Table of Contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Acknowledgments
  5. About the Author
  6. About the Technical Editor
  7. Introduction
    1. About This Book
    2. What Is an SSCP?
    3. Using This Book
    4. Major Changes in This Edition
    5. Objective Map
    6. Earning Your Certification
    7. Congratulations! You're Now an SSCP. Now What?
    8. Let's Get Started!
    9. Assessment  Test
    10. Answers to Assessment  Test
  8. PART I: Getting Started as an SSCP
    1. Chapter 1: The Business Case for Decision Assurance and Information Security
      1. Information: The Lifeblood of Business
      2. Policy, Procedure, and Process: How Business Gets Business Done
      3. Who Runs the Business?
      4. Summary
      5. Exam Essentials
      6. Review Questions
    2. Chapter 2: Information Security Fundamentals
      1. The Common Needs for Privacy, Confidentiality, Integrity, and Availability
      2. Training and Educating Everybody
      3. SSCPs and Professional Ethics
      4. Summary
      5. Exam Essentials
      6. Review Questions
  9. PART II: Integrated Risk Management and Mitigation
    1. Chapter 3: Integrated Information Risk Management
      1. It’s a Dangerous World
      2. The Four Faces of Risk
      3. Getting Integrated and Proactive with Information Defense
      4. Risk Management: Concepts and Frameworks
      5. Risk Assessment
      6. Four Choices for Limiting or Containing Damage
      7. Summary
      8. Exam Essentials
      9. Review Questions
    2. Chapter 4: Operationalizing Risk Mitigation
      1. From Tactical Planning to Information Security Operations
      2. Operationalizing Risk Mitigation: Step by Step
      3. The Ongoing Job of Keeping Your Baseline Secure
      4. Ongoing, Continuous Monitoring
      5. Reporting to and Engaging with Management
      6. Summary
      7. Exam Essentials
      8. Review Questions
  10. PART III: The Technologies of Information Security
    1. Chapter 5: Communications and Network Security
      1. Trusting Our Communications in a Converged World
      2. Internet Systems Concepts
      3. Two Protocol Stacks, One Internet
      4. Wireless Network Technologies
      5. IP Addresses, DHCP, and Subnets
      6. IPv4 vs. IPv6: Important Differences and Options
      7. CIANA Layer by Layer
      8. Securing Networks as Systems
      9. Summary
      10. Exam Essentials
      11. Review Questions
    2. Chapter 6: Identity and Access Control
      1. Identity and Access: Two Sides of the Same CIANA+PS Coin
      2. Identity Management Concepts
      3. Access Control Concepts
      4. Network Access Control
      5. Implementing and Scaling IAM
      6. User and Entity Behavior Analytics (UEBA)
      7. Zero Trust Architectures
      8. Summary
      9. Exam Essentials
      10. Review Questions
    3. Chapter 7: Cryptography
      1. Cryptography: What and Why
      2. Building Blocks of Digital Cryptographic Systems
      3. Keys and Key Management
      4. Modern Cryptography: Beyond the “Secret Decoder Ring”
      5. “Why Isn't All of This Stuff Secret?”
      6. Cryptography and CIANA+PS
      7. Public Key Infrastructures
      8. Applying Cryptography to Meet Different Needs
      9. Managing Cryptographic Assets and Systems
      10. Measures of Merit for Cryptographic Solutions
      11. Attacks and Countermeasures
      12. PKI and Trust: A Recap
      13. On the Near Horizon
      14. Summary
      15. Exam Essentials
      16. Review Questions
    4. Chapter 8: Hardware and Systems Security
      1. Infrastructure Security Is Baseline Management
      2. Securing the Physical Context
      3. Infrastructures 101 and Threat Modeling
      4. Endpoint Security
      5. Malware: Exploiting the Infrastructure's Vulnerabilities
      6. Privacy and Secure Browsing
      7. “The Sin of Aggregation”
      8. Updating the Threat Model
      9. Managing Your Systems' Security
      10. Summary
      11. Exam Essentials
      12. Review Questions
    5. Chapter 9: Applications, Data, and Cloud Security
      1. It's a Data-Driven World…At the Endpoint
      2. Software as Appliances
      3. Applications Lifecycles and Security
      4. CIANA+PS and Applications Software Requirements
      5. Application Vulnerabilities
      6. “Shadow IT:” The Dilemma of the User as Builder
      7. Information Quality and Information Assurance
      8. Protecting Data in Motion, in Use, and at Rest
      9. Into the Clouds: Endpoint App and Data Security Considerations
      10. Legal and Regulatory Issues
      11. Countermeasures: Keeping Your Apps and Data Safe and Secure
      12. Summary
      13. Exam Essentials
      14. Review Questions
  11. PART IV: People Power: What Makes or Breaks Information Security
    1. Chapter 10: Incident Response and Recovery
      1. Defeating the Kill Chain One Skirmish at a Time
      2. Harsh Realities of Real Incidents
      3. Incident Response Framework
      4. Preparation
      5. Detection and Analysis
      6. Containment and Eradication
      7. Recovery: Getting Back to Business
      8. Post-Incident Activities
      9. Summary
      10. Exam Essentials
      11. Review Questions
      12. Note
    2. Chapter 11: Business Continuity via Information Security and People Power
      1. What Is a Disaster?
      2. Surviving to Operate: Plan for It!
      3. Timelines for BC/DR Planning and Action
      4. Options for Recovery
      5. Cloud-Based “Do-Over” Buttons for Continuity, Security, and Resilience
      6. People Power for BC/DR
      7. Security Assessment: For BC/DR and Compliance
      8. Converged Communications: Keeping Them Secure During BC/DR Actions
      9. Summary
      10. Exam Essentials
      11. Review Questions
    3. Chapter 12: Cross-Domain Challenges
      1. Operationalizing Security Across the Immediate and Longer Term
      2. Supply Chains, Security, and the SSCP
      3. Other Dangers on the Web and Net
      4. On Our Way to the Future
      5. Enduring Lessons
      6. Your Next Steps
      7. At the Close
      8. Exam Essentials
      9. Review Questions
  12. Appendix: Answers to Review Questions
    1. Chapter 1: The Business Case for Decision Assurance and Information Security
    2. Chapter 2: Information Security Fundamentals
    3. Chapter 3: Integrated Information Risk Management
    4. Chapter 4: Operationalizing Risk Mitigation
    5. Chapter 5: Communications and Network Security
    6. Chapter 6: Identity and Access Control
    7. Chapter 7: Cryptography
    8. Chapter 8: Hardware and Systems Security
    9. Chapter 9: Applications, Data, and Cloud Security
    10. Chapter 10: Incident Response and Recovery
    11. Chapter 11: Business Continuity via Information Security and People Power
    12. Chapter 12: Cross-Domain Challenges
  13. Index
  14. End User License Agreement

List of Tables

  1. Introduction
    1. TABLE I.1 Objective Map
  2. Chapter 5
    1. TABLE 5.1 OSI and TCP/IP side by side
    2. TABLE 5.2 OSI 7-layer model and TCP/IP 4-layer model in context
    3. TABLE 5.3 Common TCP/IP ports and protocols
    4. TABLE 5.4 IPv4 address classes
    5. TABLE 5.5 Address classes and CIDR

List of Illustrations

  1. Chapter 1
    1. FIGURE 1.1 The knowledge pyramid
    2. FIGURE 1.2 Messaging at passenger screening (notional)
    3. FIGURE 1.3 The value chain
    4. FIGURE 1.4 Ishikawa (or “fishbone”) diagram for a value process
    5. FIGURE 1.5 The organization chart as pyramid (traditional view)
    6. FIGURE 1.6 The inverted pyramid supports work at the gemba
  2. Chapter 3
    1. FIGURE 3.1 Vulnerability leads to failure, which leads to impact
    2. FIGURE 3.2 Four faces of risk, viewed together
    3. FIGURE 3.3 The layered view
    4. FIGURE 3.4 NIST RMF areas of concern
    5. FIGURE 3.5 NIST RMF phased approach
    6. FIGURE 3.6 ISO 31000:2018 Conceptual RMF
    7. FIGURE 3.7 PDCA cycle diagram (simple), with subcycles
  3. Chapter 4
    1. FIGURE 4.1 John Boyd’s OODA loop
    2. FIGURE 4.2 Risk mitigation major steps
  4. Chapter 5
    1. FIGURE 5.1 Wrapping: layer-by-layer encapsulation
    2. FIGURE 5.2 Bus topology
    3. FIGURE 5.3 Ring network topology
    4. FIGURE 5.4 Star (or tree) network topology
    5. FIGURE 5.5 Mesh network topology (fully connected)
    6. FIGURE 5.6 Data Link layer frame format
    7. FIGURE 5.7 IPv4 packet format
    8. FIGURE 5.8 Easy OSI mnemonics
    9. FIGURE 5.9 Changes to the packet header from IPv4 to IPv6
  5. Chapter 6
    1. FIGURE 6.1 Subjects and objects
    2. FIGURE 6.2 US-CERT Traffic Light Protocol for information classification and...
    3. FIGURE 6.3 Bell-LaPadula (a) vs. Biba access control models (b)
    4. FIGURE 6.4 Crossover error rate (where FAR equals FRR)
    5. FIGURE 6.5 Overall access control system error rates trade space
    6. FIGURE 6.6 Digital identity and credentials process model (from NIST SP 800-...
    7. FIGURE 6.7 UEBA security in operation (conceptual)
  6. Chapter 7
    1. FIGURE 7.1 The basics of encoding, encrypting, decrypting, and decoding
    2. FIGURE 7.2 Substitution and transposition
    3. FIGURE 7.3 Comparing hashing and encryption as functions
    4. FIGURE 7.4 Chains of trust
    5. FIGURE 7.5 Certification path validation algorithm
    6. FIGURE 7.6 The blockchain concept
    7. FIGURE 7.7 Crypto family tree
  7. Chapter 8
    1. FIGURE 8.1 Notional datacenter design
    2. FIGURE 8.2 Is this firmware update good news?
  8. Chapter 9
    1. FIGURE 9.1 Waterfall software development lifecycle model
  9. Chapter 10
    1. FIGURE 10.1 Incident triage and response process
    2. FIGURE 10.2 ATT&CK enterprise framework (partial)
    3. FIGURE 10.3 Incident response process
    4. FIGURE 10.4 NIST 800-61 incident response flow
    5. FIGURE 10.5 Incident Handling Checklist
  10. Chapter 11
    1. FIGURE 11.1 Continuity of operations planning and supporting planning proces...
    2. FIGURE 11.2 Timelines for incident response, recovery, and continuity
    3. FIGURE 11.3 Beyond the seventh layer

Guide

  1. Cover Page
  2. Title Page
  3. Copyright
  4. Acknowledgments
  5. About the Author
  6. About the Technical Editor
  7. Introduction
  8. TABLE of Contents
  9. Begin Reading
  10. Appendix: Answers to Review Questions
  11. Index
  12. WILEY END USER LICENSE AGREEMENT

Pages

  1. iii
  2. iv
  3. v
  4. vii
  5. ix
  6. xxv
  7. xxvi
  8. xxvii
  9. xxviii
  10. xxix
  11. xxx
  12. xxxi
  13. xxxii
  14. xxxiii
  15. xxxiv
  16. xxxv
  17. xxxvi
  18. xxxvii
  19. xxxviii
  20. xxxix
  21. xl
  22. xli
  23. xlii
  24. xliii
  25. xliv
  26. xlv
  27. xlvi
  28. xlvii
  29. xlviii
  30. xlix
  31. l
  32. li
  33. lii
  34. liii
  35. liv
  36. lv
  37. lvi
  38. lvii
  39. lviii
  40. lix
  41. lx
  42. lxi
  43. lxii
  44. lxiii
  45. lxiv
  46. lxv
  47. lxvi
  48. lxvii
  49. 1
  50. 2
  51. 3
  52. 4
  53. 5
  54. 6
  55. 7
  56. 8
  57. 9
  58. 10
  59. 11
  60. 12
  61. 13
  62. 14
  63. 15
  64. 16
  65. 17
  66. 18
  67. 19
  68. 20
  69. 21
  70. 22
  71. 23
  72. 24
  73. 25
  74. 26
  75. 27
  76. 28
  77. 29
  78. 30
  79. 31
  80. 33
  81. 34
  82. 35
  83. 36
  84. 37
  85. 38
  86. 39
  87. 40
  88. 41
  89. 42
  90. 43
  91. 44
  92. 45
  93. 46
  94. 47
  95. 48
  96. 49
  97. 50
  98. 51
  99. 52
  100. 53
  101. 54
  102. 55
  103. 56
  104. 57
  105. 58
  106. 59
  107. 61
  108. 62
  109. 63
  110. 64
  111. 65
  112. 66
  113. 67
  114. 68
  115. 69
  116. 70
  117. 71
  118. 72
  119. 73
  120. 74
  121. 75
  122. 76
  123. 77
  124. 78
  125. 79
  126. 80
  127. 81
  128. 82
  129. 83
  130. 84
  131. 85
  132. 86
  133. 87
  134. 88
  135. 89
  136. 90
  137. 91
  138. 92
  139. 93
  140. 94
  141. 95
  142. 96
  143. 97
  144. 98
  145. 99
  146. 100
  147. 101
  148. 102
  149. 103
  150. 104
  151. 105
  152. 106
  153. 107
  154. 108
  155. 109
  156. 110
  157. 111
  158. 112
  159. 113
  160. 114
  161. 115
  162. 116
  163. 117
  164. 118
  165. 119
  166. 120
  167. 121
  168. 122
  169. 123
  170. 124
  171. 125
  172. 126
  173. 127
  174. 128
  175. 129
  176. 130
  177. 131
  178. 132
  179. 133
  180. 134
  181. 135
  182. 136
  183. 137
  184. 138
  185. 139
  186. 140
  187. 141
  188. 142
  189. 143
  190. 144
  191. 145
  192. 146
  193. 147
  194. 148
  195. 149
  196. 150
  197. 151
  198. 152
  199. 153
  200. 154
  201. 155
  202. 156
  203. 157
  204. 158
  205. 159
  206. 160
  207. 161
  208. 162
  209. 163
  210. 164
  211. 165
  212. 166
  213. 167
  214. 168
  215. 169
  216. 170
  217. 171
  218. 172
  219. 173
  220. 174
  221. 175
  222. 176
  223. 177
  224. 178
  225. 179
  226. 180
  227. 181
  228. 182
  229. 183
  230. 184
  231. 185
  232. 186
  233. 187
  234. 188
  235. 189
  236. 190
  237. 191
  238. 192
  239. 193
  240. 194
  241. 195
  242. 197
  243. 198
  244. 199
  245. 200
  246. 201
  247. 202
  248. 203
  249. 204
  250. 205
  251. 206
  252. 207
  253. 208
  254. 209
  255. 210
  256. 211
  257. 212
  258. 213
  259. 214
  260. 215
  261. 216
  262. 217
  263. 218
  264. 219
  265. 220
  266. 221
  267. 222
  268. 223
  269. 224
  270. 225
  271. 226
  272. 227
  273. 228
  274. 229
  275. 230
  276. 231
  277. 232
  278. 233
  279. 234
  280. 235
  281. 236
  282. 237
  283. 238
  284. 239
  285. 240
  286. 241
  287. 242
  288. 243
  289. 244
  290. 245
  291. 246
  292. 247
  293. 248
  294. 249
  295. 250
  296. 251
  297. 252
  298. 253
  299. 254
  300. 255
  301. 256
  302. 257
  303. 258
  304. 259
  305. 260
  306. 261
  307. 262
  308. 263
  309. 264
  310. 265
  311. 266
  312. 267
  313. 268
  314. 269
  315. 270
  316. 271
  317. 272
  318. 273
  319. 274
  320. 275
  321. 276
  322. 277
  323. 278
  324. 279
  325. 280
  326. 281
  327. 282
  328. 283
  329. 284
  330. 285
  331. 286
  332. 287
  333. 288
  334. 289
  335. 290
  336. 291
  337. 292
  338. 293
  339. 294
  340. 295
  341. 296
  342. 297
  343. 298
  344. 299
  345. 300
  346. 301
  347. 302
  348. 303
  349. 304
  350. 305
  351. 306
  352. 307
  353. 308
  354. 309
  355. 310
  356. 311
  357. 312
  358. 313
  359. 314
  360. 315
  361. 316
  362. 317
  363. 318
  364. 319
  365. 320
  366. 321
  367. 322
  368. 323
  369. 324
  370. 325
  371. 326
  372. 327
  373. 328
  374. 329
  375. 330
  376. 331
  377. 332
  378. 333
  379. 334
  380. 335
  381. 336
  382. 337
  383. 338
  384. 339
  385. 340
  386. 341
  387. 342
  388. 343
  389. 344
  390. 345
  391. 346
  392. 347
  393. 348
  394. 349
  395. 350
  396. 351
  397. 352
  398. 353
  399. 354
  400. 355
  401. 356
  402. 357
  403. 358
  404. 359
  405. 360
  406. 361
  407. 362
  408. 363
  409. 364
  410. 365
  411. 366
  412. 367
  413. 368
  414. 369
  415. 370
  416. 371
  417. 372
  418. 373
  419. 374
  420. 375
  421. 376
  422. 377
  423. 378
  424. 379
  425. 380
  426. 381
  427. 382
  428. 383
  429. 384
  430. 385
  431. 386
  432. 387
  433. 388
  434. 389
  435. 390
  436. 391
  437. 392
  438. 393
  439. 394
  440. 395
  441. 396
  442. 397
  443. 398
  444. 399
  445. 400
  446. 401
  447. 402
  448. 403
  449. 404
  450. 405
  451. 406
  452. 407
  453. 408
  454. 409
  455. 410
  456. 411
  457. 412
  458. 413
  459. 414
  460. 415
  461. 416
  462. 417
  463. 418
  464. 419
  465. 420
  466. 421
  467. 422
  468. 423
  469. 424
  470. 425
  471. 426
  472. 427
  473. 428
  474. 429
  475. 430
  476. 431
  477. 432
  478. 433
  479. 434
  480. 435
  481. 436
  482. 437
  483. 438
  484. 439
  485. 440
  486. 441
  487. 442
  488. 443
  489. 444
  490. 445
  491. 446
  492. 447
  493. 448
  494. 449
  495. 450
  496. 451
  497. 452
  498. 453
  499. 454
  500. 455
  501. 456
  502. 457
  503. 458
  504. 459
  505. 460
  506. 461
  507. 462
  508. 463
  509. 464
  510. 465
  511. 466
  512. 467
  513. 468
  514. 469
  515. 470
  516. 471
  517. 472
  518. 473
  519. 474
  520. 475
  521. 476
  522. 477
  523. 478
  524. 479
  525. 480
  526. 481
  527. 482
  528. 483
  529. 484
  530. 485
  531. 486
  532. 487
  533. 488
  534. 489
  535. 490
  536. 491
  537. 492
  538. 493
  539. 494
  540. 495
  541. 496
  542. 497
  543. 498
  544. 499
  545. 500
  546. 501
  547. 502
  548. 503
  549. 504
  550. 505
  551. 506
  552. 507
  553. 508
  554. 509
  555. 510
  556. 511
  557. 512
  558. 513
  559. 514
  560. 515
  561. 516
  562. 517
  563. 518
  564. 519
  565. 520
  566. 521
  567. 522
  568. 523
  569. 524
  570. 525
  571. 526
  572. 527
  573. 528
  574. 529
  575. 530
  576. 531
  577. 532
  578. 533
  579. 534
  580. 535
  581. 536
  582. 537
  583. 538
  584. 539
  585. 540
  586. 541
  587. 542
  588. 543
  589. 544
  590. 545
  591. 546
  592. 547
  593. 548
  594. 549
  595. 550
  596. 551
  597. 552
  598. 553
  599. 554
  600. 555
  601. 556
  602. 557
  603. 558
  604. 559
  605. 560
  606. 561
  607. 562
  608. 563
  609. 564
  610. 565
  611. 566
  612. 567
  613. 568
  614. 569
  615. 570
  616. 571
  617. 572
  618. 573
  619. 574
  620. 575
  621. 576
  622. 577
  623. 578
  624. 579
  625. 580
  626. 581
  627. 582
  628. 583
  629. 584
  630. 585
  631. 586
  632. 587
  633. 588
  634. 589
  635. 590
  636. 591
  637. 592
  638. 593
  639. 594
  640. 595
  641. 596
  642. 597
  643. 598
  644. 599
  645. 600
  646. 601
  647. 602
  648. 603
  649. 604
  650. 605
  651. 606
  652. 607
  653. 608
  654. 609
  655. 610
  656. 611
  657. 612
  658. 613
  659. 614
  660. 615
  661. 616
  662. 617
  663. 618
  664. 619
  665. 620
  666. 621
  667. 622
  668. 623
  669. 624
  670. 625
  671. 626
  672. 627
  673. 628
  674. 629
  675. 630
  676. 631
  677. 632
  678. 633
  679. 634
  680. 635
  681. 636
  682. 637
  683. 638
  684. 639
  685. 640
  686. 641
  687. 642
  688. 643
  689. 644
  690. 645
  691. 646
  692. 647
  693. 648
  694. 649
  695. 650
  696. 651
  697. 652
  698. 653
  699. 654
  700. 655
  701. 656
  702. 657
  703. 658
  704. 659
  705. 660
  706. 661
  707. 662
  708. 663
  709. 664
  710. 665
  711. 666
  712. 667
  713. 668
  714. 669
  715. 670
  716. 671
  717. 672
  718. 673
  719. 674
  720. 675
  721. 676
  722. 677
  723. 678
  724. 679
  725. 680
  726. 681
  727. 682
  728. 683
  729. 684
  730. 685
  731. 686
  732. 687
  733. 688
  734. 689
  735. 690
  736. 691
  737. 692
  738. 693
  739. 694
  740. 695
  741. 696
  742. 697
  743. 698
  744. 699
  745. 700
  746. 701
  747. 702
  748. 703
  749. 704
  750. 705
  751. 706
  752. 707
  753. 708
  754. 709
  755. 710
  756. 711
  757. 712
  758. 713
  759. 714
  760. 715
  761. 716
  762. 717
  763. 718
  764. 719
  765. 720
  766. 721
  767. 722
  768. 723
  769. 724
  770. 725
  771. 727
  772. 728
  773. 729
  774. 730
  775. 731
  776. 732
  777. 733
  778. 734
  779. 735
  780. 736
  781. 737
  782. 738
  783. 739
  784. 740
  785. 741
  786. 742
  787. 743
  788. 744
  789. 745
  790. 746
  791. 747
  792. 748