Book Image

CISSP in 21 Days - Second Edition

By : M. L. Srinivasan, None M.L.Srinivasan
Book Image

CISSP in 21 Days - Second Edition

By: M. L. Srinivasan, None M.L.Srinivasan

Overview of this book

Certified Information Systems Security Professional (CISSP) is an internationally recognized and coveted qualification. Success in this respected exam opens the door to your dream job as a security expert with an eye-catching salary. But passing the final exam is challenging. Every year a lot of candidates do not prepare sufficiently for the examination, and fail at the final stage. This happens when they cover everything but do not revise properly and hence lack confidence. This simple yet informative book will take you through the final weeks before the exam with a day-by-day plan covering all of the exam topics. It will build your confidence and enable you to crack the Gold Standard exam, knowing that you have done all you can to prepare for the big day. This book provides concise explanations of important concepts in all 10 domains of the CISSP Common Body of Knowledge (CBK). Starting with Confidentiality, Integrity, and Availability, you will focus on classifying information and supporting assets. You will understand data handling requirements for sensitive information before gradually moving on to using secure design principles while implementing and managing engineering processes. You will understand the application of cryptography in communication security and prevent or mitigate strategies for network attacks. You will also learn security control requirements and how to assess their effectiveness. Finally, you will explore advanced topics such as automated and manual test result analysis and reporting methods. A complete mock test is included at the end to evaluate whether you're ready for the exam. This book is not a replacement for full study guides; instead, it builds on and reemphasizes concepts learned from them.
Table of Contents (27 chapters)
CISSP in 21 Days Second Edition
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface

Personnel security policies


Personnel security policies concern people associated with the organization, such as employees, contractors, and consultants. These policies encompass the following:

  • Screening processes to validate security requirements

  • Understanding their security responsibilities

  • Understanding their suitability to security roles

  • Reducing the risk of theft, fraud, or the misuse of facilities

Employment candidate screening

Background verification checks are primarily used in employment candidate screening processes. They may include the following:

  1. Character references to evaluate the personal traits of the applicant. Best practice guidelines indicate character references from at least two entities, such as from business and personnel.

  2. Completeness and accuracy of the applicant's curriculum vitae and the verification of claimed academic and professional qualifications are critical checks in the screening process.

  3. Identity checks by verifying identification documents.

  4. Checking criminal records as well as credit checks.

Employment agreement and policies

Besides general job roles, based on the business requirements, information security responsibilities that include information handling requirements should form part of the employment agreement and policies.

Employees should also be aware of organization's information security policies, and when they are given access to sensitive or confidential information, they need to additionally sign confidentiality and nondisclosure agreements.

Employment termination processes

Employee termination processes have to be in accordance with the established security policies and practices. The primary objective of the process is to ensure that employees, contractors, and third-party users exit or change employment as per established procedures without compromising security. The procedures may include termination of responsibilities, return of assets, removal of access rights, and so on.

Vendor, consultant, and contractor controls

Third-party users, such as vendors, consultants, and contractors, need access to the information and associated systems based on the job function. Information protection starts from screening process, confidentiality, and nondisclosure agreements.

Compliance and privacy

Adherence to policies, procedures, and so on, performing job functions as per the legal, regulatory requirements, and adherence to privacy protection mechanisms, are applicable across the board in an organization.