Cissp 2022 Update Dom3 Handout
Cissp 2022 Update Dom3 Handout
For more cybersecurity exam prep tutorials, follow us on Youtube at Inside Cloud and Security
what’s new in domain 3?
3.7 Understand methods of cryptanalytic
attacks
– Brute force – Fault injection
– Ciphertext only – Timing
– Known plaintext – Man-in-the-Middle (MITM)
– Frequency analysis – Pass the hash
– Chosen ciphertext – Kerberos exploitation
– Implementation attacks – Ransomware
– Side-channel
covered in “ A t t a c k s and Countermeasures”
For more cybersecurity exam prep tutorials, follow us on Youtube at Inside Cloud and Security
secure design taken f r o m NIST S P 800-
160
principles
default configuration reflects a restrictive and
conservative enforcement of security policy.
SHARED RESPONSIBILITY
MODEL
shared responsibility model
1 0 0 % YO U R S
Applications Applications Applications Applications
Data Data Data Data
Runtime Runtime Runtime Runtime
Responsible Middleware Middleware Middleware Middleware
CSP OS OS OS OS
Customer Virtualization Virtualization Virtualization Virtualization
Servers Servers Servers Servers
Storage Storage Storage Storage
Networking Networking Networking Networking
For more cybersecurity exam prep tutorials, follow us on Youtube at Inside Cloud and Security
CLOUD MODELS & SERVICES - IAAS
Applications Applications
Data Data
Runtime Runtime CSP provides building blocks, like
Middleware Middleware networking, storage and compute
OS OS
Virtualization Virtualization CSP manages staff, HW, and
Servers Servers
datacenter
Storage Storage
Networking Networking
On-premises IaaS
For more cybersecurity exam prep tutorials, follow us on Youtube at Inside Cloud and Security
CLOUD MODELS & SERVICES - IAAS
Applications Applications
Data Data
Runtime Runtime
Middleware Middleware
OS OS
Virtualization Virtualization
Servers Servers Azure Virtual Amazon EC2 GCP Compute
Storage Storage Machines Engine
Networking Networking
On-premises IaaS
For more cybersecurity exam prep tutorials, follow us on Youtube at Inside Cloud and Security
CLOUD MODELS & SERVICES - PAAS
Applications Applications
Data Data
Runtime Runtime Customer is responsible for
Middleware Middleware deployment and management of apps
OS OS
Virtualization Virtualization CSP manages provisioning,
Servers Servers
configuration, hardware, and OS
Storage Storage
Networking Networking
On-premises PaaS
For more cybersecurity exam prep tutorials, follow us on Youtube at Inside Cloud and Security
CLOUD MODELS & SERVICES - PAAS
Applications Applications
Data Data
Runtime Runtime
Middleware Middleware
OS OS
Virtualization Virtualization
Servers Servers Azure SQL API Azure App
Storage Storage Database Management Service
Networking Networking
On-premises PaaS
For more cybersecurity exam prep tutorials, follow us on Youtube at Inside Cloud and Security
HO
is SERVERLESS
function-as-a
service (FaaS)
Different
W
from PAAS in terms of
responsibility?
PaaS Serverless
Applications Applications
Data Data
Runtime Runtime
Middleware Middleware Customer just configures features.
OS OS
Virtualization Virtualization CSP is responsible for management,
Servers Servers
operation, and service availability.
Storage Storage
Networking Networking
On- Saa
premises S
For more cybersecurity exam prep tutorials, follow us on Youtube at Inside Cloud and Security
CLOUD MODELS & SERVICES - SAAS
Applications Applications
Data Data
Runtime Runtime
Middleware Middleware
OS OS
Virtualization Virtualization
Servers Servers
Storage Storage
Networking Networking
On- Saa
premises S
For more cybersecurity exam prep tutorials, follow us on Youtube at Inside Cloud and Security
CLOUD models
Describe the differences between Public, Private
and Hybrid cloud models
For more cybersecurity exam prep tutorials, follow us on Youtube at Inside Cloud and Security
CLOUD models
Describe the differences between Public, Private
and Hybrid cloud models
For more cybersecurity exam prep tutorials, follow us on Youtube at Inside Cloud and Security
CLOUD models
Describe the differences between Public, Private
and Hybrid cloud models
For more cybersecurity exam prep tutorials, follow us on Youtube at Inside Cloud and Security
CLOUD models
Describe the differences between Public, Private
and Hybrid cloud models
For more cybersecurity exam prep tutorials, follow us on Youtube at Inside Cloud and Security
CLOUD models
Describe the differences between Public, Private
and Hybrid cloud models
For more cybersecurity exam prep tutorials, follow us on Youtube at Inside Cloud and Security
CLOUD models
Describe the differences between Public, Private
and Hybrid cloud models
For more cybersecurity exam prep tutorials, follow us on Youtube at Inside Cloud and Security
cloud access security broker
WHAT IS A
a 3-dimensional a r r a y
o f regularly
s p a ced points
P O S T- Q U A N T U M C R Y P T O G R A P H Y
LATTICE
cryptography
Block cipher
is a method of encrypting text (to produce ciphertext) in which a
cryptographic key and algorithm are applied to a block of data (for
example, 64 contiguous bits) at once as a group rather than to one bit at a
time.
Substitution
use the encryption algorithm to replace each character or bit of the plaintext
message with a different character. Julius Caesar developed one of the
earliest ciphers of this type now known as the “Caesar cipher”.
cryptography – TYPES OF CIPHERS
uses an encryption algorithm to rearrange the letters of a plaintext message,
forming the ciphertext message.
c r y p t o g r a p h i c version o f
random
number
is a random bit string ( a nonce) that is XORed with the message, reducing
predictability and repeatability.
Size of the IV varies by algorithm but is normally the same length as the block
size of the cipher or as large as the encryption key.
Three very similar stream ciphers. The main difference between these ciphers
ONE-TIME PAD success factors
privilege
“
Split knowledge means that the information or
required to perform an operation is divided among
multiple users.
This ensures that no single person has sufficient
privileges to compromise the security of the environment.
concept: work function (work factor)
Work function, or work factor, is a way to measure the
strength of a cryptography system by measuring the
effort in terms of cost and/ or time to decrypt
messages.
Usually, the time and effort required to perform a
complete brute-force attack against an encryption
system is what a work function rating represents.
The security and protection offered by a cryptosystem is
directly proportional to value of its work function/factor.
IMPORTANCE OF KEY
security
Cryptographic keys provide the necessary element
of secrecy to a cryptosystem.
Modern cryptosystems utilize keys that are at least
128 bits long to provide adequate security.
Cipher Block Chaining (CBC). Each block of unencrypted text is XORed with
the block of ciphertext immediately preceding. Decryption process simply
decrypts ciphertext and reverses the XOR operation.
Output Feedback (OFB). Operates similar to CFB, but XORs the plain text with
a seed value. No chaining function, so errors do not propagate.
S HA * SHA-224* Hash
SHA-256* Hash
224
256
Yes
Yes
-
-
S e c u r e Hash SHA-384* Hash 384 Yes -
Algorithm SHA-512* Hash 512 Yes -
cryptography
NAME TYPE HASH VALUE LENGTH STILL IN USE? REPLACED BY
HMAC Hash Variable Yes -
HAVAL Hash 128, 160, 192, 224, 256 No
S HA * SHA-224* Hash
SHA-256* Hash
224
256
Yes
Yes
-
-
S e c u r e Hash SHA-384* Hash 384 Yes -
Algorithm SHA-512* Hash 512 Yes -
cryptography
NAME TYPE HASH VALUE LENGTH STILL IN USE? REPLACED BY
HMAC Hash Variable Yes -
HAVAL Hash 128, 160, 192, 224, 256 No
S HA * SHA-224* Hash
SHA-256* Hash
224
256
YES
YES
-
-
S e c u r e Hash SHA-384* Hash 384 YES -
Algorithm SHA-512* Hash 512 YES -
the three major public key cryptosystems
RSA
is the most famous public key cryptosystem; it was developed by
Rivest, Shamir, and Adleman in 1977. It depends on the difficulty of
factoring the product of prime numbers.
El Gamal
is an extension of the Diffie-Hellman key exchange algorithm that
depends arithmetic.
modular on (less common than R S A in last s e v e r a l y e a r s )
Elliptic curve
Algorithm depends on the elliptic curve discrete logarithm problem and
provides more security than other algorithms when both are used with keys of
the same length.
digital signatures
W H AT IS T H E P U R P O S E O F A
W H AT IS T H E P U R P O S E O F A
government (DoD)
Biba Bell-LaPadula
No read down, no write up
No read up, no write down
Goguen-Meseguer
Take Grant
THE noninterference model
Employs a “directed graph”
Sutherland
preventing interference
(information flow and SMM)
DOMAIN 3 : SECURITY MODELS
Lattice- based
READ Secret
WRITE
Confidential
Unclassified
Subject
Objects and cannot w r i t e data into
l o w e r classification
document (no w r i t e down)
DOMAIN 3 : SECURITY MODELS
Top S e c r e t
READ Secret
WRITE
Confidential
Unclassified
Subjects Objects
Securely create an
object. Securely create a
subject. Securely delete
an object. Securely
delete a subject.
Securely provide the read access right.
Securely provide the grant access right.
Securely provide the delete access right.
Securely provide the transfer access
right.
DOMAIN 3 : SECURITY MODES
Dedicated Mode
Security clearance that permits access to ALL info processed by system, approval for ALL
info processed by system, valid need-to-know for ALL info processed by system.
Multilevel Mode
Can process information at different levels even when all system users do not have the
required security clearance to access all information processed by the system.
System High Mode
Each user must have valid security clearance, access approval for ALL info processed by
system, and valid need-to-know for at least SOME info on the system. Offers most
granular control over resources and users of these models.
Compartmented Mode
Goes one step further than System High. Each user must have valid security clearance,
access approval for ALL INFO processed by system, but requires valid need-to-know for
ALL INFO they will have access to on the system.
DOMAIN 3 : TRUSTED COMPUTING BASE
Reference e n f o r c e s a c c e s s co n t ro l
monitor
is the logical part of the TCB that confirms whether a
subject has the right to use a resource prior to granting
access.
repeat 1Description
of Assets
Assumptions &
Security Policies
5 Selection of Security
Functional Requirements 2 Identification
of Threats
System &
Environment
Objectives
4 Determination of
Security Objectives
3 Analysis & Rating
of Threats
Hierarchical environment
Various classification labels are assigned in an ordered
structure from low security to medium security to high security.
Compartmentalized environment
Requires specific security clearances over compartments or
domains instead of objects.
Hybrid environment
Contains levels with compartments that are isolated from the
rest of the security domain. Combines both hierarchical and
compartmentalized environments so that security levels have
subcompartments.
D O M A I N 3 : M A D AT O R Y A C C E S S C O N T R O L
labels are
A key point about the
“
object and every subject has one or more labels.
These predefined, and the system
MAC model is that
determines access based on assigned labels.
every
security models, design, and capabilities
alignment
MFA
factors of authentication
MFA
factors of authentication
Identity
whereas multistate
Single-state process
“
operating at only one security level at a time,
can simultaneously
ors are
operate at multiple security levels.
capable of
processor operating modes
Subject to eavesdropp
“
smuggle data out of an organization, or used to
create unauthorized, insecure points of entry
ing and tapping,
into an organization’s systems and networks.
used to
The purpose of firmware
THE PURPOSE OF
THE ROLE OF
Type I hypervisor
A native or bare-metal hypervisor. In this configuration, there is no host OS;
instead, the hypervisor installs directly onto the hardware where the host OS
would normally reside.
Type II hypervisor
A hosted hypervisor. In this configuration, a standard regular OS is present on
the hardware, and the hypervisor is then installed as another software
application.
cloud access security broker
WHAT IS A
Static environments
are applications, OSs, hardware sets, or networks that are configured for a
specific need, capability, or function, and then set to remain unaltered.
Separation of privilege
increases the granularity of secure operations.
corrosion. Too
fire and suppression agents
Class A (ASH) fires are common combustibles such as wood, paper, etc. This
type of fire is the most common and should be extinguished with water or soda acid.
Class B (BOIL) – fires are burning alcohol, oil, and other petroleum products
such as gasoline. They are extinguished with gas or soda acid. You should never
use water to extinguish a class B fire.
Class D (DILYTHIUM) – fires are burning metals and are extinguished with
dry powder.
Class K (KITCHEN) – fires are kitchen fires, such as burning oil or grease.
Wet
chemicals are used to extinguish class K fires.
fire extinguisher classes
Wet pipe systems are filled with water. Dry pipe systems contain
compressed air until fire suppression systems are triggered, and then the pipe is
filled with water; and flame activated sprinklers trigger when a predefined
temperature is reached.
Dry pipe systems also have closed sprinkler heads: the difference is the
pipes are filled with compressed air. The water is held back by a valve that remains
closed as long as sufficient air pressure remains in the pipes. Often used in areas
where water may freeze, such as parking garages.
Deluge systems are similar to dry pipes, except the sprinkler heads are
open and larger than dry pipe heads. The pipes are empty at normal air pressure;
gas discharge systems
Usually more effective than water discharge systems, but
should not be used in environments where people are located,
because they work by removing oxygen from the air.
Biometric Systems
Something you are
Conventional Locks
Easily picked / bumped & keys easily duplicated