Preface |
|
xxxii | |
Acknowledgments |
|
xxxiii | |
Introduction |
|
xxxiv | |
Objective Map: Exam SYO-501 |
|
xxxix | |
|
Part I Threats, Attacks, and Vulnerabilities |
|
|
|
Chapter 1 Malware and Indicators of Compromise |
|
|
3 | (14) |
|
|
3 | (7) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
11 | (6) |
|
|
12 | (3) |
|
|
15 | (2) |
|
|
17 | (40) |
|
Social Engineering Methods |
|
|
18 | (7) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
Social Engineering Principles |
|
|
23 | (2) |
|
Application/Service Attacks |
|
|
25 | (17) |
|
|
26 | (1) |
|
|
27 | (2) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
Cross-Site Request Forgery |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
33 | (2) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
Hijacking and Related Attacks |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
39 | (3) |
|
|
42 | (5) |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (3) |
|
|
47 | (1) |
|
Known Plaintext/Ciphertext |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
50 | (7) |
|
|
51 | (3) |
|
|
54 | (3) |
|
|
57 | (14) |
|
|
57 | (5) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
Use of Open Source Intelligence |
|
|
63 | (1) |
|
|
64 | (7) |
|
|
64 | (3) |
|
|
67 | (4) |
|
Chapter 4 Vulnerability Scanning and Penetration Testing |
|
|
71 | (12) |
|
Penetration Testing Concepts |
|
|
71 | (5) |
|
|
72 | (1) |
|
|
72 | (2) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
Pen Testing vs. Vulnerability Scanning |
|
|
76 | (1) |
|
Vulnerability Scanning Concepts |
|
|
76 | (2) |
|
Passively Test Security Controls |
|
|
76 | (1) |
|
|
76 | (1) |
|
Identify Lack of Security Controls |
|
|
77 | (1) |
|
Identify Common Misconfigurations |
|
|
77 | (1) |
|
Intrusive vs. Non-intrusive |
|
|
77 | (1) |
|
Credentialed vs. Non-credentialed |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
78 | (5) |
|
|
78 | (3) |
|
|
81 | (2) |
|
Chapter 5 Vulnerabilities and Impacts |
|
|
83 | (20) |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
Misconfiguration/Weak Configuration |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
Improperly Configured Accounts |
|
|
89 | (1) |
|
Vulnerable Business Processes |
|
|
89 | (1) |
|
Weak Cipher Suites and Implementations |
|
|
89 | (1) |
|
Memory/Buffer Vulnerability |
|
|
90 | (2) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
92 | (1) |
|
System Sprawl/Undocumented Assets |
|
|
92 | (1) |
|
Architecture/Design Weaknesses |
|
|
93 | (1) |
|
|
93 | (1) |
|
Improper Certificate and Key Management |
|
|
94 | (1) |
|
|
94 | (9) |
|
|
94 | (4) |
|
|
98 | (5) |
|
Part II Technologies and Tools |
|
|
|
Chapter 6 Network Components |
|
|
103 | (42) |
|
|
103 | (5) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
106 | (1) |
|
Application-Based vs. Network-Based |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
107 | (1) |
|
Secure Network Administration Principles |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
108 | (8) |
|
Remote Access vs. Site-to-Site |
|
|
108 | (1) |
|
|
109 | (6) |
|
Split Tunnel vs. Full Tunnel |
|
|
115 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
116 | (4) |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
121 | (3) |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
124 | (1) |
|
Forward and Reverse Proxy |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
125 | (2) |
|
|
126 | (1) |
|
|
126 | (1) |
|
|
126 | (1) |
|
|
126 | (1) |
|
|
127 | (3) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
Antenna Types and Placement |
|
|
129 | (1) |
|
|
130 | (1) |
|
Controller-Based vs. Standalone |
|
|
130 | (1) |
|
|
130 | (2) |
|
|
131 | (1) |
|
|
131 | (1) |
|
Automated Alerting and Triggers |
|
|
131 | (1) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
133 | (2) |
|
Dissolvable vs. Permanent |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
135 | (3) |
|
|
135 | (2) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
140 | (5) |
|
|
140 | (3) |
|
|
143 | (2) |
|
Chapter 7 Security Tools and Technologies |
|
|
145 | (24) |
|
|
145 | (2) |
|
|
146 | (1) |
|
|
147 | (2) |
|
|
149 | (1) |
|
|
149 | (1) |
|
Wireless Scanners/Cracker |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (3) |
|
Configuration Compliance Scanner |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
157 | (4) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
160 | (1) |
|
|
160 | (1) |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
161 | (1) |
|
|
161 | (1) |
|
|
161 | (1) |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
Data Execution Prevention |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (5) |
|
|
164 | (2) |
|
|
166 | (3) |
|
Chapter 8 Troubleshooting Common Security Issues |
|
|
169 | (14) |
|
Unencrypted Credentials/Clear Text |
|
|
169 | (1) |
|
Logs and Events Anomalies |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
171 | (2) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
Weak Security Configurations |
|
|
173 | (1) |
|
|
173 | (2) |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
License Compliance Violation (Availability/Integrity) |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
177 | (6) |
|
|
178 | (2) |
|
|
180 | (3) |
|
|
183 | (20) |
|
|
183 | (4) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
Mobile Device Management Concepts |
|
|
187 | (5) |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
189 | (1) |
|
Push Notification Services |
|
|
189 | (1) |
|
|
190 | (1) |
|
|
191 | (1) |
|
Context-Aware Authentication |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
Enforcement and Monitoring |
|
|
192 | (4) |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
196 | (2) |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
198 | (5) |
|
|
198 | (3) |
|
|
201 | (2) |
|
Chapter 10 Implementing Secure Protocols |
|
|
203 | (12) |
|
|
203 | (3) |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
206 | (3) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
208 | (1) |
|
Network Address Allocation |
|
|
208 | (1) |
|
|
209 | (1) |
|
|
209 | (6) |
|
|
209 | (3) |
|
|
212 | (3) |
|
Part III Architecture and Design |
|
|
|
Chapter 11 Architecture Frameworks and Secure Network Architectures |
|
|
215 | (26) |
|
Industry-Standard Frameworks and Reference Architectures |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
National vs. International |
|
|
217 | (1) |
|
Industry-Specific Frameworks |
|
|
217 | (1) |
|
Benchmarks/Secure Configuration Guides |
|
|
217 | (3) |
|
Platform/Vendor-Specific Guides |
|
|
218 | (1) |
|
|
219 | (1) |
|
Defense-in-Depth/Layered Security |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
221 | (7) |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
225 | (2) |
|
|
227 | (1) |
|
Segregation/Segmentation/Isolation |
|
|
228 | (4) |
|
|
229 | (1) |
|
|
229 | (2) |
|
|
231 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
232 | (1) |
|
|
232 | (1) |
|
Security Device/Technology Placement |
|
|
232 | (4) |
|
|
233 | (1) |
|
|
233 | (1) |
|
|
233 | (1) |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
235 | (1) |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
236 | (5) |
|
|
236 | (3) |
|
|
239 | (2) |
|
Chapter 12 Secure Systems Design and Deployment |
|
|
241 | (20) |
|
Hardware/Firmware Security |
|
|
241 | (3) |
|
|
242 | (1) |
|
|
242 | (1) |
|
|
242 | (1) |
|
|
243 | (1) |
|
Secure Boot and Attestation |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
244 | (6) |
|
|
245 | (2) |
|
|
247 | (1) |
|
Disabling Unnecessary Ports and Services |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
248 | (1) |
|
|
249 | (1) |
|
Application Whitelisting/Blacklisting |
|
|
249 | (1) |
|
Disable Default Accounts/Passwords |
|
|
250 | (1) |
|
|
250 | (2) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
251 | (1) |
|
Wi-Fi-Enabled MicroSD Cards |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
252 | (1) |
|
|
252 | (1) |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
253 | (1) |
|
|
253 | (1) |
|
|
253 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
255 | (6) |
|
|
255 | (3) |
|
|
258 | (3) |
|
Chapter 13 Embedded Systems |
|
|
261 | (14) |
|
|
262 | (1) |
|
|
262 | (2) |
|
|
263 | (1) |
|
|
263 | (1) |
|
|
264 | (1) |
|
|
264 | (1) |
|
|
264 | (1) |
|
|
265 | (1) |
|
|
265 | (1) |
|
|
266 | (2) |
|
|
266 | (1) |
|
|
267 | (1) |
|
|
267 | (1) |
|
|
268 | (7) |
|
|
269 | (3) |
|
|
272 | (3) |
|
Chapter 14 Application Development and Deployment |
|
|
275 | (20) |
|
Development Lifecycle Models |
|
|
275 | (2) |
|
|
275 | (2) |
|
|
277 | (2) |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
279 | (1) |
|
|
279 | (1) |
|
Version Control and Change Management |
|
|
279 | (1) |
|
Provisioning and Deprovisioning |
|
|
280 | (1) |
|
|
280 | (5) |
|
|
281 | (1) |
|
|
281 | (1) |
|
|
282 | (1) |
|
|
282 | (1) |
|
|
283 | (1) |
|
|
283 | (1) |
|
|
283 | (1) |
|
|
283 | (1) |
|
Server-Side vs. Client-Side Execution and Validation |
|
|
284 | (1) |
|
|
285 | (1) |
|
Use of Third-Party Libraries and SDKs |
|
|
285 | (1) |
|
|
285 | (1) |
|
|
285 | (3) |
|
|
286 | (1) |
|
Dynamic Analysis (e.g., Fuzzing) |
|
|
286 | (1) |
|
|
287 | (1) |
|
|
288 | (1) |
|
|
288 | (1) |
|
Compiled vs. Runtime Code |
|
|
288 | (1) |
|
|
289 | (6) |
|
|
289 | (3) |
|
|
292 | (3) |
|
Chapter 15 Cloud and Virtualization |
|
|
295 | (12) |
|
|
295 | (2) |
|
|
296 | (1) |
|
|
296 | (1) |
|
Application Cells/Containers |
|
|
296 | (1) |
|
|
297 | (1) |
|
|
297 | (1) |
|
|
297 | (1) |
|
|
298 | (2) |
|
|
298 | (1) |
|
|
298 | (1) |
|
|
298 | (1) |
|
|
299 | (1) |
|
|
299 | (1) |
|
|
299 | (1) |
|
|
299 | (1) |
|
On-Premise vs. Hosted vs. Cloud |
|
|
300 | (1) |
|
|
300 | (1) |
|
Cloud Access Security Broker |
|
|
300 | (1) |
|
|
301 | (1) |
|
|
301 | (6) |
|
|
302 | (3) |
|
|
305 | (2) |
|
Chapter 16 Resiliency and Automation Strategies |
|
|
307 | (14) |
|
|
307 | (2) |
|
Automated Courses of Action |
|
|
308 | (1) |
|
|
308 | (1) |
|
|
308 | (1) |
|
|
309 | (1) |
|
|
310 | (1) |
|
|
310 | (2) |
|
|
310 | (1) |
|
|
311 | (1) |
|
Rollback to Known Configuration |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
312 | (1) |
|
|
312 | (1) |
|
|
312 | (1) |
|
|
312 | (1) |
|
|
313 | (1) |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
315 | (6) |
|
|
315 | (3) |
|
|
318 | (3) |
|
Chapter 17 Physical Security Controls |
|
|
321 | (22) |
|
|
321 | (1) |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
323 | (1) |
|
|
323 | (1) |
|
Secure Cabinets/Enclosures |
|
|
323 | (1) |
|
Protected Distribution/Protected Cabling |
|
|
324 | (1) |
|
|
324 | (1) |
|
|
324 | (1) |
|
|
324 | (1) |
|
|
325 | (2) |
|
|
327 | (1) |
|
|
328 | (1) |
|
|
329 | (1) |
|
|
329 | (5) |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
330 | (4) |
|
|
334 | (1) |
|
|
334 | (1) |
|
|
334 | (1) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
336 | (7) |
|
|
337 | (2) |
|
|
339 | (4) |
|
Part IV Identity and Access Management |
|
|
|
Chapter 18 Identity, Access, and Accounts |
|
|
343 | (20) |
|
Identification, Authentication, Authorization, and Accounting (AAA) |
|
|
343 | (1) |
|
Multifactor Authentication |
|
|
344 | (2) |
|
|
345 | (1) |
|
|
345 | (1) |
|
|
345 | (1) |
|
|
346 | (1) |
|
|
346 | (1) |
|
|
346 | (1) |
|
|
347 | (1) |
|
|
347 | (1) |
|
|
347 | (3) |
|
|
347 | (1) |
|
Stated and Generic Accounts/Credentials |
|
|
348 | (1) |
|
|
349 | (1) |
|
|
349 | (1) |
|
|
349 | (1) |
|
|
350 | (4) |
|
|
350 | (1) |
|
|
350 | (1) |
|
Permission Auditing and Review |
|
|
350 | (1) |
|
Usage Auditing and Review |
|
|
350 | (1) |
|
|
351 | (1) |
|
|
351 | (1) |
|
Standard Naming Convention |
|
|
351 | (1) |
|
|
352 | (1) |
|
Group-Based Access Control |
|
|
352 | (2) |
|
|
354 | (1) |
|
Account Policy Enforcement |
|
|
354 | (4) |
|
|
354 | (1) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
356 | (1) |
|
|
356 | (1) |
|
|
356 | (1) |
|
|
357 | (1) |
|
|
357 | (1) |
|
|
357 | (1) |
|
|
358 | (5) |
|
|
358 | (3) |
|
|
361 | (2) |
|
Chapter 19 Identity and Access Services |
|
|
363 | (16) |
|
|
363 | (1) |
|
|
364 | (1) |
|
|
365 | (3) |
|
|
366 | (1) |
|
|
366 | (2) |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
369 | (1) |
|
|
369 | (3) |
|
|
372 | (1) |
|
|
372 | (1) |
|
|
372 | (1) |
|
|
373 | (1) |
|
|
373 | (1) |
|
|
373 | (1) |
|
|
374 | (5) |
|
|
374 | (3) |
|
|
377 | (2) |
|
Chapter 20 Identity and Access Management Controls |
|
|
379 | (24) |
|
|
379 | (4) |
|
|
381 | (1) |
|
|
381 | (1) |
|
|
382 | (1) |
|
Role-Based Access Control |
|
|
382 | (1) |
|
Rule-Based Access Control |
|
|
382 | (1) |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
384 | (1) |
|
|
384 | (5) |
|
|
385 | (1) |
|
|
385 | (1) |
|
|
385 | (1) |
|
|
386 | (1) |
|
|
386 | (1) |
|
False Positives and False Negatives |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
388 | (1) |
|
|
388 | (1) |
|
Biometrics Calculation Example |
|
|
389 | (1) |
|
|
389 | (3) |
|
|
391 | (1) |
|
|
391 | (1) |
|
|
392 | (1) |
|
Certificate-Based Authentication |
|
|
392 | (1) |
|
|
392 | (1) |
|
|
392 | (1) |
|
|
393 | (1) |
|
|
393 | (1) |
|
|
394 | (9) |
|
|
394 | (3) |
|
|
397 | (6) |
|
|
|
Chapter 21 Policies, Plans, and Procedures |
|
|
403 | (16) |
|
Standard Operating Procedure |
|
|
404 | (1) |
|
|
404 | (1) |
|
|
404 | (1) |
|
|
404 | (1) |
|
|
405 | (1) |
|
|
405 | (1) |
|
|
405 | (6) |
|
|
405 | (1) |
|
|
406 | (1) |
|
|
406 | (1) |
|
|
407 | (1) |
|
|
407 | (1) |
|
|
407 | (1) |
|
Role-Based Awareness Training |
|
|
407 | (2) |
|
|
409 | (1) |
|
|
409 | (1) |
|
|
410 | (1) |
|
Acceptable Use Policy/Rules of Behavior |
|
|
410 | (1) |
|
|
411 | (1) |
|
General Security Policies |
|
|
411 | (2) |
|
Social Media Networks/Applications |
|
|
412 | (1) |
|
|
412 | (1) |
|
|
413 | (6) |
|
|
413 | (3) |
|
|
416 | (3) |
|
Chapter 22 Risk Management and Business Impact Analysis |
|
|
419 | (22) |
|
Business Impact Analysis Concepts |
|
|
419 | (5) |
|
|
420 | (1) |
|
|
420 | (1) |
|
|
420 | (1) |
|
Mission-Essential Functions |
|
|
421 | (1) |
|
Identification of Critical Systems |
|
|
421 | (1) |
|
|
421 | (1) |
|
|
422 | (1) |
|
Privacy Impact Assessment |
|
|
423 | (1) |
|
Privacy Threshold Assessment |
|
|
423 | (1) |
|
|
424 | (9) |
|
|
424 | (1) |
|
|
425 | (7) |
|
|
432 | (1) |
|
|
433 | (2) |
|
|
433 | (1) |
|
|
433 | (1) |
|
|
434 | (1) |
|
|
434 | (1) |
|
|
434 | (1) |
|
|
434 | (1) |
|
|
434 | (1) |
|
|
434 | (1) |
|
|
435 | (6) |
|
|
435 | (3) |
|
|
438 | (3) |
|
Chapter 23 Incident Response, Disaster Recovery, and Continuity of Operations |
|
|
441 | (20) |
|
|
442 | (2) |
|
Documented Incident Types/Category Definitions |
|
|
442 | (1) |
|
Roles and Responsibilities |
|
|
442 | (1) |
|
Reporting Requirements/Escalation |
|
|
443 | (1) |
|
Cyber-Incident Response Teams |
|
|
443 | (1) |
|
|
444 | (1) |
|
Incident Response Process |
|
|
444 | (2) |
|
|
444 | (1) |
|
|
444 | (1) |
|
|
445 | (1) |
|
|
445 | (1) |
|
|
446 | (1) |
|
|
446 | (1) |
|
|
446 | (1) |
|
|
447 | (1) |
|
|
447 | (1) |
|
|
447 | (1) |
|
|
447 | (1) |
|
|
448 | (1) |
|
|
448 | (2) |
|
|
449 | (1) |
|
|
449 | (1) |
|
|
450 | (1) |
|
|
450 | (1) |
|
Geographic Considerations |
|
|
450 | (2) |
|
|
451 | (1) |
|
|
451 | (1) |
|
|
451 | (1) |
|
|
451 | (1) |
|
|
452 | (1) |
|
Continuity of Operation Planning |
|
|
452 | (2) |
|
|
452 | (1) |
|
|
453 | (1) |
|
|
453 | (1) |
|
Alternate Processing Sites |
|
|
453 | (1) |
|
Alternate Business Practices |
|
|
454 | (1) |
|
|
454 | (7) |
|
|
455 | (2) |
|
|
457 | (4) |
|
Chapter 24 Digital Forensics |
|
|
461 | (16) |
|
|
461 | (1) |
|
|
462 | (1) |
|
|
463 | (1) |
|
|
464 | (5) |
|
|
465 | (1) |
|
|
465 | (1) |
|
Three Rules Regarding Evidence |
|
|
465 | (1) |
|
|
466 | (1) |
|
|
467 | (1) |
|
|
467 | (1) |
|
|
467 | (1) |
|
|
468 | (1) |
|
|
468 | (1) |
|
|
469 | (1) |
|
|
469 | (1) |
|
|
470 | (1) |
|
Strategic Intelligence/Counterintelligence Gathering |
|
|
470 | (1) |
|
|
471 | (1) |
|
|
471 | (1) |
|
|
471 | (6) |
|
|
472 | (3) |
|
|
475 | (2) |
|
Chapter 25 Data Security and Privacy Practices |
|
|
477 | (14) |
|
Data Destruction and Media Sanitization |
|
|
477 | (2) |
|
|
478 | (1) |
|
|
478 | (1) |
|
|
478 | (1) |
|
|
478 | (1) |
|
|
479 | (1) |
|
|
479 | (1) |
|
|
479 | (1) |
|
Data Sensitivity Labeling and Handling |
|
|
479 | (3) |
|
|
480 | (1) |
|
|
480 | (1) |
|
|
480 | (1) |
|
|
481 | (1) |
|
|
481 | (1) |
|
|
481 | (1) |
|
|
482 | (1) |
|
|
482 | (1) |
|
|
482 | (1) |
|
|
482 | (1) |
|
|
482 | (1) |
|
|
483 | (2) |
|
|
485 | (6) |
|
|
485 | (3) |
|
|
488 | (3) |
|
Part VI Cryptography and Public Key Infrastructure |
|
|
|
Chapter 26 Cryptographic Concepts |
|
|
491 | (22) |
|
General Cryptographic Concepts |
|
|
491 | (7) |
|
|
492 | (1) |
|
|
492 | (1) |
|
|
493 | (1) |
|
|
494 | (1) |
|
|
495 | (1) |
|
|
495 | (1) |
|
|
496 | (1) |
|
|
497 | (1) |
|
Weak/Deprecated Algorithms |
|
|
498 | (1) |
|
|
498 | (1) |
|
|
498 | (9) |
|
|
499 | (1) |
|
|
500 | (1) |
|
|
500 | (1) |
|
|
500 | (1) |
|
|
500 | (1) |
|
|
501 | (1) |
|
|
501 | (1) |
|
|
502 | (1) |
|
|
502 | (1) |
|
|
502 | (1) |
|
|
503 | (1) |
|
|
503 | (1) |
|
|
503 | (1) |
|
|
503 | (1) |
|
Random/Pseudo-Random Number Generation |
|
|
504 | (1) |
|
|
504 | (1) |
|
Implementation vs. Algorithm Selection |
|
|
504 | (1) |
|
|
505 | (1) |
|
Security Through Obscurity |
|
|
505 | (1) |
|
|
505 | (2) |
|
|
507 | (6) |
|
|
507 | (3) |
|
|
510 | (3) |
|
Chapter 27 Cryptographic Algorithms |
|
|
513 | (16) |
|
|
513 | (3) |
|
|
513 | (1) |
|
|
514 | (1) |
|
|
514 | (1) |
|
|
515 | (1) |
|
|
515 | (1) |
|
|
516 | (1) |
|
|
516 | (1) |
|
|
516 | (1) |
|
|
516 | (1) |
|
|
516 | (1) |
|
|
517 | (1) |
|
|
517 | (3) |
|
|
518 | (1) |
|
|
518 | (1) |
|
|
518 | (1) |
|
|
519 | (1) |
|
|
520 | (1) |
|
|
520 | (2) |
|
|
520 | (1) |
|
|
520 | (1) |
|
|
521 | (1) |
|
|
522 | (1) |
|
Key Stretching Algorithms |
|
|
522 | (1) |
|
|
522 | (1) |
|
|
522 | (1) |
|
|
523 | (1) |
|
|
523 | (1) |
|
|
523 | (1) |
|
|
523 | (1) |
|
|
524 | (5) |
|
|
524 | (2) |
|
|
526 | (3) |
|
Chapter 28 Wireless Security |
|
|
529 | (14) |
|
|
530 | (2) |
|
|
530 | (1) |
|
|
531 | (1) |
|
|
531 | (1) |
|
|
531 | (1) |
|
|
531 | (1) |
|
|
532 | (2) |
|
|
532 | (1) |
|
|
532 | (1) |
|
|
532 | (1) |
|
|
533 | (1) |
|
|
533 | (1) |
|
|
533 | (1) |
|
|
533 | (1) |
|
|
534 | (3) |
|
PSK vs. Enterprise vs. Open |
|
|
534 | (1) |
|
|
535 | (1) |
|
|
535 | (1) |
|
|
535 | (2) |
|
|
537 | (6) |
|
|
538 | (2) |
|
|
540 | (3) |
|
Chapter 29 Public Key Infrastructure |
|
|
543 | (30) |
|
|
543 | (9) |
|
|
546 | (1) |
|
|
546 | (1) |
|
|
547 | (2) |
|
|
549 | (1) |
|
|
550 | (1) |
|
|
550 | (2) |
|
|
552 | (1) |
|
|
552 | (1) |
|
|
552 | (1) |
|
|
552 | (8) |
|
|
552 | (1) |
|
|
553 | (1) |
|
|
553 | (1) |
|
|
553 | (6) |
|
|
559 | (1) |
|
|
559 | (1) |
|
|
560 | (4) |
|
|
561 | (1) |
|
|
562 | (1) |
|
|
562 | (1) |
|
|
563 | (1) |
|
|
563 | (1) |
|
|
563 | (1) |
|
|
563 | (1) |
|
|
563 | (1) |
|
|
564 | (1) |
|
|
564 | (1) |
|
|
564 | (2) |
|
|
565 | (1) |
|
|
565 | (1) |
|
|
565 | (1) |
|
|
565 | (1) |
|
|
566 | (1) |
|
|
566 | (1) |
|
|
566 | (1) |
|
|
566 | (7) |
|
|
566 | (3) |
|
|
569 | (4) |
|
Part VII Appendixes and Glossary |
|
|
|
Appendix A OSI Model and Internet Protocols |
|
|
573 | (10) |
|
Networking Frameworks and Protocols |
|
|
573 | (1) |
|
|
574 | (4) |
|
|
576 | (1) |
|
|
577 | (1) |
|
|
577 | (1) |
|
|
577 | (1) |
|
|
577 | (1) |
|
|
578 | (1) |
|
|
578 | (1) |
|
|
578 | (3) |
|
|
578 | (1) |
|
|
579 | (1) |
|
|
579 | (1) |
|
|
580 | (1) |
|
|
581 | (2) |
|
Appendix B About the CD-ROM |
|
|
583 | (2) |
|
|
583 | (1) |
|
Installing and Running Total Tester Premium Practice Exam Software |
|
|
583 | (1) |
|
Total Tester Premium Practice Exam Software |
|
|
583 | (1) |
|
|
584 | (1) |
|
|
584 | (1) |
Glossary |
|
585 | (34) |
Index |
|
619 | |