MTU Cork Library Catalogue

Syndetics cover image
Image from Syndetics

Complete guide to CISM certification / Thomas R. Peltier and Justin Peltier.

By: Peltier, Thomas R.
Contributor(s): Peltier, Justin.
Material type: materialTypeLabelBookPublisher: Boca Raton, FL : Auerbach Publications, 2007Description: xix, 454 p. : ill. ; 24 cm. + hbk.ISBN: 0849353564 ; 9780849353567.Subject(s): Electronic data processing personnel -- Certification | Computer security -- Management -- Examinations -- Study guidesDDC classification: 005.8068
Contents:
Information security governance -- Information security risk management -- Information security program management -- Information security management -- Response management.
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
General Lending MTU Bishopstown Library Lending 005.8068 (Browse shelf(Opens below)) 1 Available 00114628
Total holds: 0

Enhanced descriptions from Syndetics:

The Certified Information Security Manager®(CISM®) certification program was developed by the Information Systems Audit and Controls Association (ISACA®). It has been designed specifically for experienced information security managers and those who have information security management responsibilities. The Complete Guide to CISM ® Certification examines five functional areas--security governance, risk management, information security program management, information security management, and response management.

Presenting definitions of roles and responsibilities throughout the organization, this practical guide identifies information security risks. It deals with processes and technical solutions that implement the information security governance framework, focuses on the tasks necessary for the information security manager to effectively manage information security within an organization, and provides a description of various techniques the information security manager can use. The book also covers steps and solutions for responding to an incident. At the end of each key area, a quiz is offered on the materials just presented. Also included is a workbook to a thirty-question final exam.

Complete Guide to CISM ® Certification describes the tasks performed by information security managers and contains the necessary knowledge to manage, design, and oversee an information security program. With definitions and practical examples, this text is ideal for information security managers, IT auditors, and network and system administrators.

Includes index.

Information security governance -- Information security risk management -- Information security program management -- Information security management -- Response management.

Table of contents provided by Syndetics

  • Preface (p. xv)
  • About the Authors (p. xvii)
  • 1 Information Security Governance (p. 1)
  • Functional Area Overview (p. 1)
  • CISM Mapping (p. 2)
  • Introduction (p. 2)
  • Developing an Information Security Strategy in Support of Business Strategy and Direction (p. 4)
  • Obtain Senior Management Commitment and Support (p. 12)
  • Definitions of Roles and Responsibilities (p. 14)
  • Obtaining Senior Management Commitment (p. 15)
  • Change in Focus (p. 16)
  • Responsibilities and Functional Roles (p. 17)
  • Where Not to Report (p. 17)
  • Recommendation (p. 19)
  • Establish Reporting Communications That Support Information Security Governance Activities (p. 19)
  • Mission Statement (p. 23)
  • Legal and Regulatory Issues (p. 24)
  • Establish and Maintain Information Security Policies (p. 32)
  • Global Policy (Tier 1) (p. 33)
  • Topic (p. 34)
  • Scope (p. 34)
  • Responsibilities (p. 35)
  • Compliance or Consequences (p. 35)
  • Topic-Specific Policy (Tier 2) (p. 35)
  • Thesis Statement (p. 36)
  • Relevance (p. 36)
  • Responsibilities (p. 37)
  • Compliance (p. 37)
  • Supplementary Information (p. 37)
  • Application-Specific Policy (Tier 3) (p. 38)
  • Key Security Concepts (p. 39)
  • Ensure the Development of Procedures and Guidelines That Support the Information Security Policy (p. 39)
  • Develop Business Case and Enterprise Value Analysis Support (p. 41)
  • Summary (p. 45)
  • What Was Covered in This Chapter (p. 45)
  • Questions (p. 45)
  • 2 Information Security Risk Management (p. 53)
  • Functional Area Overview (p. 53)
  • CISM Mapping (p. 54)
  • Introduction (p. 54)
  • Develop a Systematic and Continuous Risk Management Process (p. 58)
  • Ensure Risk Identification, Analysis, and Mitigation Activities Are Integrated Into the Life Cycle Process (p. 60)
  • Apply Risk Identification and Analysis Methods (p. 66)
  • Step 1 Asset Definition (p. 67)
  • Step 2 Threat Identification (p. 69)
  • Step 3 Determine Probability of Occurrence (p. 72)
  • Step 4 Determine the Impact of the Threat (p. 72)
  • Step 5 Controls Recommended (p. 74)
  • Step 6 Documentation (p. 75)
  • Cost-Benefit Analysis (p. 75)
  • Define Strategies and Prioritize Options to Mitigate Risks to Levels Acceptable to the Enterprise (p. 87)
  • Step 1 Threat Identification (p. 91)
  • Step 2 Threat Vulnerability (p. 93)
  • Step 3 Controls and Safeguards (p. 98)
  • Step 4 Cost-Benefit Analysis (p. 101)
  • Step 5 Documentation (p. 114)
  • Quantitative Versus Qualitative Risk Assessment (p. 118)
  • Report Significant Changes in Risk (p. 121)
  • Knowledge Statements (p. 122)
  • Gap Analysis (p. 122)
  • Recovery Time Objectives (p. 123)
  • Data (Information) Classification (p. 123)
  • Summary (p. 125)
  • What Was Covered in This Chapter (p. 125)
  • Questions (p. 126)
  • 3 Information Security Program Management (p. 133)
  • Functional Area Overview (p. 133)
  • CISM Mapping (p. 133)
  • Introduction (p. 134)
  • The OSI Model (p. 134)
  • Layer 1 Physical (p. 135)
  • Layer 2 Data Link (p. 135)
  • Layer 3 Network (p. 136)
  • Layer 4 Transport (p. 138)
  • Layer 5 Session (p. 139)
  • Layer 6 Presentation (p. 139)
  • Layer 7 Application (p. 139)
  • The TCP/IP Model (p. 141)
  • IP Addressing (p. 142)
  • Protocols (p. 146)
  • Internet Protocol (IP) Details (p. 147)
  • Internet Protocol (IP) Network and Host (p. 147)
  • Subnet Masks and Internet Protocol (IP) Classes (p. 148)
  • Class A Networks (p. 148)
  • Class B Networks (p. 148)
  • Class C .Networks (p. 148)
  • Beyond Class C Networks (p. 149)
  • IP Address Availability and Internet Protocol (IP) Version 6 (p. 149)
  • IP Hosts (p. 150)
  • Private Internet Protocol (IP) Networks (p. 152)
  • Network Address Translation (NAT) (p. 152)
  • The Internet Protocol (IP) Header (p. 153)
  • Datagram Structure (p. 156)
  • Transmission Control Protocol (TCP) (p. 159)
  • TCP Ports (p. 159)
  • Well-Known Ports (p. 160)
  • Registered Ports (p. 160)
  • Dynamic Ports (p. 160)
  • Port Scanning (p. 163)
  • The TCP Header (p. 163)
  • The TCP Three-Way Handshake (p. 166)
  • The First Shake: The SYN Packet (p. 166)
  • The Second Shake: The SYN/ACK Packet (p. 168)
  • The Third Shake: The ACK Packet (p. 168)
  • After the Shaking (p. 169)
  • TCP Summary (p. 169)
  • User Datagram Protocol (UDP) (p. 170)
  • UDP Error Messages (p. 172)
  • Internet Control Message Protocol (ICMP) (p. 172)
  • ICMP Header (p. 173)
  • ICMP Packet Structure (p. 173)
  • ICMP Common Examples (p. 176)
  • Risks and Vulnerabilities Associated with IP Protocols (p. 178)
  • Common Threats (p. 178)
  • CIA Triad (p. 180)
  • PPPN (p. 184)
  • Process (p. 184)
  • Physical (p. 184)
  • Platform (p. 185)
  • Network (p. 186)
  • Threats (p. 186)
  • Malicious Hackers (p. 186)
  • Attacking Methodology (p. 187)
  • Malicious Code (p. 189)
  • Virus (p. 189)
  • Worms (p. 189)
  • Trojan Horses (p. 190)
  • Logic Bomb (p. 190)
  • Denial-of-Service Attacks (p. 190)
  • Distributed Denial-of-Service Attacks (p. 191)
  • Social Engineering (p. 191)
  • Attacks Against Access Control Systems (p. 193)
  • Man-in-the-Middle (MITM) (p. 193)
  • Threats Summary (p. 194)
  • Controls (p. 194)
  • Access Control (p. 195)
  • Mandatory Access Control (p. 195)
  • Discretionary Access Control (p. 196)
  • Lattice-Based Access Control (p. 197)
  • Rule-Based Access Control (p. 198)
  • Role-Based Access Control (p. 198)
  • Access Control Lists (p. 198)
  • Single Sign-On (p. 201)
  • Script-Based Single Sign-On (p. 201)
  • Host-Based Single Sign-On (p. 201)
  • Access Control Methods (p. 202)
  • One-Time Passwords (p. 202)
  • Password Selection (p. 203)
  • Access Control Goals (p. 203)
  • Two-Factor Authentication (p. 203)
  • Radius (p. 204)
  • 802.1x (p. 204)
  • The Role of Radius in 802.1x (p. 205)
  • TACACS (p. 205)
  • Access Control Zone of Control (p. 206)
  • Firewalls (p. 206)
  • Types of Firewalls (p. 206)
  • Caching (p. 214)
  • Proxy Firewall Recap (p. 214)
  • Network Segmentation/Subdomain Isolation (p. 215)
  • Virtual Local Area Networks (VLANs) (p. 215)
  • Physical Distance (p. 215)
  • Subnetting for Isolation (p. 216)
  • Routing for Isolation (p. 218)
  • Firewall for Isolation (p. 218)
  • Intrusion Detection Systems (p. 218)
  • Types of Intrusions (p. 219)
  • Network- Versus Host-Based Intrusion Detection Systems (p. 219)
  • IDS Information Processing (p. 220)
  • IDS Versus IPS (p. 222)
  • Cryptography (p. 222)
  • Goals of Cryptography (p. 224)
  • Nonrepudiation (p. 224)
  • Cryptographic Definitions (p. 225)
  • Kerckhoff's Principle (p. 226)
  • Private or Secret Key Cryptography (p. 227)
  • The Advanced Encryption Standard (p. 230)
  • Public Key Cryptography (p. 231)
  • Stream Ciphers (p. 233)
  • Block Ciphers (p. 235)
  • The Initialization Vector (p. 235)
  • Methods of Attack (p. 237)
  • One-Way Functions (p. 238)
  • Digital Signatures (p. 239)
  • Classic Cryptographic Systems (p. 240)
  • Substitution Ciphers (p. 240)
  • Transposition Ciphers (p. 241)
  • Poly-Alphabetic Cipher (p. 242)
  • Running Key Cipher (p. 242)
  • Concealment (p. 243)
  • Steganography (p. 243)
  • Codes (p. 244)
  • Encryption Machines (p. 244)
  • Secure Sockets Layer (SSL) (p. 245)
  • Message Authentication Codes (p. 248)
  • Public Key Infrastructure (p. 248)
  • Certificate Authority (CA) (p. 249)
  • Registration Authority (RA) (p. 249)
  • Certificate Repository (p. 249)
  • Certificate Revocation System (p. 249)
  • IPSEC (p. 249)
  • Project Management for Information Security Managers (p. 250)
  • Baselines (p. 251)
  • Wireless (p. 252)
  • How It Works (p. 253)
  • The Alphabet Soup (p. 254)
  • Securing Wireless-The Early Days (p. 254)
  • RC4 and the One-Time Pad (p. 255)
  • WEP's Implementation of RC4 (p. 256)
  • Weakness: Key Management and Key Size (p. 257)
  • Help! My IV Is Too Small (p. 258)
  • The ICV and Its Weakness (p. 258)
  • RC4 (p. 259)
  • The Problems With Message Authentication (p. 259)
  • Another Standard 802.1x (p. 260)
  • The 802.1x Function (p. 261)
  • The Relationship between EAP and 802.1x (p. 261)
  • More on 802.1x (p. 263)
  • 802.1x Doesn't Work Alone (p. 266)
  • 802.1x - Making Wireless Better (p. 266)
  • 802.1x's Partner TKIP (p. 266)
  • Back to the Alphabet Soup One Last Time-802.11i (p. 268)
  • Wireless Summary (p. 268)
  • Buffer Overflows versus Application Security (p. 269)
  • Virtual Private Networks (VPNs) (p. 270)
  • Web Server Security versus Internet Security (p. 270)
  • Security Testing (p. 271)
  • Vulnerability Assessment (p. 272)
  • Vulnerability Assessment (p. 272)
  • Penetration Testing (p. 273)
  • Risk Assessment (p. 273)
  • Hybrid Approach to Security Testing (p. 273)
  • Summary (p. 273)
  • What Was Covered in This Chapter (p. 274)
  • Questions (p. 275)
  • 4 Information Security Management (p. 293)
  • Functional Area Overview (p. 293)
  • CISM Mapping (p. 295)
  • Introduction (p. 295)
  • Information Systems Compliance (p. 297)
  • Administrative Procedures (p. 298)
  • Ensure Services Outsourced Are Consistent (p. 305)
  • Measure, Monitor, and Report Effectiveness and Efficiency of the Controls and Compliance Policies (p. 307)
  • Ensure That Information Security Is Not Compromised Throughout the Change Management Process (p. 309)
  • Perform Vulnerability Assessments to Evaluate Effectiveness of Existing Controls (p. 311)
  • Ensure That Noncompliance Issues and Other Variances Are Resolved in a Timely Manner (p. 318)
  • Information Security Awareness and Education (p. 322)
  • Introduction (p. 322)
  • Key Security Requirements (p. 323)
  • Believe in What You Are Doing (p. 324)
  • Program Goals (p. 326)
  • Segmenting the Audience (p. 328)
  • Current Level of Computer Usage (p. 328)
  • What Does the Audience Really Want to Learn? (p. 328)
  • Determine How Receptive the Audience Is (p. 329)
  • Seek Out Ways to Gain Acceptance (p. 329)
  • Possible Allies (p. 330)
  • Program Development (p. 331)
  • Methods to Convey the Message (p. 332)
  • Presentation Keys (p. 334)
  • Presentation Format (p. 336)
  • Effective Communication (p. 336)
  • When to Do Awareness (p. 338)
  • Presentation Styles (p. 339)
  • Senior Management (p. 339)
  • Managers (p. 340)
  • Line Supervisors and Employees (p. 340)
  • The Message (p. 340)
  • Summary (p. 341)
  • What Was Covered in This Chapter (p. 341)
  • Questions (p. 342)
  • 5 Response Management (p. 351)
  • Functional Area Overview (p. 351)
  • CISM Mapping (p. 351)
  • Introduction (p. 352)
  • Threat Source Information (p. 352)
  • The Role of Intrusion Detection and Anti-Virus Systems 354 IDS Properties (p. 354)
  • Business Continuity Planning and Disaster Recovery Planning (p. 355)
  • The Planning (p. 356)
  • Business Continuity Planning and Disaster Recovery Planning (p. 356)
  • BCP Resources (p. 358)
  • Stages of BCP (p. 358)
  • Reasons for BCP (p. 358)
  • BCP Responsibilities (p. 360)
  • Types of Plans (p. 360)
  • Business Continuity Plan (BCP) (p. 360)
  • Business Recovery Plan (BRP), also Business Resumption Plan (p. 361)
  • Continuity of Operations Plan (COOP) (p. 362)
  • Continuity of Support Plan/IT Contingency Plan/Network Contingency Plan (p. 362)
  • Crisis Communications Plan (p. 362)
  • Cyber Incident Response Plan (p. 363)
  • Disaster Recovery Plan (DRP) (p. 363)
  • Occupant Emergency Plan (OEP) (p. 363)
  • Business Impact Analysis (BIA) (p. 363)
  • Performing a BIA (p. 365)
  • Business Impact Analysis Results (p. 368)
  • Reasons for BIA (p. 368)
  • Finding Resources and Dependencies (p. 369)
  • Alternate Sites (p. 370)
  • Cold Sites (p. 372)
  • Warm Sites (p. 372)
  • Hot Sites (p. 372)
  • Mobile Sites (p. 372)
  • Mirrored Sites (p. 373)
  • Reciprocal Agreements (p. 373)
  • Implementation and Writing (p. 374)
  • Team Training (p. 374)
  • Testing the Plan (p. 375)
  • Exercising and Testing the BCP/DRP (p. 375)
  • Improve the Plan (p. 376)
  • Updating the Plan (p. 377)
  • Three Phases of BCP (p. 377)
  • Incident Response (p. 379)
  • Discovery (p. 380)
  • Notification (p. 380)
  • Preliminary Investigation (p. 382)
  • Goals of the Investigation (p. 382)
  • Disclosure (p. 383)
  • Conducting Surveillance (p. 383)
  • Electronic Surveillance (p. 384)
  • Physical Surveillance (p. 384)
  • Running the Investigation (p. 386)
  • Factors of Investigation (p. 387)
  • Most Likely Suspects-Insiders, Outsiders, and Collaboration (p. 388)
  • Suspects/Witnesses/Interview (p. 389)
  • Freezing the Environment (p. 390)
  • Team Members (p. 390)
  • Post-Incident Access (p. 391)
  • Seizing the System (p. 391)
  • Forensic Processes (p. 393)
  • Inventory Internal Devices (p. 395)
  • Forensic Processing-Imaging (p. 396)
  • Live System Variation (p. 400)
  • Forensic Processing-Imaging (p. 401)
  • Forensic Reporting (p. 403)
  • Criminal and Civil Courts (p. 403)
  • Types of Evidence (p. 403)
  • Exclusionary Rule (p. 404)
  • Evidence Life Cycle (p. 404)
  • Incident Post Mortems (p. 404)
  • Incident Response Training (p. 405)
  • Difficulties with Following the Plan (p. 406)
  • Containment (p. 407)
  • Government Facilities to Assist in Planning for a Disaster (p. 408)
  • Escalation Procedures and Notification (p. 408)
  • Help Desk Training (p. 408)
  • Summary (p. 409)
  • What Was Covered in This Chapter (p. 409)
  • Questions (p. 410)
  • Index (p. 429)

Powered by Koha