Week 1 CISSP Study Group
Week 1 CISSP Study Group
Starting April 15 ,
th 2024:
3 hours, 100-150 Questions (CAT exam)
Adapts based on your answer
Aims for 50-50 probability
Answers are final! No going back
Many think this makes the
CAT exam more difficult!
About the cat exam FORMAT
Before April 15 ,
th 2024:
Current CISSP CAT exam contains
50 pretest (unscored) items
Exam is 4 hours, 125-175 Questions
This series gets right to the point and eliminates the fluff!
Focuses on key characteristics of each concept to help you
identify right (and wrong) answers on exam day.
Content utilizes several proven learning methods to
accelerate your learning.
I will share techniques you can apply in your study
This series gets right to the point and eliminates the fluff!
Focuses on key characteristics of each concept to help you
identify right (and wrong) answers on exam day.
Content utilizes several proven learning methods to
accelerate your learning.
I will share techniques you can apply in your study
Subscribed
SUBSCRIBE
“
I recently (provisionally) passed my CISSP
on first attempt with 100 questions taking
2 hours. Your YouTube videos were
absolutely invaluable!
~QSECOFR
testimonials
What are other learners saying?
“
This was so helpful.. I feel I
owe you more than a "like"
and a "share"!
~Kris K
testimonials
What are other learners saying?
“
Your “Think like a manager” was the single
most important video that I watched in
preparation for taking the CISSP exam.
~FB
testimonials
What are other learners saying?
“
Great videos. Excellent
presentation. Perfect study
companion to the ISC2 book.
~Mike R
testimonials
What are other learners saying?
“
Passed CISSP today, crammed
through these 8 videos 2 days
before. Was a great refresher!
~Tony B
CISSP EXAM CRAM
THE COMPLETE COURSE
GET CERTIFIED FAST!
Coverage of all 8 domains
Strategy guidance
Proven learning techniques
existing topics?
Topics evolve over time,
so this is expected!
existing topics?
What’s new in 2024? A breakdown
by domain
DOMAIN 1
Sustaining security governance principles (1.3)
SABSA is new
COBIT, FedRAMP, and SABSA called out in syllabus (1.3.3) in 2024 exam
External dependencies for business continuity (1.7.2)
Issues related to privacy regulations like GDPR, CCPA, etc. (1.4.5)
Supply chain risk management concepts (1.11)
Periodic content reviews to include emerging technologies, like
cryptocurrency, AI, blockchain in security awareness training (1.12.2)
DOMAIN 2
No new major topics
What’s new in 2024? A breakdown
by domain
DOMAIN 3
Secure access service edge (3.1.11)
Information system lifecycle management (3.10)
DOMAIN 4
IP version 6 (IPv6) (4.1.2)
Virtual private cloud (VPC) (4.1.17) Due to growth in cloud
Monitoring and management concepts (4.1.18)
DOMAIN 5
No new major topics
What’s new in 2024? A breakdown
by domain
DOMAIN 6
No new major topics
DOMAIN 7
Security orchestration, automation and response (SOAR) (7.2.3)
DOMAIN 8
Scaled Agile Framework (8.1.1)
Software composition analysis (8.2.9)
Interactive application security testing (IAST) (8.2.9)
Complementary to DAST and SAST, covered in 2021 exam
There is no
AWARD
for the longest
STUDY TIME!
CISSP EXAM CRAM
THE COMPLETE COURSE
STRATEGY
Must-have resources
CISSP EXAM CRAM
THE COMPLETE COURSE
STRATEGY
Must-have (required) resources
CISSP
EXAM STUDY GUIDE
& PRACTICE TESTS BUNDLE
STRATEGY
Nice-to-have (optional) resources
Exam Flashcards
from Inside Cloud and Security
Certification Station
Discord Community for exam candidates
Nice-to-have (optional)
Per-domain progress tracking
Nice-to-have (optional)
Multiple quiz modes
Nice-to-have (optional)
Build-your-own (choose domains)
Includes a mobile app
Nice-to-have (optional)
Exam Flashcards
from Inside Cloud and Security
Nice-to-have (optional)
Over, 1,100 cards,
curated by experts
Choose to study
domain or category
Covers exam
glossary & acronyms
Works on any
desktop or mobile
Features include:
✓ Flag for review
✓ Bite-size sessions
(choose your card count)
Features include:
✓ Flag for review
✓ Bite-size sessions
(choose your card count)
QUICKLY
3rd repetition After 6-8 hours
4th repetition After 24 hours
5th repetition After 48 hours
20 min
THE POWER OF
REPETITION
spaced repetition
100 Spaced Repetition
Forgetting curve
QUICKLY
3rd repetition After 6-8 hours
4th repetition After 24 hours
5th repetition After 48 hours
UNDERSTANDING
CONCEPTS
Studies show understanding BEFORE you
memorize greatly improves retention
or memory device, is a
learning technique that makes
MNEMONIC memorizing information easier
device
A common technique is the
expression mnemonic aka
MNEMONIC an acronym
device
The best mnemonic devices are
simple, relevant, and visual
MNEMONIC
device
We’ll start with an example
using a first letter mnemonic
MNEMONIC
device
THE OSI MODEL
Away 7 Application All
Throw 4 Transport To
|
Not 3 Network Need
Toss 4 Transport To
|
Not 3 Network Need
2 Response
3 Mitigation
4 Reporting
|
5 Recovery
6 Remediation
7 Lessons Learned
INCIDENT MANAGEMENT framework
1 Detection
DRMRRRL
2 Response
3 Mitigation
4 Reporting
|
5 Recovery
6 Remediation
7 Lessons Learned
INCIDENT MANAGEMENT framework
1 Detection
DRMRRRL
2 Response
3 Mitigation
4 Reporting
|
5 Recovery
6 Remediation
7 Lessons Learned
Chunking is a technique of
breaking info into smaller
MNEMONIC pieces that make sense
device
chunking
cryptography
Asymmetric Hashes
Block ciphers
Symmetric
DOMAIN CHAPTERS
1. Security and Risk Management 1-4
2. Asset Security 5
3. Security Architecture and Engineering 6 – 10
4. Communication and Network Security 11 – 12
5. Identity and Access Management 13 – 14
6. Security Assessment and Testing 15
7. Security Operations 16 – 19
8. Software Development Security 20 - 21
80/20 STRATEGY
TARGETED POWERPOINT
READING REVIEW
PRACTICE POWERPOINT
EXAM REVIEW
THE “READ” Strategy
REVIEW
DECIDE
THE “READ” Strategy
Exam Outline
1.1 Understand and apply concepts of confidentiality,
integrity and availability aka “the CIA triad”
1.2 Evaluate and apply security governance principles
1.3 Determine compliance requirements
1.4 Understand legal and regulatory issues that pertain to
information security in a global context
1.5 Understand, adhere to, and promote professional ethics
1.6 Develop, document, and implement security policy,
standards, procedures, and guidelines
D O M A I N 1 : SECURITY & RISK MANAGEMENT
This is a non-event.
For more cybersecurity exam prep tutorials, follow us on Youtube at Inside Cloud and Security
D O M A I N 1 : SECURITY & RISK MANAGEMENT
KNOW
BY HEART!
D O M A I N 1 : SECURITY & RISK MANAGEMENT
C onfidentiality
I ntegrity
A vailability
D O M A I N 1 : SECURITY & RISK MANAGEMENT
1
C onfidentiality
2 3
I ntegrity A vailability
D O M A I N 1 : SECURITY & RISK MANAGEMENT
C onfidentiality
Access controls help ensure that only
authorized subjects can access objects
D O M A I N 1 : SECURITY & RISK MANAGEMENT
I ntegrity
Ensures that data or system configurations
are not modified without authorization
D O M A I N 1 : SECURITY & RISK MANAGEMENT
A vailability
Authorized requests for objects must
be granted to subjects within a
reasonable amount of time
D O M A I N 1 : ISC 2 CODE OF ETHICS
1
Protect society, the commonwealth,
and the infrastructure
2
Act honorably, honestly, justly,
responsibly, and legally
Security procedures
Detailed step-by-step
Security guidelines
Offer recommendations
Security baselines
Define “minimum levels”
Acceptable use policy
Assign roles and responsibilities
FOR THE When developing new safeguards,
EXAM you are establishing a new baseline
FOR THE
EXAM
…so, compliance with existing baselines
is not a valid consideration point.
D O M A I N 1 : RISK CATEGORIES
Risk Categories
Category is a group of potential causes of risk.
Damage. Results in physical loss of an asset or
the inability to access the asset.
Disclosure. Disclosing critical information
regardless of where or how it was disclosed.
Losses. These might be permanent or temporary,
including altered data or inaccessible data
D O M A I N 1 : RISK FACTORS
Risk Factors
Something that increases risk or susceptibility
Physical damage. Natural disaster, power loss or
vandalism.
Malfunctions. Failure of systems, networks, or
peripherals.
Attacks. Purposeful acts whether from the inside or
outside, such as unauthorized disclosure.
D O M A I N 1 : RISK FACTORS
Security Planning
Should include three types of plans
Strategic. Long term, stable plan that should include a
risk assessment. (5-yr horizon, annual updates)
Tactical. Midterm plan developed to provide more
details on goals of the strategic plan. (usually ~1 year)
Operational. Short-term, highly detailed plan based
on the strategic and tactical plans. (monthly, quarterly)
D O M A I N 1 : SECURITY PLANNING
Security Planning
Should include three types of plans
Strategic. Long term, stable plan that should include a
risk assessment. (5-yr horizon, annual updates)
Tactical. Midterm plan developed to provide more
details on goals of the strategic plan. (usually ~1 year)
Operational. Short-term, highly detailed plan based
on the strategic and tactical plans. (monthly, quarterly)
D O M A I N 1 : RESPONSE TO RISK
Response to Risk
Risk Acceptance. Do nothing, and you must
accept the risk and potential loss if threat occurs.
Risk Mitigation. You do this by implementing a
countermeasure and accepting the residual risk.
rd
Risk Assignment. Transfer (assign) risk to 3 party,
like by purchasing insurance against damage.
Risk Avoidance. When costs of mitigating or
accepting are higher than benefits of the service
D O M A I N 1 : RESPONSE TO RISK
REMEMBER:
Handling risk is not a one-time process!
D O M A I N 1 : RISK MANAGEMENT FRAMEWORK
NIST 800-37
D O M A I N 1 : RISK MANAGEMENT FRAMEWORK
OCTAVE
operationally critical threat, asset, and
vulnerability evaluation
FAIR
Factor Analysis of Information Risk
TARA
Threat Agent Risk Assessment
D O M A I N 1 : RISK MANAGEMENT FRAMEWORK
Residual
Inherent
Total
D O M A I N 1 : TYPES OF RISK
Residual Risk
The risk that remains even with all
conceivable safeguards in place.
D O M A I N 1 : TYPES OF RISK
Residual Risk
The risk management has chosen
to accept rather than mitigate.
D O M A I N 1 : TYPES OF RISK
Inherent Risk
Newly identified risk not yet addressed
with risk management strategies
D O M A I N 1 : TYPES OF RISK
Inherent Risk
The amount of risk that exists
in the absence of controls.
D O M A I N 1 : TYPES OF RISK
Total Risk
The amount of risk an organization would
face if no safeguards were implemented.
D O M A I N 1 : RISK MANAGEMENT
Residual
Inherent
Total
D O M A I N 1 : TYPES OF RISK
Residual AFTER
Inherent BEFORE
Total WITHOUT
FOR THE Be able to explain total risk,
EXAM residual risk, and controls gap
FOR THE
EXAM FORMULAS
To calculate TOTAL RISK, know this formula:
threats * vulnerabilities * asset value = total risk
FOR THE
EXAM FORMULAS
RISK can be defined as follows:
risk = threat * vulnerability
D O M A I N 1 : RISK ANALYSIS
RISK ANALYSIS
Two ways to evaluate risk to assets:
RISK ANALYSIS
Two ways to evaluate risk to assets:
|
D O M A I N 1 : RISK ANALYSIS
QUANTITATIVE
Assigns a dollar value to evaluate
effectiveness of countermeasures
| OBJECTIVE
D O M A I N 1 : RISK ANALYSIS
D O M A I N 1 : RISK ANALYSIS STEPS
QUALITATIVE
Uses a scoring system to rank threats
QUALITATIVE
Uses a scoring system to rank threats
and effectiveness of countermeasures
SUBJECTIVE
D O M A I N 1 : RISK ANALYSIS
DELPHI TECHNIQUE
An anonymous feedback-and-response
process used to arrive at a consensus.
D O M A I N 1 : RISK ANALYSIS
Delayed loss
This is the amount of loss that can occur
over time.
THREAT AGENTS
are what cause the threats by
exploiting vulnerabilities.
D O M A I N 1 : RISK ANALYSIS
THREAT AGENTS
are what cause the threats by
exploiting vulnerabilities.
D O M A I N 1 : RISK ANALYSIS
D O M A I N 1 : CALCULATING RISK
Single Loss
Expectancy (SLE)
Represents the cost associated with a
single realized risk against a specific asset
D O M A I N 1 : CALCULATING RISK
Single Loss
Expectancy (SLE)
SLE = Asset Value (AV) X Exposure Factor (EF)
D O M A I N 1 : CALCULATING RISK
Single Loss
Expectancy (SLE)
AV EF SLE
$100,000 X .3 (30%) = $30,000
D O M A I N 1 : CALCULATING RISK
Annualized Rate
of Occurrence (ARO)
The expected frequency with which a specific
threat or risk will occur within a single year.
D O M A I N 1 : CALCULATING RISK
Annualized Loss
Expectancy (ALE)
The possible yearly cost of all instances of a
specific realized threat against a specific asset.
D O M A I N 1 : CALCULATING RISK
Annualized Loss
Expectancy (ALE)
ALE = single loss expectancy (SLE) *
annualized rate of occurrence (ARO)
D O M A I N 1 : CALCULATING RISK
ALE Example
Office Building = $200,000
Hurricane damage estimate 50%
Hurricane probability is one every 10 years 10%
Safeguard
Evaluation
Good security controls mitigate risk,
are transparent to users, difficult to
bypass, and are cost effective
D O M A I N 1 : CALCULATING RISK
Safeguard
Evaluation
Good security controls mitigate risk,
are transparent to users, difficult to
bypass, and are cost effective
D O M A I N 1 : CALCULATING RISK
Safeguard
Evaluation
ALE before safeguard – ALE after safeguard
– annual cost of safeguard = value of safeguard
D O M A I N 1 : CALCULATING RISK
Safeguard
Evaluation
value of safeguard = ALE1 – ALE2 - ACS
D O M A I N 1 : CONTROLS
Controls Gap
The amount of risk reduced by
implementing safeguards
D O M A I N 1 : CONTROLS
Controls Gap
Supply Chain
Today, most services are delivered
through a chain of multiple entities
D O M A I N 1 : SUPPLY CHAIN
Supply Chain
A secure supply chain includes vendors who
are secure, reliable, trustworthy, reputable
D O M A I N 1 : SUPPLY CHAIN
Threat Modeling
Security process where potential threats
are identified, categorized, and analyzed.
D O M A I N 1 : THREAT MODELING
Threat Modeling
Security process where potential threats
are identified, categorized, and analyzed.
D O M A I N 1 : THREAT MODELING
Threat Modeling
Can be proactive or reactive, but in either
case, goal is to eradicate or reduce threats
D O M A I N 1 : THREAT MODELING
Model focus
Common approaches to threat modeling:
Focused on Assets . Uses asset valuation results
to identify threats to the valuable assets.
Focused on Attackers . Identify potential attackers
and identify threats based on the attacker’s goals
Focused on Software . Considers potential threats
against the software the org develops.
FOR THE There are a few threat modeling
EXAM methodologies you should review:
FOR THE The STRIDE model, which
EXAM comes from Microsoft
Spoofing
Tampering
FOR THE Repudiation
EXAM Information disclosure
Denial of service
Elevation of privilege
FOR THE The PASTA model, which focuses
EXAM on controls relative to asset value
Stage I: Definition of Objectives
Stage II: Definition of Technical Scope
Stage III: App Decomposition and Analysis
FOR THE Stage IV: Threat Analysis
EXAM Stage V: Weakness and Vulnerability Analysis
Stage VI: Attack Modeling & Simulation
Stage VII: Risk Analysis & Management
Stage I: Definition of Objectives
Stage II: Definition of Technical Scope
Stage III: App Decomposition and Analysis
Stage IV: Threat Analysis
Stage V: Weakness and Vulnerability Analysis
Stage VI: Attack Modeling & Simulation
Stage VII: Risk Analysis & Management
FOR THE The VAST model, based on
Agile project management and
EXAM programming principles
Visual
FOR THE Agile
EXAM Simple
Threat
FOR THE The Trike model, which focuses
EXAM on a risk-based approach
The DREAD rating system is a
FOR THE rating solution that is based on
EXAM the answers to five main
questions about each threat:
Damage potential
FOR THE Reproducability
EXAM Exploitability
Affected users
Discoverability
D O M A I N 1 : THREAT MODELING
Threat Modeling
Can be proactive or reactive, but in either
case, goal is to eliminate or reduce threats
D O M A I N 1 : THREAT MODELING
Spoofing
Tampering
Repudiation
STRIDE Information disclosure
developed by
Microsoft Denial of service
Elevation of privilege
D O M A I N 1 : THREAT MODELING
Visual
Agile
VAST Simple
based on Agile
PM principles Threat
Damage potential
Reproducibility
DREAD Exploitability
based on answer Affected users
to 5 questions
Discoverability
D O M A I N 1 : THREAT MODELING
Diagramming
Potential Attacks
Determining potential attack concepts is
often achieved through diagramming
D O M A I N 1 : THREAT MODELING
users
1
SQL
Brute force, dictionary
Reduction Analysis
Trust Boundaries. Any location where the level of trust
or security changes
Data Flow Paths. The movement of data between
locations
Input Points. Locations where external input is received
Privileged Operations. Any activity that requires
greater privileges than of a standard user account
Details about Security Stance and Approach.
declaration of security policy, security foundations, and
security assumptions.
D O M A I N 1 : THREAT MODELING
Prioritization
and Response
Then threats are ranked or rated using
DREAD, high/medium/low rating, etc.
D O M A I N 1 : CONTROLS
Security Controls
Security measures for countering and
minimizing loss or unavailability of
services or apps due to vulnerabilities
D O M A I N 1 : CONTROLS
Security Controls
The terms safeguards and
countermeasure may seem to
be used interchangeably
D O M A I N 1 : CONTROLS
Security Controls
safeguards are proactive (reduce
likelihood of occurrence)
countermeasure are reactive
(reduce impact after occurrence)
D O M A I N 1 : SECURITY CONTROLS
Control Categories
There are three categories of security controls:
Technical. aka “logical”, involves the hardware or
software mechanisms used to manage access.
Administrative. Policies and procedures defined
by org’s security policy, other regulations and
requirements.
Physical. Are items you can physically touch.
D O M A I N 1 : SECURITY CONTROLS
Control Types
Deterrent. Deployed to discourage violation of
security policies.
Preventative. Deployed to thwart or stop
unwanted or unauthorized activity from occurring.
Detective. Deployed to discover or detect
unwanted or unauthorized activity.
Compensating. Provides options to other existing
controls to aid in enforcement of security policies.
D O M A I N 1 : SECURITY CONTROLS
Control Types
Deterrent. Deployed to discourage violation of
security policies.
Preventative. Deployed to thwart or stop
unwanted or unauthorized activity from occurring.
Detective. Deployed to discover or detect
unwanted or unauthorized activity.
Compensating. Provides options to other existing
controls to aid in enforcement of security policies.
D O M A I N 1 : SECURITY CONTROLS
Types of Law
Criminal Law. contains prohibitions against acts
such as murder, assault, robbery, and arson.
Civil Law. include contract disputes, real estate
transactions, employment, estate, and probate.
Administrative Law. Government agencies have
some leeway to enact administrative law.
CISSP exam focuses on security-related generalities
of law, regulations, investigations, and compliance
D O M A I N 1 : LEGAL & REGULATORY
Laws
Computer Fraud and Abuse Act (CFAA) . The first major
piece of US cybercrime-specific legislation
Federal Sentencing Guidelines. provided punishment
guidelines to help federal judges interpret computer crime
laws.
Federal Information Security Management Act (FISMA).
Required a formal infosec operations for federal gov’t
Copyright and the Digital Millennium Copyright Act
(DMCA). Covers literary, musical, and dramatic works.
D O M A I N 1 : LEGAL & REGULATORY
IP and Licensing
Trademarks. covers words, slogans, and logos used
to identify a company and its products or services.
Patents. Patents protect the intellectual property
rights of inventors.
Trade Secrets. intellectual property that is absolutely
critical to their business and must not be disclosed.
Licensing. 4 types you should know are contractual,
shrink-wrap, click-through, and cloud services.
D O M A I N 1 : LEGAL & REGULATORY
THANKS
F O R W A T C H I N G!