Добавил:
Я за два дня прошел весь курс ТВиМС Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
!ОСНОВНАЯ КНИГА КУРСА! Chapple M. (ISC)2 CISSP Certified IS...Study Guide 9ed 2021.pdf
Скачиваний:
1
Добавлен:
20.06.2025
Размер:
15.75 Mб
Скачать

Exam Essentials

987

Summary

Data is the most valuable resource many organizations possess. Therefore, it’s critical that information security practitioners understand the necessity of safeguarding the data itself and the systems and applications that assist in the processing of that data. Protections against malicious code, database vulnerabilities, and system/application development flaws must be implemented in every technology-­aware organization.

By this point, you no doubt recognize the importance of placing adequate access controls and audit trails on these valuable information resources. Database security is a rapidly growing field; if databases play a major role in your security duties, take the time to sit down with database administrators, courses, and textbooks and learn the underlying theory. It’s a valuable investment.

Finally, various controls can be put into place during the system and application development process to ensure that the end product of these processes is compatible with operation in a secure environment. Such controls include process isolation, hardware segmentation, abstraction, and contractual arrangements such as service-­level agreements (SLAs). Security should always be introduced in the early planning phases of any development project and continually monitored throughout the design, development, deployment, and maintenance phases of production.

Exam Essentials

Explain the basic architecture of a relational database management system (RDBMS).  Know the structure of relational databases. Be able to explain the function of tables (relations), rows (records/tuples), and columns (fields/attributes). Know how relationships are defined between tables and the roles of various types of keys. Describe the database security threats posed by aggregation and inference.

Explain how expert systems, machine learning, and neural networks function.  Expert systems consist of two main components: a knowledge base that contains a series of “if/then” rules and an inference engine that uses that information to draw conclusions about other data. Machine learning techniques attempt to algorithmically discover knowledge from datasets. Neural networks simulate the functioning of the human mind to a limited extent by arranging a series of layered calculations to solve problems. Neural networks require extensive training on a particular problem before they are able to offer solutions.

Understand the models of systems development.  Know that the waterfall model describes a sequential development process that results in the development of a finished product. Developers may step back only one phase in the process if errors are discovered. The spiral model uses several iterations of the waterfall model to produce a number of fully specified and tested prototypes. Agile development models place an emphasis on the needs of the customer and quickly developing new functionality that meets those needs in an iterative fashion.

Explain the Scrum approach to Agile software development.  Scrum is an organized approach to implementing the Agile philosophy. It relies on daily scrum meetings to organize

988Chapter 20  Software Development Security

and review work. Development focuses on short sprints of activity that deliver finished products. Integrated Product Teams (IPTs) are an early effort at this approach that was used by the U.S. Department of Defense.

Describe software development maturity models.  Know that maturity models help software organizations improve the maturity and quality of their software processes by implementing an evolutionary path from ad hoc, chaotic processes to mature, disciplined software processes. Be able to describe the SW-­CMM, IDEAL, and SAMM models.

Understand the importance of change and configuration management.  Know the three basic components of change control—­request control, change control, and release control—­ and how they contribute to security. Explain how configuration management controls the versions of software used in an organization. Understand how the auditing and logging of changes mitigates risk to the organization.

Understand the importance of testing.  Software testing should be designed as part of the development process. Testing should be used as a management tool to improve the design, development, and production processes.

Explain the role of DevOps and DevSecOps in the modern enterprise.  DevOps approaches seek to integrate software development and operations activities by embracing automation and collaboration between teams. DevSecOps approaches expand on the DevOps model by introducing security operations activities into the integrated model. Continuous integration and delivery (CI/CD) techniques automate the DevOps and DevSecOps pipelines.

Know the role of different coding tools in software development ecosystems.  Developers write code in different programming languages, which is then either compiled into

machine language or executed through an interpreter. Developers may make use of software development tool sets and integrated development environments to facilitate the code writing process. Software libraries create shared and reusable code, whereas code repositories provide a management platform for the software development process.

Explain the impact of acquired software on the organization.  Organizations may purchase commercial off-­the-­shelf (COTS) software to meet their requirements, and they may also rely on free open source software (OSS). All of this software expands the potential attack surface and requires security review and testing.

Written Lab

1.What is the main purpose of a primary key in a database table?

2.What is polyinstantiation?

3.Explain the difference between static and dynamic analysis of application code.

4.Why should both static and dynamic analysis of application code be used together whenever possible?

5.Explain the difference between supervised and unsupervised machine learning.

Review Questions

989

Review Questions

1.Christine is helping her organization implement a DevOps approach to deploying code. Which one of the following is not a component of the DevOps model?

A.Information security

B.Software development

C.Quality assurance

D.IT operations

2.Bob is developing a software application and has a field where users may enter a date. He wants to ensure that the values provided by the users are accurate dates to prevent security issues. What technique should Bob use?

A.Polyinstantiation

B.Input validation

C.Contamination

D.Screening

3.Vincent is a software developer who is working through a backlog of change tasks. He is not sure which tasks should have the highest priority. What portion of the change management process would help him to prioritize tasks?

A.Release control

B.Configuration control

C.Request control

D.Change audit

4.Frank is conducting a risk analysis of his software development environment and, as a mitigation measure, would like to introduce an approach to failure management that places the system in a high level of security in the event of a failure. What approach should he use?

A.Fail-open

B.Fail mitigation

C.Fail-secure

D.Fail clear

5.What software development model uses a seven-­stage approach with a feedback loop that allows progress one step backward?

A.Boyce-Codd

B.Iterative waterfall

C.Spiral

D.Agile

990Chapter 20  Software Development Security

6.Jane is conducting a threat assessment using threat modeling techniques as she develops security requirements for a software package her team is developing. Which business function is she engaging in under the Software Assurance Maturity Model (SAMM)?

A.Governance

B.Design

C.Implementation

D.Verification

7.Which one of the following key types is used to enforce referential integrity between database tables?

A.Candidate key

B.Primary key

C.Foreign key

D.Alternate key

8.Richard believes that a database user is misusing his privileges to gain information about the company’s overall business trends by issuing queries that combine data from a large number of records. What process is the database user taking advantage of?

A.Inference

B.Contamination

C.Polyinstantiation

D.Aggregation

9.What database technique can be used to prevent unauthorized users from determining classified information by noticing the absence of information normally available to them?

A.Inference

B.Manipulation

C.Polyinstantiation

D.Aggregation

10.Which one of the following is not a principle of Agile development?

A.Satisfy the customer through early and continuous delivery.

B.Businesspeople and developers work together.

C.Pay continuous attention to technical excellence.

D.Prioritize security over other requirements.

11.What type of information is used to form the basis of an expert system’s decision-­ making process?

A.A series of weighted layered computations

B.Combined input from a number of human experts, weighted according to past performance

Review Questions

991

C.A series of “if/then” rules codified in a knowledge base

D.A biological decision-­making process that simulates the reasoning process used by the human mind

12.In which phase of the SW-­CMM does an organization use quantitative measures to gain a detailed understanding of the development process?

A.Initial

B.Repeatable

C.Defined

D.Managed

13.Which of the following acts as a proxy between an application and a database to support interaction and simplify the work of programmers?

A.SDLC

B.ODBC

C.PCI DSS

D.Abstraction

14.In what type of software testing does the tester have access to the underlying source code?

A.Static testing

B.Dynamic testing

C.Cross-­site scripting testing

D.Black-box testing

15.What type of chart provides a graphical illustration of a schedule that helps to plan, coordinate, and track project tasks?

A.Gantt

B.Venn

C.Bar

D.PERT

16.Which database security risk occurs when data from a higher classification level is mixed with data from a lower classification level?

A.Aggregation

B.Inference

C.Contamination

D.Polyinstantiation

992Chapter 20  Software Development Security

17.Tonya is performing a risk assessment of a third-­party software package for use within her organization. She plans to purchase a product from a vendor that is very popular in her industry. What term best describes this software?

A.Open source

B.Custom-developed

C.ERP

D.COTS

18.Which one of the following is not part of the change management process?

A.Request control

B.Release control

C.Configuration audit

D.Change control

19.What transaction management principle ensures that two transactions do not interfere with each other as they operate on the same data?

A.Atomicity

B.Consistency

C.Isolation

D.Durability

20.Tom built a database table consisting of the names, telephone numbers, and customer IDs for his business. The table contains information on 30 customers. What is the degree of this table?

A.Two

B.Three

C.Thirty

D.Undefined

Chapter

21

Malicious Code and

Application Attacks

THE CISSP EXAMTOPICS COVERED INTHIS CHAPTER INCLUDE:

Domain 3.0: Security Architecture and Engineering

■■3.7 Understand methods of cryptanalytic attacks

■■3.7.13 Ransomware

Domain 7.0: Security Operations

■■7.2 Conduct logging and monitoring activities

■■7.2.7 User and Entity Behavior Analytics (UEBA)

■■7.7 Operate and maintain detective and preventative measures

■■7.7.7 Anti-malware

Domain 8.0: Software Development Security

■■8.2 Identify and apply security controls in software development ecosystems

■■8.3 Assess the effectiveness of software security

■■8.3.2 Risk analysis and mitigation

■■8.5 Define and apply secure coding guidelines and standards

■■8.5.1 Security weaknesses and vulnerabilities at the source-code level

Соседние файлы в предмете Информационная безопасность автоматизированных систем