2022 ITM Short Course - Week 3

Download as pdf or txt
Download as pdf or txt
You are on page 1of 25

CISSP Study Session

Attention Attendees:
Remember to type your messages to all panellists and attendees
CISSP domains
• Domain 1 – Security and Risk Management
• Domain 2 – Asset Security
• Domain 3– Security Architecture and Engineering
• Domain 4 – Communication and Network Security
• Domain 5 – Identity and Access Management (IAM)
• Domain 6 – Security Assessment and Testing
• Domain 7 – Security Operations
• Domain 8 – Software Development Security
Recommended Text
(ISC)2 CISSP Certified Information Systems Security
Professional Official Study Guide, 9th Edition
Mike Chapple, James Michael Stewart, Darril Gibson

Official Wiley Link


Domain 4 – Communication & Network Security
OSI Model – 7 layers
Application

Presentation

Session

Transport

Network

Data

Physical
TCP/IP Model – 4 layers
Application

Transport

Internet

Link
OSI vs TCP/IP models

Chapple et al, 2021, p504


Common Application Layer Protocols (L7)
• Telnet
• FTP
• POP3
• HTTP
• SNMP
TCP three-way handshake
• Used to establish a reliable connection
• Connection oriented
• SYN > SYN/ACK > ACK
• Other flags:
• URG
• PSH
• RST
• FIN
UDP
• Connectionless
• Faster than TCP, used often for real-time purposes
Domain Naming Service (DNS)
• Internet domains (TLD’s, 2LD’s, subdomains)
• Common DNS records
• A record
• CNAME
• TXT
• MX
• NS
• DNSSEC
• DNS poisoning, spoofing and pharming
IPv4 vs IPv6
• IPv4
• 32-bits (4,294,967,296 addresses)
• NAT often used
• IPv6
• 128-bits (3.4 x 10^38) unique IP addresses
• Support for IPv6
• An IP address for everything
• No-NAT
Protocol Security
• Authentication Protocols
• PAP/CHAP/EAP
• 802.1x
• Port Security
• Quality of Service (QoS)
Securing Voice Communications
Remote Connection Security
• Authentication
• Multifactor Authentication
• Something you know
• Something you have
• Something you are
• Encryption in transit
• TLS
Domain 5 – Identity & Access Management (IAM)
Controlling Physical & Logical Access
• Physical Security
• HVAC
• Cameras
• Bollards
• Other Security Controls
• Logical Security
• Technical controls used to protect access to information and systems
Identification and Authentication
• Identifying – the process of claiming and identity
• Authentication – verifying the identity
Authentication, Authorisation and Accounting
(AAA)
• Authentication – verifying identity of a subject
• Authorisation – granting the subject access to objects
• Accounting – holding subjects accountable (e.g. auditing)
Authentication
• Passwords, MFA, etc.
• Password Policies
• Minimum age
• Maximum age
• Complexity
• Length
• History
• Review NIST SP 800-63C and PCI-DSS
• Single Sign-On (SSO)
• Federation
RBAC, MAC, DAC, ABAC, etc.
• Role based access control
• Rule based access control
• Mandatory access control
• Discretionary access control
• Attributed based access control
• Risk based access control
Least privilege & privilege escalation
• Least privilege and need-to-know
• Runas and sudo
Readings
• CISSP Official Study Guide (Ninth Edition) – Chapters 12-14.

Attention Attendees:
Remember to type your messages to all panellists and attendees
Questions?
About Me
Dr. Georg Thomas
Senior Manager, Deloitte Australia
20+ years industry experience
DInfoTech, MMgmt(InfoTech),
BInfoTech(SysAdmin)
CCISO, CDPSE, CISM, CISSP, ISO27001 Lead linkedin.com/in/georgthomas
Implementer, GRCP, MACS Snr. CP (Cyber @georgathomas
Security), MCSE scholar.google.com/citations?user=z72s_9
ACS Profession Advisory Board Member MAAAAJ
References
• Chapple, M., Stewart, J. M., Gibson, D. (2021). (ISC)2 CISSP Certified Information
Systems Security Professional Official Study Guide, 9th Edition. Wiley. 8

You might also like