Bootcamp Notes
Bootcamp Notes
Bootcamp Notes
Some of the things that I learned along the way, mostly from the bootcamp, that really helped me:
Think Like A Manager
Watch Out for Absolutes - this was from the bootcamp - typically absolutes are telling one way or the other. If an answer
contains "any" or "all" and the question does not contain the word not - typically that answer can be eliminated. If the
question does contain the word not - the answer containing "any" or "all" typically was is the right one
People Over Everything
Ready, Aim, Fire - pretty common saying, but whenever you're asked to do something "first".. you don't act. It's not "Fire,
Ready, Aim", it's "Ready, Aim, Fire". The "Ready" part comes first, make sure what you're doing is right, or gather evidence,
before you do anything
Answer Only What the Question Is Asking You - big point that was harped on in the bootcamp. Read the question, then read
the question again. Great - now read A, read A again, read B, read B again.. you see where I'm going. It truly is a reading
comprehension test, some answers may look great but they don't really have much to do with what is being asked. Read very
carefully, and eliminate answers that don't have much or anything to do with the question being asked.
Look for the Answer in the Question - There are times (and this happened at least 3 times on the exam) where the question
had certain words in it, that were also contained in only one of the answers. If the words of the answer can be found in the
question, that's a good answer to hone in on, and is probably the right one.
1
CISSP STUDY GUIDE
CISSP Study Guide
Protecting Privacy
o Open framework
Acceptable Use Policy (written) defines privacy expectations for internal people, use banners for external
PII: Name, SSN, Address or Email, Phone Number, IP/MAC, Vehicle registration, etc.
4th amendment: right of the people to be secure in their persons, houses, papers, and effects against
Federal Privacy Act of 1974: Prevents phone taps and opening people’s email, protects from big brother
watching them. Census taking, and legal needs can still break privacy
Regulatory Compliance
o Civil/Tort Law – lawsuits between individuals and businesses that result in damages or loss, either
o Criminal Law – crimes against society, handled by law enforcement, fines or imprisonment
2
CISSP STUDY GUIDE
o PCI-DSS: safe handling of sensitive info related to credit card purchase. NOT a US law, directed by
the credit card companies and PCI. Conduct audits, store tokens and not CC#’s
o COPPA: For kids, if less than 13yo must protect data, $11k fine if violated.
World Trade Organization gives Copyright Owners choice if data can be commercially rented.
STRIDE
Authorize, Monitor
Approval.
Data Owner is responsible and accountable for classifying and protecting the data, can often be upper management,
Objects are classified, subjects must be cleared (get a clearance), in the end, both have labels, for example a person is
Metrics
Configuration Management Database – information on systems and devices to help facilitate recovery from an event;
Media Management
When presenting to upper management, always look for question relating to “knowing your audience”.
Anyone with access to privileged data is considered to have a privileged account, think CEO’s access. Monitor these
kinds of accounts more
Classification Types
o Commercial
Confidential
Private
Sensitive
Public
o Military
Top Secret
Secret
4
CISSP STUDY GUIDE
Confidential
Unclassified
Data at Rest
o TPM: chip on motherboard that supports encryption, supports full disk encryption.
S-Rule: all algorithms with S in it are symmetric, UNLESS the algorithm starts with an R, then it is
asymmetric
Data Remanence
HDD (In order of most impactful): Erase/Delete/High Level format (least effective), overwriting with
SDD: Destroy
Cloud Environments: Crypto-Erase where you encrypt it with strong algorithm and throw away the
Data in Transit
o Link Encryption: Performed by service provider (ISP). Encrypts all data along the communication path. Data is
o End-to-End Encryption: Performed by end-user. Data remains encrypted all the way to the remote end. Routing
info isn’t encrypted though. Think SSL/TLS, IPsec VPN, WPA/WPA2 (antenna to antenna).
o IPSec: Data in transit confidentiality assured by ESP, integrity assured by AH. Used over VPN (Oakley Key
2 levels of security: AH (integrity through hashing entire packet) + ESP (Confidentiality through
2 transmission modes: Tunnel Mode (WAN, AH+ESP) and Transport Mode (LAN, ESP)
L2TP is made up of 2 sub-protocols (L2F and PPTP) PPTP was replaced by L2F
ESP doesn’t encrypt headers. Think about psychics lacking controls on their brains.
5
CISSP STUDY GUIDE
AH encrypts entire packet
⭐Test Q: to conduct DoS against org, modify CRL with the entity you are targeting so their cert appears revoked⭐
PGP: no cert repository, uses Web of Trust; public keys must be downloaded before encrypted. Uses IDEA symmetric
algorithm.
Hashing: One-way encryption. Usually MD5 (128bits) or SHA-1 (160 bits). Variable input, fixed output (length).
Confirms integrity, that no data has changed from original. MD5 more susceptible to collisions due to lower bits.
o Birthday Attack: can get identical hash from 2 different messages, causing a collision. Use longer hash to
mitigate.
o Rainbow Table: take the hash itself and backtrack it to the PW using huge list of words you’ve already hashed
to make associations. To prevent, salt the messages so their tables won’t find the hash in the list.
Kerckhoff's principle is the concept that a cryptographic system should be designed to be secure, even if all its
Symmetric Algorithms (FAST): RC4, AES, IDEA, DES, 3DES, BLOWFISH – 1 KEY.
o Can provide confidentiality, but not non-repudiation. Usually block cipher, but bit cipher is RC4 and faster.
o Session key, shared key, etc. is always symmetric, since there is only one.
Asymmetric Algorithms (Most Scalable): RSA (most common), ECC, EL-Gamal, Diffie-Hellman (A REED) – 2 KEYS
o Use an encrypt and decrypt key, give away public, keep the private one.
o ECC sometimes used with shorter keys where hardware is limited, such as on smartphone.
o Usually used for key exchange to get the symmetric key to the user/system. Not commonly used for large files as it’s
slow.
AES is the de facto symmetric key standard. 128, 192 and 256 bit keys. Longer keys = more overhead. Replaced DES
because it wasn’t secure enough. ⭐ 3DES replaced DES, minimum # of keys needed is 2. ⭐
Hybrid = I use your public key to encrypt my symmetric key, that only you can open with your private key, thus
Symmetric Encryption = FAST but lots of keys Asymmetric Encryption = Slow but handles keys better
DES/3DES The Diffie-Hellman Algorithm
The Advanced Encryption Standard (AES) RSA
International Data Encryption Algorithm (IDEA) El Gamal
Blowfish Elliptic Curve Cryptosystems (ECC)
RC4/5/6 Knapsack
**PKI uses Asymmetric**
Keys Needed:
6
CISSP STUDY GUIDE
o Asymmetric: 2N keys (n=# of users) e.g. 1000 users need 2000 keys OR 1000 key pairs, scales well.
o Symmetric: (N x (N – 1)) / 2 … e.g. 100 users: (100x99) / 2 = 4950 keys, does not scale well.
o XOR Function: If both are same, you get a 0, if different, you get a 1.
Perfect Forward Secrecy ensures keys are only used for one session and never again.
Diffusion makes changes throughout the entire ciphertext when a change is made.
Covert Channels:
o Steganography – hiding data inside of files (images, mp3’s, etc). Can be used also to do digital watermarking.
o Covert Timing Channel – Process relays info to another by modulating time its use of resources
o Covert Storage Channel – Process writes data to a storage location and somewhere lower clears it and
exfiltrates it.
Digital Rights Management locks down data to only use it how they want you to use it.
Message Authentication Code is hash + secret/session/shared key. No non-repudiation due to it being a shared key.
Certificate Authority (CA) come from outside companies, also internal exist that are not valid on the internet.
Registration Authority (RA) is the middle man doing some of the work, accepts and verifies the registration
Hierarchical Authority is where if you trust the Root CA, you trust all the subordinates as well.
Key Recovery from Escrow is accomplished by M of N, split the key, and you need M of N people to recover it.
Digital Certificates prove Identity and Authentication. Associates a public key with the certificate owner. Usually
Digital Certificates
Provides integrity, authentication, and non-repudiation. Users can’t say they didn’t send the message, because
it was created with their private key. Provides everything but confidentiality!
7
CISSP STUDY GUIDE
Security Architecture is the practice of applying comprehensive methods for an organizations security processes so
that they align with the organizations core goals and strategic direction. Use frameworks such as SABSA
(Sherwood).
⭐Security planning is best up-front during requirements, specifications or after business functional requirements.
Subject = Users
Object = Resource
o Passive entity that contains information (e.g. file, record, memory location)
Information Flow Models: monitors and controls data flow between objects at various levels, can be used to
8
CISSP STUDY GUIDE
o Dedicated Mode – all authenticated users can access all data
o System High Mode – need-to-know, clearance equal to systems highest object on machine
o Multilevel Security Mode – access some with need-to-know, formal approval, or with clearance.
o No Read Up and No Write Down (no WDRU) – No stealing secrets, and no divulging of secrets.
o Simple = Reading (reading is simple), Star = Writing (it’s WRITTEN in the stars)
o Strong Star = only read/write at your own level, no read/write anywhere up or down
o Invocation Property – User can’t even request services from others above them (Secret can’t request info
from TS)
o Simple Integrity Axiom: No Write Up and No Read Down (no WURD) – keep the integrity, don’t look
at data below your current level, but access above you has better integrity so it’s okay to read it.
o Requires “Well Formed Transactions” – steps in defined order always, authenticate those who do the
transactions.
Brewer and Nash Model – Chinese Wall – Looks like confidentiality model
o Dynamic rules so user are only allowed to access data that is not in conflict with data they accessed
previously.
Any other models only on exam for odd man out, if you see it, probably the answer.
Common Criteria: ISO/IEC 15408 – first truly international product evaluation guide
o Developed Protection Profiles for standard devices like firewalls, IDS, etc
o Developer builds a Target of Evaluation (TOE) (the actual product) to meet the Protection Profile
o Authorization consists of an acceptance or rejection of the residual risk outlined in the assessment report.
OS protects itself using Protection Rings. Ring 0 = OS Kernal. HAL is implemented in system software ring. High
Reference Monitor = abstract machine that controls access, the General who controls access.
Security Kernel = enforces and implements rules, the COL enforces it.
Least Privilege: Least privileges they need to do their job. Unless specifically allowed, access is denied.
o Reduces likelihood employees will perform inappropriately if they fear being caught when next rotation
occurs
Backdoor or Trapdoor
o Can be maintenance hooks so they can debug code, but is an area that can be attacked
o Rootkits/etc
o Compiled code at risk for malware/trojan because you can’t see it until it is executed.
o TOC/TOU – attack takes place after it checks the file but before the system uses that file
Code Injection: injecting code like SQL or XML into input buffers. Mitigate with input validation
10
CISSP STUDY GUIDE
Buffer Overflow: too much information and data overwrites it’s correct area. Can crash, display protected info, or
XSS: Inject malicious script into a web page. Common way to steal login credentials
Directory Traversal Attack: Attacker moves from root directory into restricted directories they shouldn’t have
access to.
Open vs Closed: Open is deemed to be more secure because you can at least see the code.
Critical assets and highest security zone at center of building, design to avoid ramming, implement fences, lights,
guards.
CPTED – Crime Prevention Through Environmental Design. Make things less appealing to intruders but make it
more home-like for employees so they feel safe and want to protect it.
Layered Perimeter Defense: Curved driveways to reduce picking up speed. Maintain at least 100ft buffered zone
inside fences so people can see in and are less likely to try to come in.
You want: No Drop Ceilings or Raised Floors, No windows (especially on 1st floor), use laminated tempered glass
o Fencing: 8ft with 3 strands of barbed wire. This will deter determined intruders.
o PIDAS: object placed on fences that alerts when someone is trying to climb it
Escorts required for visitor control, someone should also be responsible for deliveries, etc. Access logging is also
11
CISSP STUDY GUIDE
CCTV: BCD – Blindspot, Cache of important stuff, Doors are best locations for cameras. Short focal length is a
wide-angle view, while long focal length is a narrower view. Think about using a camera!
HVAC cold air in, hot air out with racks. Chicken Coop uses natural outside air to cool data center.
You want positive pressure, so when you open the door, air goes out.
Plenum cabling helps prevent loss of life due to no chemicals when a fire occurs.
Sprinkler Systems: Wet Pipe is dirty water, Dry Pipe is empty until it activates, Preaction initiates when it thinks
there is one, takes time, Deluge is a lot of water, ca be hazardous to occupants. Do not use these in data centers
Network Security
Layer 1:
o Fiber: Single Mode (long distance) and Multi-mode (usually in buildings). Usually run in pairs so one
Topologies: Bus and Ring is multiple points of failure, Star is 1 point of failure, Tree is just hierarchical bus, Mesh
o Ports: FTP (pw sent cleartext), SSH (secure telnet), Telnet (not secure), SMTP (send mail), POP (receive
mail), IMAP (receive mail), DNS (name to IP), DHCP (assigns IP), HTTP/HTTPS, NTP(if modified can
o Layer 7: API, duplexing, FTP, SMTP, SSH, Telnet, HTTP, Web Browsing
o Layer 4: TCP - Reliable, UDP – Fast but unreliable, SSL, TLS, handshake layer, Christmas tree, syn flood,
o Layer 3: IPV4/6, OSPF BGP, Routers, ping occurs here, end-to-end encryption
12
CISSP STUDY GUIDE
o Layer 2: Ethernet, L2TP, Switches (LLC/MAC) ALL TUNNELING HAPPENS HERE, 802.2 and 802.3
o Layer 1: Physical Media & Patch Panels – amplifiers, repeaters, hub, etc.
o IPv4: 32bits, 8 bits per each octet, 4 octets. 2 parts: network and host, depending on class.
o TCP/IP vs OSI
o Collision and Broadcast Domain: A collision occurs when two devices send a packet at the same time on
the shared network segment. ... Each port on a bridge, a switch or router is in a separate collision
13
CISSP STUDY GUIDE
o Router forwards packets and is stateless by design, firewalls doesn’t forward, does stateful inspects.
o RIP (distance vector protocol) counts number of hops, OSPF decides baased on path and speed. OSPF is
preferable over
o Collision and Broadcast Domain: A collision occurs when two devices send a packet at the same time on
the shared network segment. ... Each port on a bridge, a switch or router is in a separate collision domain.
o IPv6 has no classes and is 128bits long, written in hex with no octets, instead uses blocks (8) and
separated by colon (:). No broadcast in IPv6. A public IP is called a Global Unicast (somewhere in the
o Consecutive blocks of zeroes, you replace with ::, but can only use it once earliest in the address, and
you can eliminate leading zeroes, but not ones after a number/symbol. For example 00AB becomes
o Loopback is ::1
DNS Issues:
14
CISSP STUDY GUIDE
o Zone Transfer – Block zone transfers TCP port 53 to remedy. Attack that would occur after this would be
footprinting.
o Dynamic Update – Require all DNS servers to digital sign updates/changes DNSSEC
SCADA (Supervisory Control and Data Acquisition) or Industrial Control System (ICS) is made up of PLCs,
Converge/Super Protocols are merged protocols like Zoom to run multiple types of data over one protocol suite.
E.g. video, chat, file sharing/etc all with one service. More robust and reduces cost of hardware and space.
FCoE (Fiber Channel over Ethernet) allows Fiber channel to use 10Gbit Ethernet Networks.
iSCSI (Internet Small Computer System Interface) is an IP based storage network for linking storage facilities. It
leverages switches to allow multiple clients over TCP/IP. This is a big threat for a Covert Storage Channel
attack.
MPLS is used by ISPs to create private networks over the WANs. Frames are labeled and builds basically a
VoIP is NOT SECURE, it uses Traffic Shaping for QoS, and uses SIP to initiate and RTP to use.
Wireless is 802.11 (regular) and 802.11i (enhanced security). DSSS uses all of the bandwidth, FHSS uses part of
the bandwidth.
802.11n bridged the gap between a (5GHz and 54Mbps) and b (2.4GHz and 11Mbps) since they didn’t
WEP is weak and was replaced by WPA, which had a longer key, had TKIP and a Message Integrity Checker,
and kept RC4 from WEP. This wasn’t good so we finally created WPA2.
Types of Authentication for 802.11: 802.1x, pre-shared key, and open auth (obviously a terrible idea)
15
CISSP STUDY GUIDE
o Pre-shared key issues: subject to dictionary attacks, subject brute force, subject to leeching, no accountability
available.
Mobile Systems
Harden Phones when possible. PINs, encrypt, disable unnecessary apps and services, etc.
Firewalls
Packet Filtering Firewall uses ACL to make access decisions, therefore it is Rule Based.
Dynamic Stateful Firewall keeps track of the “state” or dialog of the communication between internal and
external hosts. Builds a state table to monitor, and performs packet filtering like a standard firewall
DMZ contains anything that needs to get in and out easily from the outside. External DNS, mail servers, etc
Proxy Firewall sits as a middle man between connecting computers and copies the packets from one network to
the other, which makes it slower and there isn’t a direct connection between inside and outside. It hides the
o TOR is a special proxy that lets you hide your information between layers of masking and stay
anonymous
16
CISSP STUDY GUIDE
A Dual Homed Host is 1 host computer, with 2 NICs. One points outside, one points inside. Never allow inter-
Honeypots exist to distract, analyze and discover attackers and zero-day vulnerabilities. They do not exist to lure
Cloud Computing: 5 essential characteristics (Broad Network Access, Rapid Elasticity, Measured Service, On-
Demand Self-Service, Resource Pooling). 3 service models (SaaS, PaaS, IaaS). 4 deployment models (Public,
o Purpose: take network traffic and separate the control from the forwarding layer (forwarding, data plane,
or infrastructure layer)
Virtualized Network Storage: uses software to use multiple machines/servers to create virtual storage, for
Private VLAN: extends capabilities of regular VLAN capabilities. Isolates ports for enhanced security.
17
CISSP STUDY GUIDE
Domain 5 – Access Control
Kerberos - The primary weakness of Kerberos is that the KDC stores the plaintext keys of all principals (clients
and servers). A compromise of the KDC (physical or electronic) can lead to the compromise of every key in the
Kerberos realm. The KDC and TGS are also single points of failure.
o Uses Key Distribution Center (Auth Service and Ticket Granting Service) – single point of failure
Authentication methods - A key concept for implementing any type of access control is controlling the proper
authentication of subjects within the IT system. There are three basic authentication methods:
o something you know – requires testing the subject with some sort of challenge and response where the
o something you have – requires that users possess something, such as a token, which proves they are an
authenticated user.
o something you are – is biometrics, which uses physical characteristics as a means of identification or
authentication.
o A fourth type of authentication is some place you are – describes location-based access control using
technologies such as the GPS, IP address-based geo location. these controls can deny access if the subject
is in incorrect location.
Biometric Enrollment and Throughput - Enrollment describes the process of registering with a biometric system:
creating an account for the first time. Throughput describes the process of authenticating to a biometric system.
18
CISSP STUDY GUIDE
o False Reject Rate (FRR) or Type I error- a false rejection occurs when an authorized subject is rejected by
o False Accept Rate (FAR) or Type II error- a false acceptance occurs when an unauthorized subject is
accepted as valid.
o Crossover Error Rate (CER) – describes the point where the False Reject Rate (FRR) and False Accept
Rate (FAR) are equal. CER is also known as the Equal Error Rate (EER). The Crossover Error Rate
Type 1 hypervisor: hypervisors run directly on the system hardware – A “bare metal” embedded hypervisor,
Type 2 hypervisor: hypervisors run on a host operating system that provides virtualization services, such as I/O
Audits – Observe and then decide if you need short or deep dive.
o 3rd Party Audits is best way to prove compliance with regulation and trustworthiness
In black-box testing, the network and application details are unknown to the tester. In white-box testing, the
network and application infrastructure is provided to the tester, including configuration details. A grey-box
testing can be considered as a combination of black box and a white box. In this scenario, some information about
Penetration Testing exists to see if your organization can withstand a malicious attack. It also serves to see if staff
o Could target physical, operational and electronic security objects, not only technical attacks.
o Discovery ➡ Gain Access ➡ Escalate Privileges ➡ System Browse ➡ Wipe Evidence/Keep Access
o Pivoting is where you start low and island-hop or pivot to get to a higher privileged account
Synthetic transactions are generally used for performance monitoring, and hence, they are directly associated
19
CISSP STUDY GUIDE
Stress tests are performed to test the robustness of the operational capabilities. Denial-of-Service (DoS) is a type
of test used to check the availability of a service under different conditions, such as multiple and simultaneous
requests.
Concurrency tests are performed to test the application with concurrent user activity.
Code review and testing involves testing the source code of an application for the presence of technical
vulnerabilities as well as performance and logical issues. A manual code review is performed to check for any
In a dynamic code review or testing of a program, the software is executed in a simulated system or a virtual
processor.
In a static code review, a software code is analyzed without executing the program code.
A misuse case test is the reverse of a use case test. In other words, doing a malicious act against a system is the
An API test involves the testing of the functionality, performance, and security of application programming
interfaces.
SOC 2 Reporting: CIA + Security and Privacy by company, usually gives the SOC 3 report (shorter) to the
company requesting. SOC 3 provides the pass/fail, that’s what you usually want.
Databases
Relational Database
20
CISSP STUDY GUIDE
o Anything that can define a row is a candidate key.
o A foreign key is a key in another table that references back to the other table.
o Database De-Normalization: pad it with extra or false info (Polyinstantiation = point them to the data
you want the person to see, to hide the real sensitive data. Same key/name, different data!)
o Online Transaction Processing (OLTP) are multiple database systems clustered that are recorded and
o Concurrency: Double Update occurs when two programs access the same element simultaneously.
Deadlock occurs when 2 processes are waiting on each other to release their resources so the other can
o You must have the ability to Roll Back and recover from a change.
Object-Oriented Database
Database Attacks:
Trusted Front-End
Remote Journaling (log shipping) is a technique of backing up transactions (changes, not the entire db) to
Expert System is an AI tool that uses if/then logic to try to reason like a person
Artificial Neural Network (ANN) tries to mimic the human brain, connecting and learning items, matching
21
CISSP STUDY GUIDE
Attacks against computers
Financial crimes
Forensics
22
CISSP STUDY GUIDE
Evidence
E-Discovery: know where the data is, find it and document it.
When you finish the investigation, the reports should follow SOP and be very thorough and standardized, as it
could be discovered by the other party. An investigators notebook is deemed as Hearsay and is used to refresh
memory only.
Log files provide accountability of actions. They are detective controls. Be sure log files are secure so attackers
cannot scrub their tracks. Best way to archive is to write to a DVD-Write Only
SIEM is near real-time and correlates. Modify old rules when you want to reduce false positives. You add new
Synthetic Transactions is where you place bogus data inside of something to see if it can be seen by
administrators.
Egress Monitoring
Tripwire is a way to hash all data and then watch for it leaving the network.
Provisioning
Use A Configuration Management Database (an ITIL thing) to store current configurations and information on
who owns it, issues, requirements, etc. You do this for business continuity so you can go back and recover if
necessary.
Failure Preparation
23
CISSP STUDY GUIDE
Fail-Secure is where it fails to a safe state where all access is blocked. (Bank Vault, security first)
Fail-Open is where it fails open, so anyone can get to it. (Emergency Exit, safety first)
COOP is Continuity of Operations, where you move all essential functions (IT) are transferred to an alternate
Must make a business case that covers impact and value to ensure management buy-in.
CERT Team should have list of outside agencies, experts needed to contact if needed, steps on how to collect
BCP Steps:
2. Business impact analysis (determine business processes, resource requirements, recover times needed)
RTO is Recovery Time Objective, which is the amount of time it takes to restore a system.
WRT is Work Recovery Time, which is how much time it takes to get the system fully operational back into the
business process.
MTD is Maximum Tolerable Downtime, which is the max time you can go without the system.
RPO is Recovery Point Object, which is the backup schedule, so every 4 hours a backup, 4hrs is RPO.
24
CISSP STUDY GUIDE
Shorter the RTO, the more $$ you must spend to get it back up faster.
o MTBF (Mean Time Between Failure) – expected lifetime of component, used to calculate risk of utility
o MTTR (Mean Time to Repair) – time it takes to repair the device, maybe you need spares if it’s long.
RAID 5 – 3 or more disks, striped across with parity, if a disk fails, it is fault tolerant, min 3 disks
RAID 6 – Double Parity, requires 4+ disks, can handle 2 disk failures, min 4 disks
RAID 1+0 – benefits of fault tolerance RAID 1 and the speed of RAID 0
o Remote Journaling is shipping log data and transactions so you can perform rollback.
o Incremental Backup – fastest to backup, only backs up changes, needs the most disks, more often
o Differential Backup – everything modified since last full on another disk. Full + Differential disks.
Testing:
25
CISSP STUDY GUIDE
o Checklist - paperwork
o Simulation – scenario/drills/exercises, may shut down some non-critical functions. First real test.
3 phases: Notification by rescue team, Recovery phase by recovery team, Reconstitution by salvage team.
Move most critical first to alternate site, least critical back to reconstitution to keep critical things up longest.
Contingency Sites:
Waterfall is linear. Logical steps like requirements, design, implement, verify, maintenance. Each step done
before the other, everything falls to next once done. One ends, next begins.
Modified Waterfall you can go up 1 level but not good since you can only go up 1 level.
Spiral was designed to deal with risk with 4 quadrants: Objective, Risk, Build Product, Plan Next phase. Each
spiral hits all 4 quadrants. This focuses on controlling risk. Prototype + Waterfall combo.
26
CISSP STUDY GUIDE
o Run things together as a units (objects). Much faster as things run together in a group
o Highly cohesive when object and result are tightly together, low coupling. This is preferred. Makes them
o Polymorphism – one message to multiple objects but get different responses. It’s how different objects
o SOAP can be used to exchange applications information over the internet (lacks security though).
Compilers take source code and make .exe, an Interpreter is interpreted line by line.
o Initiation
o Development
o Implementation
o Disposal
Disclosure of vulnerabilities should be responsible. Full Disclosure is to public and considered bad.
Prototyping is a fast type of development, uses Rapid Application Deployment (RAD). Documentation is
Evaluation of S/W
27
CISSP STUDY GUIDE
Systems Security Engineering (SSE-CMM) – same as CMM, but addresses security also
Software Assurance Maturity Model (SAMM) takes the process and breaks it up into 4 areas:
1. Governance
2. Construction/App Building
3. Verification of code/design/etc
4. Deployment
Static and White Box are more comprehensive since you go through each line.
Software Code Escrow is protection against the company going out of business, so a 3rd party has access to the
Buffer overflow can crash, spit out privileged info, allow you to execute code, limit with input validations.
28