Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
The only SSCP study guide officially approved by (ISC)2
The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is a well-known vendor-neutral global IT security certification. The SSCP is designed to show that holders have the technical skills to implement, monitor, and administer IT infrastructure using information security policies and procedures.
This comprehensive Official Study Guide-the only study guide officially approved by (ISC)2-covers all objectives of the seven SSCP domains.
This updated Third Edition covers the SSCP exam objectives effective as of November 2021. Much of the new and more advanced knowledge expected of an SSCP is now covered in a new chapter "Cross-Domain Challenges." If you're an information security professional or student of cybersecurity looking to tackle one or more of the seven domains of the SSCP, this guide gets you prepared to pass the exam and enter the information security workforce with confidence.
ABOUT THE AUTHOR
Michael S. Wills, SSCP, CISSP, CAMS, is Assistant Professor of Applied Information Technologies in the College of Business at the Embry-Riddle Aeronautical University's Worldwide Campus. He has many years of experience designing, building, and operating cutting-edge secure systems, and wrote (ISC)2's official training courses for both the SSCP and CISSP. He is also the creator of ERAU's Master of Science in Information Security and Assurance degree program.
Introduction xxv
Assessment Test xlviii
Part I Getting Started as an SSCP 1
Chapter 1 The Business Case for Decision Assurance and Information Security 3
Information: The Lifeblood of Business 4
Policy, Procedure, and Process: How Business Gets Business Done 10
Who Runs the Business? 20
Summary 24
Exam Essentials 24
Review Questions 26
Chapter 2 Information Security Fundamentals 33
The Common Needs for Privacy, Confidentiality, Integrity, and Availability 34
Training and Educating Everybody 47
SSCPs and Professional Ethics 47
Summary 49
Exam Essentials 50
Review Questions 54
Part II Integrated Risk Management and Mitigation 61
Chapter 3 Integrated Information Risk Management 63
It's a Dangerous World 64
The Four Faces of Risk 75
Getting Integrated and Proactive with Information Defense 83
Risk Management: Concepts and Frameworks 89
Risk Assessment 95
Four Choices for Limiting or Containing Damage 107
Summary 114
Exam Essentials 114
Review Questions 120
Chapter 4 Operationalizing Risk Mitigation 127
From Tactical Planning to Information Security Operations 128
Operationalizing Risk Mitigation: Step by Step 134
The Ongoing Job of Keeping Your Baseline Secure 164
Ongoing, Continuous Monitoring 174
Reporting to and Engaging with Management 182
Summary 183
Exam Essentials 183
Review Questions 189
Part III The Technologies of Information Security 197
Chapter 5 Communications and Network Security 199
Trusting Our Communications in a Converged World 200
Internet Systems Concepts 206
Two Protocol Stacks, One Internet 218
Wireless Network Technologies 240
IP Addresses, DHCP, and Subnets 243
IPv4 vs. IPv6: Important Differences and Options 248
CIANA Layer by Layer 251
Securing Networks as Systems 262
Summary 273
Exam Essentials 273
Review Questions 280
Chapter 6 Identity and Access Control 285
Identity and Access: Two Sides of the Same CIANA+PS Coin 286
Identity Management Concepts 288
Access Control Concepts 295
Network Access Control 305
Implementing and Scaling IAM 310
User and Entity Behavior Analytics (UEBA) 329
Zero Trust Architectures 332
Summary 333
Exam Essentials 334
Review Questions 343
Chapter 7 Cryptography 349
Cryptography: What and Why 350
Building Blocks of Digital Cryptographic Systems 358
Keys and Key Management 367
"Why Isn't All of This Stuff Secret?" 373
Cryptography and CIANA+PS 375
Public Key Infrastructures 381
Applying Cryptography to Meet Different Needs 399
Managing Cryptographic Assets and Systems 405
Measures of Merit for Cryptographic Solutions 407
Attacks and Countermeasures 408
PKI and Trust: A Recap 418
On the Near Horizon 420
Summary 423
Exam Essentials 424
Review Questions 429
Chapter 8 Hardware and Systems Security 435
Infrastructure Security Is Baseline Management 437
Securing the Physical Context 442
Infrastructures 101 and Threat Modeling 444
Endpoint Security 457
Malware: Exploiting the Infrastructure's Vulnerabilities 462
Privacy and Secure Browsing 466
"The Sin of Aggregation" 469
Updating the Threat Model 469
Managing Your Systems' Security 470
Summary 471
Exam Essentials 472
Review Questions 478
Chapter 9 Applications, Data, and Cloud Security 483
It's a Data-Driven World...At the Endpoint 484
Software as Appliances 487
Applications Lifecycles and Security 490
CIANA+PS and Applications Software Requirements 498
Application Vulnerabilities 504
"Shadow IT:" The Dilemma of the User as Builder 507
Information Quality and Information Assurance 511
Protecting Data in Motion, in Use, and at Rest 514
Into the Clouds: Endpoint App and Data Security Considerations 522
Legal and Regulatory Issues 533
Countermeasures: Keeping Your Apps and Data Safe and Secure 535
Summary 536
Exam Essentials 537
Review Questions 548
Part IV People Power: What Makes or Breaks Information Security 555
Chapter 10 Incident Response and Recovery 557
Defeating the Kill Chain One Skirmish at a Time 558
Harsh Realities of Real Incidents 564
Incident Response Framework 566
Preparation 571
Detection and Analysis 578
Containment and Eradication 584
Recovery: Getting Back to Business 587
Post-Incident Activities 590
Summary 594
Exam Essentials 595
Review Questions 601
Chapter 11 Business Continuity via Information Security and People Power 607
What Is a Disaster? 608
Surviving to Operate: Plan for It! 609
Timelines for BC/DR Planning and Action 615
Options for Recovery 617
Cloud- Based "Do- Over" Buttons for Continuity, Security, and Resilience 623
People Power for BC/DR 626
Security Assessment: For BC/DR and Compliance 633
Converged Communications: Keeping Them Secure During BC/DR Actions 634
Summary 637
Exam Essentials 637
Review Questions 641
Chapter 12 Cross-Domain Challenges 647
Operationalizing Security Across the Immediate and Longer Term 648
Supply Chains, Security, and the SSCP 657
Other Dangers on the Web and Net 662
On Our Way to the Future 666
Enduring Lessons 672
Your Next Steps 677
At the Close 678
Exam Essentials 678
Review Questions 683
Appendix Answers to Review Questions 689
Chapter 1: The Business Case for Decision Assurance and Information Security 690
Chapter 2: Information Security Fundamentals 693
Chapter 3: Integrated Information Risk Management 695
Chapter 4: Operationalizing Risk Mitigation 698
Chapter 5: Communications and Network Security 701
Chapter 6: Identity and Access Control 704
Chapter 7: Cryptography 707
Chapter 8: Hardware and Systems Security 709
Chapter 9: Applications, Data, and Cloud Security 712
Chapter 10: Incident Response and Recovery 715
Chapter 11: Business Continuity via Information Security and People Power 718
Chapter 12: Cross- Domain Challenges 722 Index 727
Congratulations on choosing to become a Systems Security Certified Practitioner (SSCP)! In making this choice, you're signing up to join the professionals who strive to keep our information-based modern world safe, secure, and reliable. SSCPs and other information security professionals help businesses and organizations keep private data private and help to ensure that published and public-facing information stays unchanged and unhacked. They help ensure the safe, secure, reliable, and trustworthy operation of our financial, energy, communications, transportation, and many other critical infrastructure systems we all rely upon.
Whether you are new to the fields of information security, information assurance, or cybersecurity, or you've been working with these concepts, tools, and ideas for some time now, this book is here to help you grow your knowledge, skills, and abilities as a systems security professional.
Let's see how!
You're here because you want to learn what it takes to be an SSCP. You know this will demand that you build a solid understanding of many different concepts, not only as theories but also as practical tasks you can do to help make information systems more secure. You know you'll need to master a number of key definitions and be able to apply those definitions to real-world situations-you'll need to operationalize those definitions and concepts by turning them into the step-by-step operations that make security become real.
This book is your study guide. It guides you along your personal journey as you learn and master these ideas and technologies. It takes you on that journey concept by concept, starting with simple, fundamental ideas and growing them to the level of power and complexity you will need, on the job, as an SSCP. That is this book's focus, its purpose, and design.
(ISC)2 periodically updates the technical scope-the breadth and depth-of their various certifications to keep them more closely aligned with the needs of the security profession and to better focus them on the current tactics, techniques, and strategies that those professionals are using, day after day. This new edition of the Study Guide has also been updated to reflect and support readers like you as you work to strengthen your own knowledge of information systems security, and the proficiency of your skills with those concepts.
That means this book is also a valuable reference to have with you on the job, or as you continue to learn more about information security, information risk management, or any of a number of other related subject areas. You'll find it more than covers the topic domains that (ISC)2 requires you to demonstrate competency in, should you want to earn your Systems Security Certified Practitioner credential.
Go to https://www.wiley.com/go/sybextestprep to register and gain access to the Sybex interactive online learning environment and test bank with study tools.
https://www.wiley.com/go/sybextestprep
Good question! This book exists because (ISC)2 wanted a book that would teach as well as guide and explain as well as capture the common knowledge about information assurance-keeping information systems safe and secure by protecting their information assets that all SSCPs should have at their mental fingertips. As creators of the SSCP program, (ISC)2 defines that common body of knowledge, in continuous consultation with system security experts and practitioners from business, industry, government, and academia from around the world.
The SSCP is actually three things in one: a standard of excellence, a credential that attests to demonstrated excellence, and a person who has earned that credential. Perhaps instead of asking "what" is an SSCP, we should also ask why, who, and how:
The Systems Security Certified Practitioner is thus a person who does the job of systems security to a level of competency that meets or exceeds that standard and who has earned a credential as testament to their knowledge and skills. It is a foundational certification, based on the knowledge and skills that people should already have when they first start out as an information security professional.
Let's operationalize that set of words by showing them in action:
Dateiformat: ePUBKopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet – also für „fließenden” Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.