Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
CISSP in 21 Days
CISSP in 21 Days

CISSP in 21 Days: Boost your confidence and get the competitive edge you need to crack the exam in just 21 days! , Second Edition

Arrow left icon
Profile Icon Srinivasan
Arrow right icon
$19.99 per month
Full star icon Empty star icon Empty star icon Empty star icon Empty star icon 1 (1 Ratings)
Paperback Jun 2016 402 pages 2nd Edition
eBook
$35.98 $39.99
Paperback
$48.99
Subscription
Free Trial
Renews at $19.99p/m
Arrow left icon
Profile Icon Srinivasan
Arrow right icon
$19.99 per month
Full star icon Empty star icon Empty star icon Empty star icon Empty star icon 1 (1 Ratings)
Paperback Jun 2016 402 pages 2nd Edition
eBook
$35.98 $39.99
Paperback
$48.99
Subscription
Free Trial
Renews at $19.99p/m
eBook
$35.98 $39.99
Paperback
$48.99
Subscription
Free Trial
Renews at $19.99p/m

What do you get with a Packt Subscription?

Free for first 7 days. $19.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing
Table of content icon View table of contents Preview book icon Preview Book

CISSP in 21 Days

Chapter 2.  Day 2 – Security and Risk Management - Risk Management, Business Continuity, and Security Education

This chapter gives an overview of risk management, business continuity, and security education using a high-level illustration. Understanding and applying risk management concepts, threat modeling, and establishing business continuity requirements are some of the main topics covered in this chapter. A brief overview of integrating security risk considerations into information systems' acquisition, strategy, and practice are covered. Establishing and managing information security education, training, and awareness programs and recommendation of best practices are provided towards the end of the chapter.

Overview of risk management, business continuity, and security education

Asset protection forms the baseline for security. Unintended disclosure, unauthorized modification, or destruction of an asset can affect security.

Observe the following illustration:

Overview of risk management, business continuity, and security education

Fig 1

  • Risk is to assets from threat sources.
  • The asset requires protection from attacks.
  • Protection is based on the value of the assets. The value can be based on monetary value, anticipated loss due to customer dissatisfaction, damage to corporate image, or all of the above.
  • Risk management is to identify, assess, control, and mitigate risks.
  • Risk management consists of monitoring, reviewing, communicating, and improving mechanisms.
  • Risks that compromise the availability of assets and resources are treated through Business Continuity Plans (BCP).
  • Security education is an integral part of risk management.

These concepts are covered in detail in the rest of this chapter.

Risk management

Risk is defined as an exposure to loss, injury, or damage due to threats, vulnerabilities, and attacks. Risk management is to manage the risks.

Identifying threats and vulnerabilities, attacks, estimating potential impact, and establishing and implementing suitable controls to treat the risk are functional steps in risk management. Monitoring, reviewing, communicating the results, and improving the security posture are continual improvement processes in the risk management cycle.

Note

Security posture is an overall plan of the organization pertaining to security. It includes security governance, policies, procedures, and compliance.

Observe the following illustration, which is a typical web application network infrastructure consisting of the N-tier architecture:

Risk management

Fig 2

In the preceding architecture, various assets are involved in the business process of accessing, updating, or modifying the information. For example, an employee (people asset) accesses a web application (information...

Security risk considerations in acquisitions, strategy, and practice

Information systems include various components, such as operating systems and application software, which may be off-the-shelf products or custom developed applications, database management systems, infrastructure, and so on. During development and/or implementation, security risks should be considered based on security requirements. Some such requirements are listed here:

  • Security requirements analysis and specifications
  • Security risks in the processing of data
  • Need for cryptographic controls
  • Risks in system operations
  • Risks in development and support processes
  • Technical vulnerability management
  • Risks in outsourced software development

Note

Note that detailed information and best practices are provided in various chapters throughout this book.

Information security education, training, and awareness

The information security domain consists of many concepts and definitions. Besides, information security initiatives in an organization will have many policies, procedures, as well as technology components. In order to have an effective security posture within the organization, it is important that people or personnel are aware of security requirements, organization-specific security policies and procedures, and most importantly, particular personnel-specific roles and responsibilities pertaining to security.

Security awareness and training is one of the core components of the risk management program in any organization. The objective is to ensure that the personnel are aware of the security requirements and are trained to handle day-to-day security events.

National Institute of Standards and Technology (NIST) publication 800-14 - Generally Accepted Principles and Practices for Securing Information Technology Systems, recommends...

Overview of risk management, business continuity, and security education


Asset protection forms the baseline for security. Unintended disclosure, unauthorized modification, or destruction of an asset can affect security.

Observe the following illustration:

Fig 1

  • Risk is to assets from threat sources.

  • The asset requires protection from attacks.

  • Protection is based on the value of the assets. The value can be based on monetary value, anticipated loss due to customer dissatisfaction, damage to corporate image, or all of the above.

  • Risk management is to identify, assess, control, and mitigate risks.

  • Risk management consists of monitoring, reviewing, communicating, and improving mechanisms.

  • Risks that compromise the availability of assets and resources are treated through Business Continuity Plans (BCP).

  • Security education is an integral part of risk management.

These concepts are covered in detail in the rest of this chapter.

Risk management


Risk is defined as an exposure to loss, injury, or damage due to threats, vulnerabilities, and attacks. Risk management is to manage the risks.

Identifying threats and vulnerabilities, attacks, estimating potential impact, and establishing and implementing suitable controls to treat the risk are functional steps in risk management. Monitoring, reviewing, communicating the results, and improving the security posture are continual improvement processes in the risk management cycle.

Note

Security posture is an overall plan of the organization pertaining to security. It includes security governance, policies, procedures, and compliance.

Observe the following illustration, which is a typical web application network infrastructure consisting of the N-tier architecture:

Fig 2

In the preceding architecture, various assets are involved in the business process of accessing, updating, or modifying the information. For example, an employee (people asset) accesses a web application (information...

Left arrow icon Right arrow icon

Key benefits

  • Day-by-day plan to study and assimilate core concepts from CISSP CBK
  • Revise and take a mock test at the end of every four chapters
  • A systematic study and revision of myriad concepts to help you crack the CISSP examination

Description

Certified Information Systems Security Professional (CISSP) is an internationally recognized and coveted qualification. Success in this respected exam opens the door to your dream job as a security expert with an eye-catching salary. But passing the final exam is challenging. Every year a lot of candidates do not prepare sufficiently for the examination, and fail at the final stage. This happens when they cover everything but do not revise properly and hence lack confidence. This simple yet informative book will take you through the final weeks before the exam with a day-by-day plan covering all of the exam topics. It will build your confidence and enable you to crack the Gold Standard exam, knowing that you have done all you can to prepare for the big day. This book provides concise explanations of important concepts in all 10 domains of the CISSP Common Body of Knowledge (CBK). Starting with Confidentiality, Integrity, and Availability, you will focus on classifying information and supporting assets. You will understand data handling requirements for sensitive information before gradually moving on to using secure design principles while implementing and managing engineering processes. You will understand the application of cryptography in communication security and prevent or mitigate strategies for network attacks. You will also learn security control requirements and how to assess their effectiveness. Finally, you will explore advanced topics such as automated and manual test result analysis and reporting methods. A complete mock test is included at the end to evaluate whether you're ready for the exam. This book is not a replacement for full study guides; instead, it builds on and reemphasizes concepts learned from them.

Who is this book for?

If you are a Networking professional aspiring to take the CISSP examination and obtain the coveted CISSP certification (considered to be the Gold Standard in Information Security personal certification), then this is the book you want. This book assumes that you already have sufficient knowledge in all 10 domains of the CISSP CBK by way of work experience and knowledge gained from other study books.

What you will learn

  • Review Exam Cram and Practice review questions to reinforce the required concepts
  • Follow the day–by-day plan to revise important concepts a month before the CISSP® exam
  • Boost your time management for the exam by attempting the mock question paper
  • Develop a structured study plan for all 10 CISSP® domains
  • Build your understanding of myriad concepts in the Information Security domain
  • Practice the full-blown mock test to evaluate your knowledge and exam preparation

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Jun 30, 2016
Length: 402 pages
Edition : 2nd
Language : English
ISBN-13 : 9781785884498
Category :
Concepts :

What do you get with a Packt Subscription?

Free for first 7 days. $19.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing

Product Details

Publication date : Jun 30, 2016
Length: 402 pages
Edition : 2nd
Language : English
ISBN-13 : 9781785884498
Category :
Concepts :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total $ 152.97
Information Security Handbook
$48.99
CISSP in 21 Days
$48.99
Kali Linux 2:  Windows Penetration Testing
$54.99
Total $ 152.97 Stars icon

Table of Contents

21 Chapters
1. Day 1 – Security and Risk Management - Security, Compliance, and Policies Chevron down icon Chevron up icon
2. Day 2 – Security and Risk Management - Risk Management, Business Continuity, and Security Education Chevron down icon Chevron up icon
3. Day 3 – Asset Security - Information and Asset Classification Chevron down icon Chevron up icon
4. Day 4 – Asset Security - Data Security Controls and Handling Chevron down icon Chevron up icon
5. Day 5 – Exam Cram and Practice Questions Chevron down icon Chevron up icon
6. Day 6 – Security Engineering - Security Design, Practices, Models, and Vulnerability Mitigation Chevron down icon Chevron up icon
7. Day 7 – Security Engineering - Cryptography Chevron down icon Chevron up icon
8. Day 8 – Communication and Network Security - Network Security Chevron down icon Chevron up icon
9. Day 9 – Communication and Network Security - Communication Security Chevron down icon Chevron up icon
10. Day 10 – Exam Cram and Practice Questions Chevron down icon Chevron up icon
11. Day 11 – Identity and Access Management - Identity Management Chevron down icon Chevron up icon
12. Day 12 – Identity and Access Management - Access Management, Provisioning, and Attacks Chevron down icon Chevron up icon
13. Day 13 – Security Assessment and Testing - Designing, Performing Security Assessment, and Tests Chevron down icon Chevron up icon
14. Day 14 – Security Assessment and Testing - Controlling, Analyzing, Auditing, and Reporting Chevron down icon Chevron up icon
15. Day 15 – Exam Cram and Practice Questions Chevron down icon Chevron up icon
16. Day 16 – Security Operations - Foundational Concepts Chevron down icon Chevron up icon
17. Day 17 – Security Operations - Incident Management and Disaster Recovery Chevron down icon Chevron up icon
18. Day 18 – Software Development Security - Security in Software Development Life Cycle Chevron down icon Chevron up icon
19. Day 19 – Software Development Security - Assessing effectiveness of Software Security Chevron down icon Chevron up icon
20. Day 20 – Exam Cram and Practice Questions Chevron down icon Chevron up icon
21. Day 21 – Exam Cram and Mock Test Chevron down icon Chevron up icon

Customer reviews

Rating distribution
Full star icon Empty star icon Empty star icon Empty star icon Empty star icon 1
(1 Ratings)
5 star 0%
4 star 0%
3 star 0%
2 star 0%
1 star 100%
S. Rose Sep 02, 2016
Full star icon Empty star icon Empty star icon Empty star icon Empty star icon 1
This book is a brief overview of everything that may appear on the exam, with brief explanations.Pros:Quickly run through, marking unfamiliar subjects to use other study products for.Cons:Uses acronyms way too much. I counted about 34 times IP was used in different context outside of Internet Protocol.There are NO answers to the "sample" questions given at the end of each chapter, nor the mock exam.The "Full Blown Mock Test" that is verbatim on the back of the book, is only 178 questions... not even close to the actual CISSP.This book was suppose to be written in 2016. In the preface, it claims to go over the 8 domains covered. On the back of the book refers to the 10 domains covered. In 2015 the exam switched to 8 domains. Who doesn't check for this. I would of been fine if at LEAST the questions had answers, but this is ridiculous, and clearly this was a rushed out book with minimal updates to the current exam, which by current, is over a year old.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

What is included in a Packt subscription? Chevron down icon Chevron up icon

A subscription provides you with full access to view all Packt and licnesed content online, this includes exclusive access to Early Access titles. Depending on the tier chosen you can also earn credits and discounts to use for owning content

How can I cancel my subscription? Chevron down icon Chevron up icon

To cancel your subscription with us simply go to the account page - found in the top right of the page or at https://subscription.packtpub.com/my-account/subscription - From here you will see the ‘cancel subscription’ button in the grey box with your subscription information in.

What are credits? Chevron down icon Chevron up icon

Credits can be earned from reading 40 section of any title within the payment cycle - a month starting from the day of subscription payment. You also earn a Credit every month if you subscribe to our annual or 18 month plans. Credits can be used to buy books DRM free, the same way that you would pay for a book. Your credits can be found in the subscription homepage - subscription.packtpub.com - clicking on ‘the my’ library dropdown and selecting ‘credits’.

What happens if an Early Access Course is cancelled? Chevron down icon Chevron up icon

Projects are rarely cancelled, but sometimes it's unavoidable. If an Early Access course is cancelled or excessively delayed, you can exchange your purchase for another course. For further details, please contact us here.

Where can I send feedback about an Early Access title? Chevron down icon Chevron up icon

If you have any feedback about the product you're reading, or Early Access in general, then please fill out a contact form here and we'll make sure the feedback gets to the right team. 

Can I download the code files for Early Access titles? Chevron down icon Chevron up icon

We try to ensure that all books in Early Access have code available to use, download, and fork on GitHub. This helps us be more agile in the development of the book, and helps keep the often changing code base of new versions and new technologies as up to date as possible. Unfortunately, however, there will be rare cases when it is not possible for us to have downloadable code samples available until publication.

When we publish the book, the code files will also be available to download from the Packt website.

How accurate is the publication date? Chevron down icon Chevron up icon

The publication date is as accurate as we can be at any point in the project. Unfortunately, delays can happen. Often those delays are out of our control, such as changes to the technology code base or delays in the tech release. We do our best to give you an accurate estimate of the publication date at any given time, and as more chapters are delivered, the more accurate the delivery date will become.

How will I know when new chapters are ready? Chevron down icon Chevron up icon

We'll let you know every time there has been an update to a course that you've bought in Early Access. You'll get an email to let you know there has been a new chapter, or a change to a previous chapter. The new chapters are automatically added to your account, so you can also check back there any time you're ready and download or read them online.

I am a Packt subscriber, do I get Early Access? Chevron down icon Chevron up icon

Yes, all Early Access content is fully available through your subscription. You will need to have a paid for or active trial subscription in order to access all titles.

How is Early Access delivered? Chevron down icon Chevron up icon

Early Access is currently only available as a PDF or through our online reader. As we make changes or add new chapters, the files in your Packt account will be updated so you can download them again or view them online immediately.

How do I buy Early Access content? Chevron down icon Chevron up icon

Early Access is a way of us getting our content to you quicker, but the method of buying the Early Access course is still the same. Just find the course you want to buy, go through the check-out steps, and you’ll get a confirmation email from us with information and a link to the relevant Early Access courses.

What is Early Access? Chevron down icon Chevron up icon

Keeping up to date with the latest technology is difficult; new versions, new frameworks, new techniques. This feature gives you a head-start to our content, as it's being created. With Early Access you'll receive each chapter as it's written, and get regular updates throughout the product's development, as well as the final course as soon as it's ready.We created Early Access as a means of giving you the information you need, as soon as it's available. As we go through the process of developing a course, 99% of it can be ready but we can't publish until that last 1% falls in to place. Early Access helps to unlock the potential of our content early, to help you start your learning when you need it most. You not only get access to every chapter as it's delivered, edited, and updated, but you'll also get the finalized, DRM-free product to download in any format you want when it's published. As a member of Packt, you'll also be eligible for our exclusive offers, including a free course every day, and discounts on new and popular titles.