Data and Applications Security Developments and Directions

Slides:



Advertisements
Similar presentations
IT Security Policy Framework
Advertisements

Reasons to Become CISSP Certified Keith A. Watson, CISSP CERIAS.
New Privacy and Security Certifications Fifth Annual HIPAA Summit Baltimore, MD October 30, 2002.
Security and Personnel
Certification Programs CISA/CISM/CGEIT DoD Overview Update: 1 May 2009.
CISA/CISM Programs DoD and Component Overview June 29, 2006.
The Plan for Certification of Paralegals A Program of the North Carolina State Bar Presented by the North Carolina State Bar Board of Paralegal Certification.
IGP Certification: The Next Step in Your Career
ISEB Qualifications an evolving framework for the future.
Security Controls – What Works
The Prevention Specialist Certification Board of Washington.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
CIT 694 Introduction. CISSP Certified Information Systems Security Professional “The credential for professionals who develop policies and procedures.
Mohammad Alshayeb 19 May Agenda Update on Computer Science Program Assessment/Accreditation Work Update on Software Engineering Program Assessment/Accreditation.
CBAP and BABOK Presented to the Albany Capital District Chapter of the IIBA February 3, 2009.
Security Certification
The CMA Program IMA St. Louis Chapter March 9th, 2010.
What is CISSP Anyway? A Presentation by: George L. McMullin II, CISSP COO, CorpNet Security, Inc. Executive Director, NEbraskaCERT.
Sustainability of CICMC – June 30, 2010 Develop and Implement a strategy for the sustainability of CICMC: Business Development Needs Brenda Pope, CMC.
Certification and Training Presented by Sam Jeyandran.
Advancement Information Session Becoming Board Certified in Healthcare Management as a Fellow of the American College of Healthcare Executives.
PROJECT MANAGEMENT PROFESSIONAL (PMP ® ) CERTIFICATION BRIEFING 19 MAY 2010 Society of American Military Engineers 19 May SAME- PMP Certification.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas CISSP Certification and GIAC/GCFA.
Certification Benefits and Maintenance Presented To: APICS Chicago Chapter June 17, 2003 Presented By: Ron Althaus,CFPIM,CIRM,C.P.M.
BUMP UP YOUR CAREER POTENTIAL WITH PROFESSIONAL CERTIFICATION!
Building Capacity to Direct Auditing Resources to Greatest Effect Gert van der Linde, World Bank Uganda, Kampala May 19, 2004.
Prevention Specialist Certification Board of Washington (PSCBW)
LEFIS W2 Posgraduate Workshop 1 LEFIS, WG 2 Postgraduate studies Meeting, Rotterdam.
A Roadmap to Project Management Certification
CISSP Thomas Moore. Thomas Moore, Ph.D., EMBA BCSA BCSP LCNAD CISM CISSP LMNOP (Licensed Microsoft Network Operations Professional) B.S. No, really, in.
Building Individual Professionalism in Construction Since A Valid, Reliable & Fair Direct or Indirect Measure for ACCE Construction Program Student.
CISSP Best Practices Guide to the Basics of Certified Information Systems Security Professional 1 The Certified Information System Security Professional.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Certified Information System Security Professional (CISSP)
2 Information System Security Association ISSA Buffalo Niagara Introduction to CISSP Study Sessions.
Copyright © The Open Group 2011 Your Name Your title 44 Montgomery Street Suite 960 San Francisco, CA USA Tel
CSCE 727 Industry Certifications in IA. Global IA Workforce Trends A Frost & Sullivan Market Survey Sponsored by (ISC) 2® Prepared by Robert Ayoub, CISSP,
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge.
2 Overview With active participation from individuals and chapters all over the world, the Information Systems Security Association (ISSA)
Global Travel Professional ® (GTP) Certification Matt Konetschni, Director Education © 2016 GBTA. All rights reserved. GBTA Academy.
CPP PIHRA Meeting - 2/28/17 - Presented by Cheryl Wyrick, Ph.D.
MS in IT Auditing, Cyber Security, and Risk Assessment
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
APICS Certification and Endorsement Comparison Chart Designation Name
The FUNDAMENTALS OF ENGINEERING EXAM for Nuclear Engineers
Certification of Prevention Professionals
ITIL Intermediate Service Strategy SS eLearning Plus Exam Prep
IT Project Management Version IT Industry Apprenticeship System
ISA 400 Management Information Security
Why Consider Becoming a Teacher?
CISSP TRAINING IN.
Implementation of the No Child Left Behind (NCLB) Highly Qualified Teacher & Paraprofessional Requirements December 2010.
Certification of Prevention Professionals
APICS Certification and Endorsement Comparison Chart Designation Name
American Institute of Constructors
Download Latest CompTIA CAS-002 Exam Dumps PDF Questions - CAS-002 Best Study Material - Realexamdumps.com
CONTINUING COMPETENCY
What does it take to become a CPA?
Welcome Back Glencoe Accounting.
TRUST YOUR PORTFOLIO TO AN INVESTMENT EXPERT.
PUT YOUR WEALTH IN EXCEPTIONAL HANDS.
The Institute of Certified Managers (ICRM)
HRCI vs. SHRM Which certification is right for you? Presented by
UNM Information Assurance Scholarship for Service (SFS) Program
What is Interesting in the CCSP certification?
INCREASE THE VALUE AND EFFECTIVENESS OF BUSINESS COMMUNICATION
Certified Information Technology Professional (CITP) Credential
UNM Information Assurance Scholarship for Service (SFS) Program
Prevention Specialist Credential Overview
Presentation transcript:

Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas CISSP Certification and GIAC/GCFA Certification December 2, 2009

What is CISSP? (Wiki) Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the not-for-profit[1] International Information Systems Security Certification Consortium, commonly known as (ISC)². As of June 30, 2009, (ISC)² reports 63,358 members who hold the CISSP certification in 134 countries. In June, 2004, the CISSP was the first information security credential accredited by ANSI ISO/IEC Standard 17024:2003 accreditation, and, as such, has led industry acceptance of this global standard and its stringent requirements It is formally approved by the U.S. Department of Defense (DoD) in both their Information Assurance Technical (IAT) and Managerial (IAM) categories The CISSP has been adopted as a baseline for the U.S. National Security Agency's ISSEP program.

CISSP Topics The CISSP curriculum covers subject matter in a variety of Information Security topics. The CISSP examination is based on what (ISC)² terms the Common Body of Knowledge (or CBK). According to (ISC)², "the CISSP CBK is a taxonomy -- a collection of topics relevant to information security professionals around the world. The CISSP CBK establishes a common framework of information security terms and principles that allow information security professionals worldwide to discuss, debate and resolve matters pertaining to the profession with a common understanding.” 3

CISSP Topics The core information security and assurance tenets: confidentiality, integrity and availability,and attempts to balance the three across ten areas of interest, which are also called domains. The ten CBK domains are: Access Control Categories and Controls Control Threats and countermeasures Application Security Software Based Controls Software Development Lifecycle and Principles Business Continuity and Disaster Recovery Planning Response and Recovery Plans Restoration Activities 4

CISSP Topics Cryptography Basic Concepts and Algorithms Signatures and Certification Cryptanalysis Information Security and Risk Management Policies, Standards, Guidelines and Procedures Risk Management Tools and Practices Planning and Organization Legal, Regulations, Compliance and Investigations Major Legal Systems Common and Civil Law Regulations, Laws and Information Security 5

CISSP Topics Operations Security Media, Backups and Change Control Management Controls Categories Physical (Environmental) Security Layered Physical Defense and Entry Points Site Location Principles Security Architecture and Design Principles and Benefits Trusted Systems and Computing Base System and Enterprise Architecture Telecommunications and Network Security Network Security Concepts and Risks Business Goals and Network Security 6

General Requirements Candidates for the CISSP must meet several requirements: Possess a minimum of five years of direct full-time security work experience in two or more of the ten (ISC)² information security domains (CBK). One year may be waived for having either a four-year college degree, a Master's degree in Information Security, or for possessing one of a number of other certifications from other organizations If you don't have the necessary 5 years of experience, you may earn the Associate of (ISC)² designation by passing the required CISSP examination. The Associate of (ISC)² for CISSP designation is valid for a maximum of six years from the date (ISC)² notifies you that you have passed the exam, within which time, you'll need to obtain the required experience and submit the required endorsement form for certification as a CISSP. 7

General Requirements Once you have achieved the professional experience requirements your certification will be converted to CISSP status. Attest to the truth of their assertions regarding professional experience and accept the CISSP Code of Ethics. Answer four questions regarding criminal history and related background. Pass the CISSP exam with a scaled score of 700 points or greater. The exam is multiple choice, consisting of 250 questions with four options each, to be answered over a period of six hours. Have their qualifications endorsed by another (ISC)² certified professional in good standing. The endorser attests that the candidate's assertions regarding professional experience are true to the best of their knowledge, and that the candidate is in good standing within the information security industry. 8

On-going Certification The CISSP credential is valid for only three years, after which it must be renewed. The credential can be renewed by re-taking the exam However, the more common method is to report at least 120 Continuing Professional Education (CPE) credits since the previous renewal. Currently, to maintain the CISSP certification, a member is required to earn and submit a total of 120 CPEs by the end of their three-year certification cycle and pay the Annual Membership Fee of US$85 during each year of the three-year certification cycle before the annual anniversary date. With the new changes effective 30 April 2008, CISSPs are required to earn and post a minimum of 20 CPEs (of the 120 CPE certification cycle total requirement) and pay the AMF of US$85 during each year of the three-year certification cycle before the member’s certification or recertification annual anniversary date. 9

On-going Certification For CISSPs who hold one or more concentrations, CPEs submitted for the CISSP concentration(s) will be counted toward the annual minimum CPEs required for the CISSP. CPEs can be earned through several paths, including taking classes, attending conferences and seminars, teaching others, undertaking volunteer work, professional writing, etc., all in areas covered by the CBK. Most activities earn 1 CPE for each hour of time spent, however preparing (but not delivering) training for others is weighted at 4 CPEs/hour, published articles are worth 10 CPEs, and published books 40 CPEs 10

Book I am using to study for CISSP CISSP All-in-One; A comprehensive, up-to-date revision of the market-leading CISSP training resource Written by the Shon Harris This exam guide offers complete coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. With full treatment of all the 10 exam domains, as developed by the International Information Systems Security Certification Consortium (ISC2), this definitive tool contains learning objectives at the beginning of each chapter, sidebars with in-depth technical explanations, practice questions, and real-world scenarios. Hardcover:1008 pages; Publisher: McGraw-Hill Osborne Media; 4 edition ( November 20, 2007 ISBN:0071497870 (OR) 978-0071497879  CISSP All-in-One Exam Guide, Fifth Edition is due for release February 8, 2010 11

Computer Forensics Certification: SANS Institute GIAC (Global Information Assurance Certification) Certified Forensic Analysts (GCFAs) have the knowledge, skills, and abilities to handle advanced incident handling scenarios, legally collect and secure evidence, conduct incident investigations, perform Electronic Evidence Discovery (EED), write forensic reports that can be utilized in litigation, and legally carry out forensic investigation of computers, networks, and hard drives. GCFA certified personnel understand and can articulate fundamental forensic concepts such as the file system structures, evidence handling and acquisition, computer based media analysis, and computer forensic report writing. GCFA certified personnel are able to demonstrate how commercial forensic tools function step-by-step and can describe the process in a court of law. They are adept at both live and dead evidence acquisition as well as complete deep-dive forensic analysis. 12

Computer Forensics Certification: SANS Institute In addition, certified analysts are able to articulate and ensure an exact legal process is followed to protect the rights of individuals, corporations, and of themselves to ensure that every case they are called upon to analyze will be able to be utilized in either civil or criminal proceedings. GCFA certification tests knowledge that is not geared for only law enforcement personnel, but for corporate and organizational incident response and investigation teams that have different legal or statutory requirements compared to a standard law enforcement forensic investigation. Certified analysts understand requirements from the Sarbanes-Oxley Act (SOX) , the Gramm-Leach-Bliley Act (GLB), the Health Insurance Portability and Accountability Act (HIPAA). In addition certified professionals have a deep understanding of the Electronic Communications Privacy Act, the Computer Fraud and Abuse Act, and the Wiretap Act. Certified Analysts also are able to articulate evidence admissibility, weight, and how the Daubert/Frye tests are applied. 13

Computer Forensics Certification: SANS Institute Acquiring Data and Evidence, Application Footprinting Autopsy Forensic Browser, Computer Forensics Primer , Critical Analysis Tools , Data Preservation , File Name Layer , File System and Data Layer Tools, Forensic Imaging and Filesystem Media Analysis, Forensic Investigation Process, Hash Comparisons and Fuzzy Hashing, Linux File System Basics, Metadata Layer, Unallocated Metadata and File Content Types, Windows FAT File System Basics, Windows File System Basics, Windows Live Imaging, Windows Media Analysis, Windows Media and Artifact Analysis, Windows NTFS File System Basics, Windows Response and Volatile Evidence Collection 14