Introduction The Certified Information Systems Security Professional (CISSP) certification is
designed to validate the expertise of professionals in the information security field. This guide
covers all key domains, providing detailed insights into each domain and its subcategories.
Domain 1: Security and Risk Management
Key Concepts
• Confidentiality, Integrity, and Availability (CIA Triad):
o Confidentiality:
▪ Definition: Ensures that information is accessible only to those authorized
to have access.
▪ Techniques: Encryption, access controls, data masking.
▪ Purpose: Prevents unauthorized disclosure of information.
o Integrity:
▪ Definition: Ensures that data is accurate and has not been tampered with.
▪ Techniques: Checksums, hashes, digital signatures.
▪ Purpose: Protects data from unauthorized modification.
o Availability:
▪ Definition: Ensures that information and resources are accessible to
authorized users when needed.
▪ Techniques: Redundancy, failover, load balancing.
▪ Purpose: Prevents disruption of service.
• Risk Management:
o Risk Assessment:
▪ Definition: Identifying potential risks and evaluating their impact.
▪ Techniques: Qualitative and quantitative analysis.
▪ Purpose: Determines the likelihood and impact of threats.
o Risk Analysis:
▪ Definition: Evaluating the risks identified in the assessment phase.
▪ Techniques: Cost-benefit analysis, scenario analysis.
▪ Purpose: Prioritizes risks based on potential impact.
o Risk Mitigation:
▪ Definition: Implementing measures to reduce risk.
▪ Techniques: Controls, policies, procedures.
▪ Purpose: Lowers the likelihood or impact of risks.
o Risk Monitoring:
▪ Definition: Ongoing observation of risk factors.
▪ Techniques: Audits, reviews, continuous assessments.
▪ Purpose: Ensures that risks remain within acceptable levels.
, • Security Governance:
o Policies:
▪ Definition: High-level statements of management intent.
▪ Purpose: Guide decision-making and ensure compliance.
o Procedures:
▪ Definition: Detailed instructions for specific tasks.
▪ Purpose: Ensure consistency and repeatability.
o Standards:
▪ Definition: Mandatory requirements for processes or products.
▪ Purpose: Ensure uniformity and quality.
o Guidelines:
▪ Definition: Recommended practices that are not mandatory.
▪ Purpose: Provide flexibility while maintaining some level of control.
Practice Questions
1. How do encryption and access controls contribute to confidentiality?
2. What are the differences between qualitative and quantitative risk assessment?
3. How do policies and procedures differ in the context of security governance?
Domain 2: Asset Security
Key Concepts
• Information Classification:
o Public:
▪ Definition: Information that can be freely shared with the public.
▪ Purpose: Requires minimal protection.
o Internal:
▪ Definition: Information intended for internal use only.
▪ Purpose: Protects internal operations and processes.
o Confidential:
▪ Definition: Sensitive information requiring protection from unauthorized
access.
▪ Purpose: Protects business interests and privacy.
o Top Secret:
▪ Definition: Highly sensitive information with strict access controls.
▪ Purpose: Protects national security or critical business functions.
• Data Lifecycle:
o Creation:
▪ Definition: The initial generation of data.
▪ Purpose: Establishes the data's existence.
o Storage: