
|
|
505 | (22) |
|
"Do I Know This Already?" Quiz |
|
|
505 | (3) |
|
|
508 | (1) |
|
|
508 | (1) |
|
|
508 | (8) |
|
|
508 | (1) |
|
|
508 | (1) |
|
|
509 | (1) |
|
|
509 | (1) |
|
Personally Identifiable Information (PII) |
|
|
509 | (1) |
|
Personal Health Information (PHI) |
|
|
510 | (1) |
|
|
510 | (1) |
|
|
510 | (1) |
|
|
510 | (1) |
|
|
510 | (4) |
|
|
514 | (1) |
|
|
515 | (1) |
|
|
515 | (1) |
|
Non-disclosure agreement (NDA) |
|
|
516 | (1) |
|
|
516 | (5) |
|
|
516 | (1) |
|
Data Loss Prevention (DLP) |
|
|
516 | (1) |
|
|
516 | (1) |
|
|
517 | (1) |
|
|
517 | (1) |
|
Digital Rights Management (DRM) |
|
|
517 | (3) |
|
|
520 | (1) |
|
|
520 | (1) |
|
|
520 | (1) |
|
|
520 | (1) |
|
|
521 | (1) |
|
|
521 | (1) |
|
Geographic Access Requirements |
|
|
521 | (1) |
|
|
521 | (1) |
|
|
521 | (1) |
|
|
522 | (1) |
|
|
522 | (1) |
|
|
523 | (4) |
|
Chapter 20 Applying Security Concepts in Support of Organizational Risk Mitigation |
|
|
527 | (22) |
|
"Do I Know This Already?" Quiz |
|
|
527 | (3) |
|
|
530 | (1) |
|
|
530 | (2) |
|
Identify Critical Processes and Resources |
|
|
530 | (1) |
|
Identify Outage Impacts and Estimate Downtime |
|
|
531 | (1) |
|
Identify Resource Requirements |
|
|
531 | (1) |
|
Identify Recovery Priorities |
|
|
531 | (1) |
|
|
532 | (1) |
|
|
532 | (1) |
|
Risk Identification Process |
|
|
532 | (2) |
|
Make Risk Determination Based upon Known Metrics |
|
|
533 | (1) |
|
Qualitative Risk Analysis |
|
|
533 | (1) |
|
Quantitative Risk Analysis |
|
|
534 | (1) |
|
|
534 | (2) |
|
|
535 | (1) |
|
|
535 | (1) |
|
Communication of Risk Factors |
|
|
536 | (1) |
|
|
537 | (2) |
|
|
538 | (1) |
|
|
538 | (1) |
|
|
538 | (1) |
|
|
538 | (1) |
|
Organizational Governance |
|
|
539 | (1) |
|
Business Process Interruption |
|
|
539 | (1) |
|
|
539 | (1) |
|
|
539 | (2) |
|
|
539 | (2) |
|
|
541 | (1) |
|
Documented Compensating Controls |
|
|
541 | (1) |
|
|
542 | (1) |
|
|
542 | (1) |
|
|
542 | (1) |
|
|
543 | (1) |
|
|
543 | (1) |
|
|
543 | (1) |
|
|
543 | (1) |
|
|
543 | (1) |
|
Hardware Source Authenticity |
|
|
544 | (1) |
|
|
544 | (1) |
|
|
544 | (1) |
|
|
544 | (1) |
|
|
545 | (1) |
|
|
545 | (4) |
|
Chapter 21 The Importance of Frameworks, Policies, Procedures, and Controls |
|
|
549 | (30) |
|
"Do I Know This Already?" Quiz |
|
|
549 | (3) |
|
|
552 | (1) |
|
|
552 | (10) |
|
|
552 | (1) |
|
National Institute of Standards and Technology (NIST) |
|
|
552 | (1) |
|
|
553 | (1) |
|
The Open Group Architecture Framework (TOGAF) |
|
|
554 | (1) |
|
|
555 | (1) |
|
NIST Cybersecurity Framework Version 1.1 |
|
|
555 | (1) |
|
|
556 | (3) |
|
|
559 | (1) |
|
|
559 | (1) |
|
|
559 | (3) |
|
|
562 | (1) |
|
|
562 | (8) |
|
|
563 | (1) |
|
Acceptable Use Policy (AUP) |
|
|
563 | (1) |
|
|
564 | (3) |
|
|
567 | (1) |
|
|
567 | (1) |
|
|
568 | (1) |
|
|
569 | (1) |
|
|
570 | (1) |
|
|
570 | (1) |
|
|
570 | (1) |
|
|
571 | (1) |
|
|
571 | (1) |
|
|
571 | (2) |
|
|
572 | (1) |
|
|
572 | (1) |
|
|
572 | (1) |
|
|
572 | (1) |
|
|
572 | (1) |
|
|
572 | (1) |
|
|
573 | (2) |
|
|
573 | (2) |
|
|
575 | (1) |
|
|
575 | (1) |
|
|
575 | (1) |
|
|
576 | (1) |
|
|
576 | (3) |
|
Chapter 22 Final Preparation |
|
|
579 | (6) |
|
|
579 | (1) |
|
|
580 | (2) |
|
Tools for Final Preparation |
|
|
582 | (1) |
|
Pearson Test Prep Practice Test Software and Questions on the Website |
|
|
582 | (1) |
|
|
582 | (1) |
|
Chapter-Ending Review Tools |
|
|
582 | (1) |
|
Suggested Plan for Final Review/Study |
|
|
583 | (1) |
|
|
583 | (2) |
Appendix A Answers to the "Do I Know This Already?" Quizzes and Review Questions |
|
585 | (66) |
Appendix B CompTIA Cybersecurity Analyst (CySA+) CSO-002 Cert Guide Exam Updates |
|
651 | (2) |
Glossary of Key Terms |
|
653 | (36) |
Index |
|
689 | |
Online Elements |
|
Appendix C Memory Tables |
|
Appendix D Memory Tables Answer Key |
|
Appendix E Study Planner |
|
Glossary of Key Terms |
|