CISSP Training Kit: David R. Miller
CISSP Training Kit: David R. Miller
CISSP Training Kit: David R. Miller
David R. Miller
APPENDIX B
Before entering the exam center, review these terms and mentally recall the definitions and related concepts. This will help you develop the mental big picture of CISSP just
before the exam.
Spend approximately 1 to 2 minutes per page reviewing the following terms.
Human safety
CIA
Confidentiality
Integrity
Availability
Loss/compromise
Vulnerability
Threat
Threat agent
Risk
Exposure/attack surface
Compromise/exploit
Countermeasure/control
Litigation
Due diligence
Due care
Proximate causation
Negligence
Liability
Administrative controls
Technical/logical controls
Physical controls
Layers of security
Operational goals
Tactical goals
Strategic goals
Organizational policies
Policies
Standards
Procedures
Guidelines
Baselines
Issue-specific
System-specific
Creation
Distribution
Use
Maintenance
Disposal
2 APPENDIX B
Data classification
Data owner
Classification (valuation)
Classification criteria
Protective controls
Data/media labeling
Government classifications
Commercial classifications
Access controls
Encryption
Data at rest
Data in transit
Data in use
Data expiration
Retention period
Declassification
Secure disposal
Risk management
Risk analysis
Asset inventory
Tangible/intangible assets
Reputation as an asset
Asset valuation
Quantitative analysis
Qualitative analysis
Delphi method
Asset classification
APPENDIX B 3
Potential loss
Delayed loss
Countermeasures
Mitigate vulnerabilities
Mitigate likelihood
Mitigate impact
Cost of a countermeasure
Managing risk
Mitigate risk
Transfer risk
Avoid risk
Accept risk
Uncertainty analysis/assumptions
Security program
Organizational structure
Production
Security
Auditing
Hiring practices
Screening/background check
Monitoring policy
4 APPENDIX B
Security training for all employees at time of hire and at least annually
Termination practices
Exit interview
Reinforce agreements
Monitoring/auditing/assessment practices
Ongoing metrics
Administrative
Technical/logical
Physical
Deterrent
Preventive
Detective
Corrective
Recovery
Compensative/complementary
Directive
Threat modeling
APPENDIX B 5
Trusted path
Identification (claim)
Claimant/supplicant
Authentication (verification)
Authenticator
Zero-knowledge proof
Multifactor authentication
Mutual authentication
Password
Passphrase/virtual password
Cognitive passwords
One-time passwords
Password generator
Dictionary attack
Brute-force attack
Hybrid attack
Social engineering
Token device
Synchronous
Asynchronous
Challenge handshake
Smart card
6 APPENDIX B
Transponder
Biometrics
Finger scan
Finger print
Palm print
Hand geometry
Hand topology
Iris scan
Retina scan
Voice print
Signature dynamics
Keystroke dynamics
Single-sign-on technologies
Scripts
Kerberos
Symmetric keys
LDAP
SESAME
Certificates
APPENDIX B 7
Authorization
Access privileges
Access controls
Authorization creep
Lattice
Clearance
Classification
Need-to-know
Category
Government use
Capability
Commercial use
Security group
Firewall rules
Disk quotas
Inherited permission
Workgroup, ad hoc
Auditing
Audit logs
Secure storage/archival
Real-time analysis
8 APPENDIX B
Secure disposal
Remote access
AAA server
RADIUS
TACACS
TACACS+
Sensor connectivity (HW tap, span port, mirror port, diagnostic port)
Knowledge-based IDS/IPS
Signatures/definitions/updates
Behavior-based IDS/IPS
New attacks
Statistical
Anomaly
Clipping level
False-positive
False-negative
APPENDIX B 9
Chapter 3: Cryptography
History of cryptography
Confidentiality
Authentication
Nonrepudiation
Data at rest
Data in transit
Data in use
Cryptology
Cipher/algorithm
Key
Encryption
Plaintext
Ciphertext
Cleartext
Key space
Key clustering
Cryptoperiod
Work factor
Moores law
Cryptosystem
Governed by policy
10 APPENDIX B
Symmetric cryptography
Substitution cipher
Transposition cipher
Block ciphers
Stream ciphers
Asymmetric cryptography
Hashing process
Parity
CRC
HAVAL
RIPE
TIGER
Whirlpool
Birthday attack
Hashes + symmetric key for authentication (weak) and integrity verification (weak)
Hieroglyphics
Atbash
Scytale cipher
Caesar cipher
Mono-alphabetic cipher
Vigenere cipher
Poly-alphabetic cipher
Kerchovs principle
APPENDIX B 11
Enigma machine
Concealment cipher
Steganography
Patterns in ciphertext
Binary
Exclusive OR / XOR
Truth table
Block cipher
Key size
Block size
Substitution/confusion
Transposition/diffusion
Rounds
DES/DEA/Lucifer
DES Cracker
3DES
EEE3/EEE2/EDE3/EDE2
AES/Rijndael
IDEA
Twofish
Blowfish
RC5, RC6
Ron Rivest
12 APPENDIX B
Stream cipher
RC4
Confidentiality: Strong
Authentication: weak
Key generation
Out-of-band distribution
Key archival/escrow
File-based
HSM
Key division
Key recovery
M of N
Key lifetime/cryptoperiod
Key destruction
Asymmetric cryptography
Public key
Private key
Chapter 3: Cryptography
APPENDIX B 13
Diffie-Hellman (Merkle)
Unauthenticated (MITM)
Trap door
El Gamal
Confidentiality: Strong
Authentication: Strong
Nonrepudiation: Strong
Hybrid cryptosystems
Digital certificates
Digital signature/Signing
14 APPENDIX B
Authentication (Strong)
Non-repudiation (Strong)
Signing process
DSS/DSA
RSADSA/ECCDSA
Data encryption/sealing
Confidentiality (Strong)
Sealing process
Key distribution
PKI
Digital certificates
X.509v3
Strong authentication
Nonrepudiation
Confidentiality
Signing messages
Signing software
Key distribution
Hierarchy of trust
CA hierarchy
Root CA
Subordinate CA
Policy CA
Issuing CA
APPENDIX B 15
Revoking certificates
PKI-enabled applications
Certificate repository
Certificate verification
Trusted CA
Certificate details
CA signature verification
Revoked
Cross certification
Subordinated trust
PGP
Web of trust
Link encryption
SSL
SSL process
SSTP
HTTP/S-HTTP/HTTPS
SFTP/FTPS
IPsec
SSH
S/MIME
SET
Attacks on cryptography
Social engineering
Attack on messages
Attack on keys
Rainbow tables
Frequency analysis
Birthday attack
16 APPENDIX B
Replay attack
Ciphertext-only attack
Natural
Supply system
Human-made
Liability aspect
Defined by policies
Deter
Detect
Delay
Assess
Respond
Perimeter security
Location
Construction
Visibility/surveillance
APPENDIX B 17
Fire code
Territorial reinforcement
Emanations protection
Shielding
Faraday cage
Tempest
Security zones
Target hardening
Window design
Door construction
Water detectors
Locks
Conventional locks
Cipher locks
Electronic locks/auditing
Key management
Fences
Fences: 34 ft
Fences: 67 ft
Fences: 8+ ft
PIDAS
Bollards
Visitor control
Expensive
Background checks
ID badges
Piggybacking
18 APPENDIX B
Turnstiles/mantrap/revolving door
Fail safe
Fail secure
Guard dogs
Lighting: Continuous
Lighting: Random
CCTV cameras
Detection
Recognition
Identification
Field of view
Fixed/variable focus
Fixed/variable aperture
Monitoring station
Cable lock
Strong authentication
Disk encryption
LoJack/phone home
Remote wipe
Awareness training
Proximity
Acoustic/seismic
Doppler effect
Contact switch
Photoelectric
Pressure mat
HVAC
Humidity controls
Failure recovery
APPENDIX B 19
Power
Power grid/substation
Generator
Line conditioner
Standby UPS
Online UPS
Static electricity
Spike
Surge
In-rush
Fault
Blackout
Brownout
Sag
EMI
RFI
Personnel monitoring
Insider threat
Safety
Fire protection
Fuel
Heat
Oxygen
Chemical reaction
Fire Detection
Ionization detector
20 APPENDIX B
Ion
Thermal detector
Rate of rise
Fixed temperature
Photoelectric detector
Infrared detector
5 classes of fires
Fire extinguisher
Rating
Gas
Halon
Montreal Protocol
FM-200
CO2
Dry chemicals
Wet foam
Water
Sprinklers
Wet pipe
Dry pipe
Pre-action system
Deluge system
Lessons learned
APPENDIX B 21
CPU
ALU
Control unit
Instruction
Data
Register memory
Cache memory
RAM
ROM
Data I/O
Address bus
Data bus
Memory
Primary memory
Swapfile/pagefile
Memory manager
Physical addressing
Virtual addressing
Base address
Offset
Memory protection
Memory segmentation
Memory leak
Multiprocessor
Symmetric multiprocessing
Asymmetric multiprocessing
Application
Process
22 APPENDIX B
Process table
Process states
Running
Ready
Blocked
Buffer/stack
Interrupts
Thread
Execution domains
Multiprogramming
Multitasking: Cooperative
Multitasking: Preemptive
Multithreaded
Security kernel
Reference monitor
Trusted recovery
Security boundary
Abstraction
Multiplexing
Layering
Data hiding
Encapsulation
Segmentation
Isolation
Black box
Deadlock
Restricted/constrained interfaces
Protection rings
Chapter 5: Security architecture and design
APPENDIX B 23
Process isolation
Device drivers
Virtual machines
VMware
Hyper-V
Java Sandbox
VirtualBox
Cloud computing
Risk analysis
Legal
Compliance
Laws
HIPAA
Sarbanes-Oxley (SOX)
GLBA
FISMA
BASEL II
Others
24 APPENDIX B
Industry Regulations
Frameworks
IT governance
Security models
Security perimeter
State machine
Information flow
Noninterference
BellLaPadula
Confidentiality
MAC
Star property
APPENDIX B 25
Biba
Integrity
MAC
Invocation property
ClarkWilson
Integrity
Access triple
Active agents
BrewerNash/Chinese wall
Conflict of interest
Context-sensitive
Before you touch any data set, you can touch any data set
After you touch any one data set, you cannot touch any other data set
GrahamDenning
Harrison-Ruzzo-Ullman (HRU)
Functionality
Assurance
Operational assurance
Certification
26 APPENDIX B
Accreditation
TCSEC
Based on BellLaPadula
NCSC
Rainbow series
TCSEC ratings
A1 Verified Protection
D Minimal security
ITSEC
ITSEC members
Based on Bell-LaPadula
ITSEC ratings
Effectiveness E: E6
E0 D: Minimal security
APPENDIX B 27
Protection profile
Target of evaluation
Security target
Packages
EPL
Define computer crimes: Breach of laws and regulations (vs. breach of policy)
Target
Tool
Incidentally involved
Script kiddie
Skilled hacker
Social engineer
Fun
Grudge
Money/business
Salami
28 APPENDIX B
Data diddling
Dumpster diving
Difficulties in prosecution
Jurisdiction issues
Privacy laws
Compliance
Due diligence, due care, prudent person, proximate causation, negligence, liability
Cloud computing
Outsourcing
Consultants
Vendors
Risk analysis
Legal
Compliance
Burden of proof
Penalties
Chapter 6: Legal, regulations, investigations, and compliance
APPENDIX B 29
Europe, S. America
England, US
Criminal
Civil (tort)
Administrative, regulatory
Nature of crime
Revealed by deity(ies)
Obligations to others
Responsibilities
Religious duties
Intellectual property
30 APPENDIX B
Trade secret
Protected
Developed internally
Competitive value
Proprietary
No registration required
Copyright
Source code
Trademark
Patent
Invention
Novel
Not obvious
Interpol
GAISP/GASSP
Police agent
Citizen
Managements decision
Evidence
Chain of custody
APPENDIX B 31
Protection of scene/preservation
Identification
Collection
Order of volatility
Labeling
Transportation
Storage
Analysis
Presentation in court
Admissibility
Relevance
Best evidence
Hearsay
Printed
Incident response
Monitoring/detection
Procedures
Team
Contact list
Escalation process
Event
Incident
32 APPENDIX B
Containment: Response
Forensic investigations
IOCE
Order of volatility
Physical
Digital
Analysis
Logs
Communications
MAC times
Steganography
Exploit review
Ethical issues
Corporate ethics
APPENDIX B 33
Unethical
7. Application
6. Presentation
5. Session
4. Transport
3. Network
2. Data link
1. Physical
Protocols at layers
Devices at layers
LLC
MAC
Identify destination
Data stream
Name resolution
Segment
Header
Packet/datagram
34 APPENDIX B
Source IP address
Destination IP address
Routing decision
Default gateway
Frame
CRC
Trailer
Bits
Hops
TCP/IP model
Network media
Impedance
Interference
Attenuation
Crosstalk
Emanations
Coax cable
Thinnet: 10Base2
Thicknet: 10Base5
Terminator
BNC
Voltage/electrons
APPENDIX B 35
Twisted-pair cable
UTP
STP
Plenum
Voltage/electrons
Repeater
Light pulses/photons
Wireless
Analog
Amplitude
Frequency
Phase shift
QAM
Digital
Bipolar signaling
Synchronous signaling
Asynchronous signaling
Baseband
Broadband
Topologies
Bus
Ring
Star
Tree
Hybrid
Intranet
Extranet
Internet
36 APPENDIX B
Unicast
Broadcast
Multicast
Anycast
Simplex
Half-duplex
Full-duplex
Circuit switched
Multiplexing
TDM
FDM
WDM
Packet switched
Collision
Contentionless/deterministic
Contention-oriented/nondeterministic
Polling
Token-passing bus
Token-passing ring
CSMA-CA
CSMA-CD
Infrastructure systems
Client/endpoint systems
Desktop/workstation
Laptop
Pad device
Handheld device
APPENDIX B 37
Endpoint protection
Patching
Antivirus/anti-spyware/updates
Hardened system
Personal firewall
Host-based IDS/IPS
Configuration management
Awareness training
Screen scraper
Mainframe
Thin client
SDLC/HDLC
Unscheduled IPL
Repeater
Hub/concentrator
MAU/MSAU
Bridge
Collision domain
Broadcast domain
Switch
Modem
Router
Route Table
Static/dynamic routing
38 APPENDIX B
Gateway
Dial-in server
VPN server
Firewall
SOCKS proxy
Circuit-level proxy
Application-layer proxy
Multihomed firewall
Screening firewall
Screened host
Screened subnet
Ingress filter
Egress filter
Security zones
DHCP
DORA
DHCP snooping
LMHOSTS file
WINS
Hosts file
APPENDIX B 39
DNS
DNS hierarchy
DNS zones
Resource records
Split DNS
Forwarder
Root hints
Root server
Top-level server
SOA
Resolver cache
DNSSEC
BIND
Authentication server
PAP
CHAP
MS-CHAPv2
EAP
NAT/PAT
One-to-one
One-to-many
Port forwarding
AV/AS/updates
Host-based firewall
Dedicated function
Least privilege
Minimum software
40 APPENDIX B
Ports
TCP/IP
High overhead
Three-way handshake
TCP flags
UDP
Low overhead
Connectionless/best-effort delivery
IPv4
32 bits/4 octets
IP addressing
Classful addresses
Subnetting/CIDR
Private IP addressing
Public IP addressing
IPv6
Telnet
BootP
DHCP
FTP/TFTP/SFTP/FTPS
ICMP
ARP
TCP
ARP cache
APPENDIX B 41
SNMP
SNMP manager/agent
Get/Get Next/Set/Trap
SMTP
POP3
IMAP4
HTTP/HTTPS
LDP
NFS
DNS
RIP/RIPv2
IGRP/EIGRP
BGP
Distance vector
OSPF
Link state
QoS
MPLS
Encrypted channels/VPNs
SSH
L2F
PPTP
L2TP
SSL
SSTP
IPsec
42 APPENDIX B
ISAKMP
IPsec AH
IPsec ESP
IPsec authentication
Link encryption
PAN
IEEE 802.15
Bluetooth
Piconet
Zigbee
LAN
VLAN
MAN
Cable modem
ADSL/SDSL
FDDI
CDDI
SONET
Optical Carrier: 52 MB
WAN/GAN
ISDN
T1/E1
T3/E3
BRI/PRI
B Channel
D Channel
X.25
APPENDIX B 43
Frame relay
PVC
SVC
CIR
ATM
53-byte cell
Satellites
PSTN/POTS
SLIP
PPP
PBX
VoIP
SIP/H.323
Jitter
Latency
Media Gateway
Wireless networking
Benefits of wireless
IEEE 802.11
IEEE 802.11b
IEEE 802.11a
IEEE 802.11g
IEEE 802.11n
IEEE 802.11i
Ad hoc/peer-to-peer
Infrastructure
Spread spectrum
FHSS
DSSS
OFDM
MIMO
44 APPENDIX B
2.4GHz
5GHz
Association
Cell
Channel
FCC
SSID
SSID broadcast
Roaming
Signal strength
Cell shaping
WEP
PSK/SKA
Open authentication
MAC filtering
WPA personal
WPA enterprise
TKIP/MIC
WPA2 personal
WPA2 enterprise
AES/CCMP
WiMAX
Cellular
First generation: 1G
Second generation: 2G
Third generation: 3G
FDMA/TDMA/CDMA/CDMA 2000
GSM
SIM card
APPENDIX B 45
Browsing attack
Targeted attack
DoS
SYN flood
Ping of death
Teardrop attack
Land attack
DDoS
Information theft
Eavesdropping/sniffing
Emanations detection
DNS poisoning
Route poisoning
MITM
Session hijacking
Traffic analysis
Wireless attacks
Rogue wireless AP
Cracking WEP
Bluejacking
46 APPENDIX B
Toll fraud
Human safety
Prudent management
Fiduciary responsibility
Defined in policies
DRP
Subset of BCP
Usually IT focused
BCP
APPENDIX B 47
Components
Develop BCP
Get approval/budget
Test plans
Maintain plans
DRP/BCP team
Identify vulnerabilities and threats to the critical functions, assets, and resources
Dependencies
Processes
Technologies
Data
Work space
Identify maximum tolerable downtime (MTD) for each critical function: Fatalistic view
Critical/essential
Urgent
Important
Normal
Nonessential
48 APPENDIX B
Identify vulnerabilities and threats to the critical functions, assets, and resources
Natural
Technical
Supply system
Human
BC and DR solutions
Business processes
Facility/user environment
Redundant/alternate site
Subscription services
Cold site
Warm site
Hot site
Reciprocal agreements
Collocation
Increased costs
Technology
Redundancy
Compatibility
IT infrastructure
Communications systems
APPENDIX B 49
Data
Collocation
Backups
Tape vaulting
Remote journaling
Disk shadowing
Electronic vaulting
Clustering
Personnel
Critical personnel
Injured or worse
Supply systems
Resources
HVAC
Raw materials
Vendors/customers
Preventive measures
Recovery
Business continuity
Appendices
50 APPENDIX B
Team coordinator
Public relations
Relocation team
Restoration team
Security team
Salvage team
Telecom team
Plan maintenance
Criteria
Evacuation/safety procedures
Call list
Emergency services
Management
Team members
Shareholders
Customers
Vendors
Media
Approved responses/procedures
Written procedures
Business continuity
APPENDIX B 51
Lessons learned/feedback/improvement
Appendices
Assignments
Diagrams
Schematics
Maps
Vendors/suppliers
Alternate plans
Simulation
Parallel
Full interruption
Objective of testing
Feedback loop
52 APPENDIX B
Changes in facilities
Application development
SDLC
Project initiation
Functional design
System design
Software development
Installation/test
Operational maintenance
Disposal/end of life
Testing
Unit testing
Integration testing
Acceptance testing
Regression testing
Programming vulnerabilities
Garbage collection
Maintenance hooks
Covert channels
Operational assurance
Software escrow
APPENDIX B 53
Change control
Analyze request
Implementation strategy
Security implications
Code changes
Change revision
Release to library
Complete documentation
Updating
Firmware
Operating system
Applications
Virus definitions
IDS signatures
Procedures
Test/approval
Rollback procedures
Change control
Deploy
Document
Time-sensitive
Logging
54 APPENDIX B
Programming concepts
Development
Application communications
CASE tools
Object-oriented programming
Modularity
Deferred commitment
Reusability
Naturalness
Classes
Variables
Attributes
Programmed behaviors
Method
Message
Distributed computing
Windows
ORB, CORBA
Platform independent
J2EE
APPENDIX B 55
Active content
Client-side processing
ActiveX
Windows
COM
Authenticode
Java applets
Platform independent
Java Sandbox
Java VM
Bytecode
Database systems
Database models
Hierarchical
One parent
Flat
Network
56 APPENDIX B
Multiple parents
Object-oriented
Relational
Cell
Primary key
Attribute
Record = Tuple
Foreign key
Entity integrity
Referential integrity
Object relational
Accessing databases
ODBC
OLE
ADO
JDBC
XML
SAML
Web applications
Web-based authentication
Transaction processing
Concurrency control
Record locking
Commit
Rollback
Checkpoint protection
Two-phase commit
ACID
Atomicity
Consistency
Isolation
Durability
Constrained views
OLTP
Database warehouse
Normalization
Sanitization
Data mining
Metadata
APPENDIX B 57
Artificial intelligence
Artificial intelligence
Knowledge management
Knowledge discovery
Probabilistic
Statistical
Classification
Expert systems
Survey experts
Inference engine
Attacks on applications
Malware
Virus
Worm
Trojan horse
Rootkits
Kernel mode
User mode
Backdoors
Maintenance hooks
Covert channels
Storage
Timing
58 APPENDIX B
Timing attacks
Race condition
Detection mechanisms
Signature
Heuristic
Integrity validation
Behavior
Persistent
Nonpersistent
DOM
Hijacking pages
SQL injection
Cookies
Session
Persistent
Browser cache
Directory transversal
Buffer overflow
APPENDIX B 59
User provisioning
Creation/disable/delete
Least privilege
Authorization creep
Fraud protection
Separation of duties
Job rotation
Mandatory vacations
Dual control
Auditing
Least privilege
Collusion
Roles
Data owner
System owner
Data custodian
System custodian
Configuration management
Documentation
Auditing
Change management
Remote administration
Vulnerability assessment
Vulnerability scanning
Software/firmware bugs
Misconfiguration
Compliance
60 APPENDIX B
Fault tolerance
Redundancy
Penetration testing
Point-in-time analysis
Remediation
Enticement
Entrapment
Media management
Data classification/declassification
Media library
Librarian
Software licensing
Media labeling
MTBF
MTTR
Redundancy
RAID 0, 1, 2, 3, 4, 5, 10, 15
Disk duplexing
RAIT
Direct access
Sequential access
Chapter 10: Operations security
APPENDIX B 61
SAN
Service-level agreements
Collocation
Backup types
Full
Incremental
Differential
Archive bit
Practice/test restore
Secure deletion/destruction
Object reuse
Data remanence
Degaussing
Zeroization
Wiping/overwriting
Fax security
Fax encrypter
Fax server
Attacks on operations
Password cracking
Key cracking
Emanations detection
Social engineering
Dumpster diving
Keyboard loggers
62 APPENDIX B
Targeted attack
Malicious code
Zero-day attack
Passive reconnaissance
Sniffer
Protocol analyzer
Public information
Web searches
Active reconnaissance
Scanning
Probing
Footprinting
Network scanning
War dialing
War driving
Fingerprinting
System/device type
Operating system
Applications/services/listeners
Versions
Update levels
Vulnerability database
Exploit
Escalate privilege
APPENDIX B 63
Entrench
Malware
Trojan
Backdoor
Rootkit
Harden system
Cover tracks
Pillage
64 APPENDIX B