ebook img

SSCP Systems Security Certified Practitioner All-in-One Exam Guide PDF

577 Pages·2015·37.11 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview SSCP Systems Security Certified Practitioner All-in-One Exam Guide

www.allitebooks.com All-In-One / SSCP® Systems Security Certifed Practitioner / Gibson / 307-4 / Front Matter Blind Folio i ALL IN ONE ® SSCP Systems Security Certifed Practitioner E X A M G U I D E Second Edition Darril Gibson New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto McGraw-Hill Education is an independent entity from (ISC)²® and is not afliated with (ISC)² in any manner. Tis study/ training guide and/or material is not sponsored by, endorsed by, or afliated with (ISC)2 in any manner. Tis publication and digital content may be used in assisting students to prepare for the SSCP® exam. Neither (ISC)² nor McGraw-Hill Education warrant that use of this publication and digital content will ensure passing any exam. (ISC)²®, CISSP®, CAP®, ISSAP®, ISSEP®, ISSMP®, SSCP®, CSSLP®, and CBK® are trademarks or registered trademarks of (ISC)² in the United States and certain other countries. All other trademarks are trademarks of their respective owners. www.allitebooks.com 00-FM.indd 1 21/08/15 1:56 pm Copyright © 2016 by McGraw-Hill Education. All rights reserved. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication. ISBN: 978-1-25-958306-3 MHID: 1-25-958306-6 The material in this eBook also appears in the print version of this title: ISBN: 978-1-25-958307-0, MHID: 1-25-958307-4. eBook conversion by codeMantra Version 1.0 All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the beneft of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill Education eBooks are available at special quantity discounts to use as premiums and sales promotions or for use in corporate training programs. To contact a representative, please visit the Contact Us page at www.mhprofessional.com. Information has been obtained by McGraw-Hill Education from sources believed to be reliable. However, because of the possibility of human or mechanical error by our sources, McGraw-Hill Education, or others, McGraw-Hill Education does not guarantee the accuracy, adequacy, or completeness of any information and is not responsible for any errors or omissions or the results obtained from the use of such information. TERMS OF USE This is a copyrighted work and McGraw-Hill Education and its licensors reserve all rights in and to the work. Use of this work is subject to these terms. Except as permitted under the Copyright Act of 1976 and the right to store and retrieve one copy of the work, you may not decompile, disassemble, reverse engineer, reproduce, modify, create derivative works based upon, transmit, distribute, disseminate, sell, publish or sublicense the work or any part of it without McGraw-Hill Education’s prior consent. You may use the work for your own noncommercial and personal use; any other use of the work is strictly prohibited. Your right to use the work may be terminated if you fail to comply with these terms. THE WORK IS PROVIDED “AS IS.” McGRAW-HILL EDUCATION AND ITS LICENSORS MAKE NO GUARANTEES OR WARRANTIES AS TO THE ACCURACY, ADEQUACY OR COMPLETENESS OF OR RESULTS TO BE OBTAINED FROM USING THE WORK, INCLUDING ANY INFORMATION THAT CAN BE ACCESSED THROUGH THE WORK VIA HYPERLINK OR OTHERWISE, AND EXPRESSLY DISCLAIM ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. McGraw-Hill Education and its licensors do not warrant or guarantee that the functions contained in the work will meet your requirements or that its operation will be uninterrupted or error free. Neither McGraw-Hill Education nor its licensors shall be liable to you or anyone else for any inaccuracy, error or omission, regardless of cause, in the work or for any damages resulting therefrom. McGraw-Hill Education has no responsibility for the content of any information accessed through the work. Under no circumstances shall McGraw-Hill Education and/or its licensors be liable for any indirect, incidental, special, punitive, consequential or similar damages that result from the use of or inability to use the work, even if any of them has been advised of the possibility of such damages. This limitation of liability shall apply to any claim or cause whatsoever whether such claim or cause arises in contract, tort or otherwise. www.allitebooks.com All-In-One / SSCP® Systems Security Certifed Practitioner / Gibson / 307-4 / Front Matter Blind Folio iii To my wife Nimfa— Tanks for sharing your life with me for the past 23 years and letting me share mine with you. www.allitebooks.com 00-FM.indd 3 21/08/15 1:56 pm All-In-One / SSCP® Systems Security Certifed Practitioner / Gibson / 307-4 / Front Matter ABOU T T H E A U T HOR aD rri l Gibson is the CEO of YCDA, LLC (short for You Can Do Anything) and he has authored or coauthored more than 35 books. Darril regularly writes, consults, and teaches on a wide variety of technical and security topics and holds several certifications, including (ISC)2 SSCP and CISSP; CompTIA Security+ and CASP; Microsoft MCSE and MCITP; and ITIL Foundations. In response to repeated requests, Darril created the http://gcgapremium.com/ site where he provides additional study materials for several certification exams. He regularly posts blog articles (http://blogs.getcertifiedgetahead .com/) about certification topics and uses that site to help people stay abreast of changes in certification exams. You can contact him through either of these sites. Darril lives in Virginia Beach with his wife and two dogs. Whenever possible, they escape to a small cabin in the country on over 20 acres of land that continues to provide them with peace, tranquility, and balance. About the Technical Editor oJ s h More has more than 15 years of experience in security, IT, development, and system and network administration. Currently, he runs Eyra Security, a security and business improvement consulting firm based in Minneapolis, MN. Josh holds several security and technical certifications and has served in a leadership position on several security-focused groups. He writes a blog on security at www.starmind.org, often taking a unique approach to solving security problems by applying lessons from other disciplines like agile develop- ment, lean manufacturing, psychology, economics and complexity science. He has also written several books on IT, information security, and career management. www.allitebooks.com 00-FM.indd 4 21/08/15 1:56 pm All-In-One / SSCP® Systems Security Certifed Practitioner / Gibson / 307-4 / Front Matter CONTENTS AT A GLANCE Chapter 1 Security Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 2 Access Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Chapter 3 Basic Networking and Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 Chapter 4 Advanced Networking and Communications . . . . . . . . . . . . . . . . . . . . . . . 115 Chapter 5 Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 Chapter 6 Malicious Code and Activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 Chapter 7 Risk, Response, and Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243 Chapter 8 Monitoring and Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275 Chapter 9 Controls and Countermeasures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303 Chapter 10 Auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 Chapter 11 Security Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371 Chapter 12 Security Administration and Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407 Chapter 13 Legal Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439 Chapter 14 Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465 Appendix About the Download . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511 Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539 v www.allitebooks.com 00-FM.indd 5 21/08/15 1:56 pm This page intentionally left blank www.allitebooks.com All-In-One / SSCP® Systems Security Certifed Practitioner / Gibson / 307-4 / Front Matter CSTNETNO Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix Chapter 1 Security Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Reviewing the Requirements for SSCP . . . . . . . . . . . . . . . . . . . . . . 1 Registering for the Exam . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Have One Year of Experience . . . . . . . . . . . . . . . . . . . . . . . . 3 Passing the Exam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Maintaining Your SSCP Certification . . . . . . . . . . . . . . . . . . 7 Understanding Basic Security Concepts . . . . . . . . . . . . . . . . . . . . . 8 Confidentiality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Exploring Fundamentals of Security . . . . . . . . . . . . . . . . . . . . . . . . 13 Least Privilege . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Separation of Duties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Defense in Depth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Nonrepudiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 AAAs of Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Accountability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Due Diligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Due Care . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Chapter 2 Access Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Comparing Identification, Authentication, and Authorization . . . . 27 Exploring Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Three Factors of Authentication . . . . . . . . . . . . . . . . . . . . . . 29 Multifactor Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Reviewing Identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Single Sign-on Authentication . . . . . . . . . . . . . . . . . . . . . . . . 38 Centralized vs. Decentralized Authentication . . . . . . . . . . . . 42 Offline Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Device Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 vii www.allitebooks.com 00-FM.indd 7 21/08/15 1:56 pm All-In-One S sme rucetsiy S ®PCS / re t C yit ca rit P de� it iG / reno re M t t no a r F / 4-703 / nosb SSCP® Systems Security Certified Practitioner All-in-One Exam Guide viii Implementing Access Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Comparing Subjects and Objects . . . . . . . . . . . . . . . . . . . . . . 44 Logical Access Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Comparing Access Control Models . . . . . . . . . . . . . . . . . . . . . . . . . 47 Discretionary Access Control . . . . . . . . . . . . . . . . . . . . . . . . . 47 Non-Discretionary Access Control . . . . . . . . . . . . . . . . . . . . 49 Access Control Matrix vs. Capability Table . . . . . . . . . . . . . . 55 Participating in the Identity-Management Life Cycle . . . . . . . . . . . 55 Identity Proofing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Provisioning and Authorization . . . . . . . . . . . . . . . . . . . . . . . 56 Maintenance and Entitlement . . . . . . . . . . . . . . . . . . . . . . . . 57 De-provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Participating in Physical Security Operations . . . . . . . . . . . . . . . . . 58 Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Chapter 3 Basic Networking and Communications . . . . . . . . . . . . . . . . . . . . . . 67 The OSI Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 The Physical Layer (Layer 1) . . . . . . . . . . . . . . . . . . . . . . . . . 68 The Data Link Layer (Layer 2) . . . . . . . . . . . . . . . . . . . . . . . 69 The Network Layer (Layer 3) . . . . . . . . . . . . . . . . . . . . . . . . 70 The Transport Layer (Layer 4) . . . . . . . . . . . . . . . . . . . . . . . . 70 The Session Layer (Layer 5) . . . . . . . . . . . . . . . . . . . . . . . . . . 71 The Presentation Layer (Layer 6) . . . . . . . . . . . . . . . . . . . . . . 72 The Application Layer (Layer 7) . . . . . . . . . . . . . . . . . . . . . . 72 Comparing the OSI and TCP/IP Models . . . . . . . . . . . . . . . . . . . . 72 Network Topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Bus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Star . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Token Ring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Mesh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Reviewing Basic Protocols and Ports . . . . . . . . . . . . . . . . . . . . . . . . 79 Comparing IPv4 and IPv6 . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Dynamic Host Configuration Protocol . . . . . . . . . . . . . . . . . 80 Address Resolution Protocol . . . . . . . . . . . . . . . . . . . . . . . . . 81 Network Discovery Protocol . . . . . . . . . . . . . . . . . . . . . . . . . 82 Domain Name System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Internet Control Message Protocol . . . . . . . . . . . . . . . . . . . . 83 Internet Group Message Protocol . . . . . . . . . . . . . . . . . . . . . 83 Simple Network Management Protocol . . . . . . . . . . . . . . . . . 84 File Transfer Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 www.allitebooks.com 00-FM.indd 8 21/08/15 1:56 pm All-In-One S sme rucetsiy S ®PCS / re t C yit ca rit P de� it iG / reno re M t t no a r F / 4-703 / nosb Contents ix Secure Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 HyperText Transfer Protocol and HyperText Transfer Protocol Secure . . . . . . . . . . . . . . . . . . 86 Transport Layer Security and Secure Sockets Layer . . . . . . . . 86 Network File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Routing Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 E-mail Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Tunneling Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Internet Protocol Security . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Mapping Well-Known Ports to Protocols . . . . . . . . . . . . . . . . 89 Comparing Ports and Protocol Numbers . . . . . . . . . . . . . . . . 91 Comparing Internetwork Trust Architectures . . . . . . . . . . . . . . . . . 91 Comparing Public and Private IP Addresses . . . . . . . . . . . . . . 93 Using NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Comparing Trust Relationships . . . . . . . . . . . . . . . . . . . . . . . 96 Exploring Wireless Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Securing Data Transmissions . . . . . . . . . . . . . . . . . . . . . . . . . 99 Wireless Device Administrator Password . . . . . . . . . . . . . . . . 101 Wireless Service Set Identifier . . . . . . . . . . . . . . . . . . . . . . . . 102 MAC Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 Bluetooth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 GSM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 3G, LTE, and 4G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 WiMAX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 Radio Frequency Identification . . . . . . . . . . . . . . . . . . . . . . . 105 NFC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 Protecting Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 Chapter Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 Chapter 4 Advanced Networking and Communications . . . . . . . . . . . . . . . . . 115 Managing LAN-Based Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Comparing Switches and Routers . . . . . . . . . . . . . . . . . . . . . 115 Segmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Secure Device Management . . . . . . . . . . . . . . . . . . . . . . . . . . 120 Understanding Telecommunications . . . . . . . . . . . . . . . . . . . . . . . . 120 Internet Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 VoIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 Securing Phones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 Converged Communications . . . . . . . . . . . . . . . . . . . . . . . . . 123 Using Proxy Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 Understanding Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Packet-Filtering Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Stateful Inspection Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . 127 www.allitebooks.com 00-FM.indd 9 21/08/15 1:56 pm

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.