Go back

CISSP Complete Notes – Domains, Concepts, and Models

313 min read Edit page

🎓 A full CISSP notes compilation — organized for clarity, memory, and exam prep efficiency.


Table of Contents

Open Table of Contents

CIA

The CIA Triad is the foundation of information security, ensuring that data is:

  1. Confidentiality – Protecting information from unauthorized access.
  2. Integrity – Ensuring data is accurate and unaltered.
  3. Availability – Ensuring information and systems are accessible when needed.

Additional Security Properties

  1. Authenticity (Authentication) – Verifying the identity of users, systems, or data sources to prevent unauthorized access.
  2. Accountability – Ensuring that actions can be traced to an individual or system through auditing and logging.
  3. Non-repudiation – Preventing entities from denying their actions by using cryptographic mechanisms like digital signatures and log records.

These additional properties strengthen the CIA Triad and are essential for comprehensive security in CISSP and other cybersecurity frameworks.

CISSP Domain 1_ Security and Risk Management.pdf

✅ CISSP Domain 1 – Security and Risk Management (Simple Notes)

🔒 1. CIA Triad (Main Goals of Security)


🏛️ 2. Security Rules and Leadership (Governance)


⚖️ 3. Laws and Rules


⚠️ 4. Risk Management


👥 5. Security Job Roles


📄 6. Security Documents


🚨 7. Business Continuity and Disaster Recovery


🔍 8. Threat Modeling and Controls


🤝 9. Ethics and Good Behavior


CISSP Domain 2: Asset Security

CISSP Domain 2

📦 1. What Are Assets?


🗂️ 2. Classifying Information



🔐 4. Protecting Data


🔄 5. Data Lifecycle

  1. Create – Make new data.
  2. Store – Save the data.
  3. Use – Access and work with it.
  4. Share – Send or give access to others.
  5. Archive – Store long-term (not used often).
  6. Destroy – Safely delete when no longer needed.

🧨 6. Destroying Data Securely


🔒 7. Access Control Principles


🔎 8. Data Privacy


Domain 3: Security Architecture and Engineering

🧱 1. Security Architecture Basics


🛡️ 2. Security Models (How Security Works in a System)


🏗️ 3. Security Architecture Concepts


🧠 4. System Security Concepts


🧰 5. Security Capabilities of Systems


🧪 6. System Evaluation Methods


⚙️ 7. Cryptography Basics (More in Domain 4)


🌍 8. Physical Security Controls


Biba Model

The Biba Model is a security model that protects data integrity (making sure data is not changed in an unsafe way). It follows two simple rules:

  1. No-Read-Down → You can’t read data from a lower (less trustworthy) level.
    • Example: A high-level bank manager can’t read data from an unverified source to avoid bad information.
  2. No-Write-Up → You can’t write data to a higher (more trustworthy) level.
    • Example: A normal employee can’t change critical financial records to prevent mistakes or fraud.

This model is used in banks, government systems, and security software to keep important data safe from corruption.

Brewer-Nash Model

The Brewer-Nash Model, also called the Chinese Wall Model, is a security model designed to prevent conflicts of interest in industries like finance, law, and consulting.

How It Works

The model blocks access to data that could create a conflict of interest. It does this by grouping data into conflict of interest classes (COI).

Two Main Rules:

  1. No-Read-Conflict:
    • If a user (e.g., an analyst) accesses data from one company, they can’t read data from a competing company in the same group.
    • Example: If a financial analyst sees data from Company A, they can’t read data from Company B, which is a competitor.
  2. No-Write-Conflict:
    • A user can’t write data that could cause a conflict of interest.
    • Example: If an analyst worked with Company A, they can’t provide reports for Company B, ensuring fairness.

Why is it Important?

Clark-Wilson Security Model

The Clark-Wilson Security Model is a security framework focused on data integrity in business and financial systems. It ensures that only authorized users can modify data in a controlled way.

Key Principles:

  1. Well-formed Transactions
    • Users can’t directly change important data. Instead, they must go through approved procedures (like a banking system that requires multiple steps for a transaction).
  2. Separation of Duties
    • No single person has complete control over a critical process.
    • Example: One employee enters financial data, while another approves it.
  3. Access Control Based on Roles
    • Users get access only to what they need for their job.
    • Example: A cashier can update sales records, but only a manager can approve refunds.

Why is it Important?

Graham-Denning Security Model

This model focuses on secure access control by defining how subjects (users/processes) interact with objects (files, resources) in a system.

Key Idea:

The model describes eight rules (operations) that control how subjects create, delete, and manage objects and other subjects.

The 8 Rules of Graham-Denning Model:

  1. Create Object – A user can create a new file or resource.
  2. Delete Object – A user can remove a file or resource.
  3. Create Subject – A new user/process can be created.
  4. Delete Subject – A user/process can be removed.
  5. Read Access – A subject can read an object’s data.
  6. Write Access – A subject can modify an object’s data.
  7. Grant Access Rights – A subject can give another subject permissions.
  8. Delete Access Rights – A subject can take away another subject’s permissions.

Why is it Important?

Encryption

Definitions:

  1. Cryptography: The practice and study of techniques for secure communication to prevent unauthorized access. It ensures data confidentiality, integrity, authentication, and non-repudiation.
  2. Encryption: The process of converting readable information (plaintext) into a coded form (ciphertext) to prevent unauthorized access.
  3. Decryption: The reverse of encryption, converting ciphertext back to plaintext.
  4. Cipher: A pair of algorithms for encryption and decryption, controlled by a key.
  5. Key: A secret string of characters used to encrypt and decrypt information.
  6. Symmetric Cryptography: Uses the same key for both encryption and decryption; faster but less secure for large systems.
  7. Asymmetric Cryptography: Uses a public key for encryption and a private key for decryption; more secure but slower.
  8. Hashing: A method to convert data into a fixed-length string (hash value) that is difficult to reverse, often used for data integrity.
  9. Cryptanalysis: The study of techniques to break encryption and decode messages without access to the key.

Summary of Key Topics:

  1. Cryptography Basics: Originally focused on converting plaintext to ciphertext for secrecy. Modern cryptography addresses confidentiality, integrity, authenticity, and non-repudiation.
  2. Symmetric vs. Asymmetric Cryptography: Symmetric uses a single shared key, while asymmetric uses paired public and private keys. Asymmetric is more secure for large-scale communication.
  3. Hashing: Used for data integrity and authentication. Unlike encryption, hashing is one-way and irreversible.
  4. Cryptanalysis: Attempts to break encryption methods. Includes techniques like frequency analysis and side-channel attacks.
  5. Data Protection: Data can be protected while at rest (stored) or in transit (being transmitted). Both can use encryption to ensure security.

Main Points:

Caesar Cipher

Replacing the actual letter with ciphertext to make encrypted letter.

image.png

Encoding and Decoding


Transposition in Cryptography

In simple terms, transposition is like shuffling a deck of cards—the cards (characters) stay the same, but their order changes.

Confusion


Diffusion


In Short:

Key Clustering

In short: Key clustering is like having two different locks that can be opened by the same key — it’s not supposed to happen and can make things less secure.

Synchronous and Asynchronous in Cryptography


1. Synchronous (Symmetric) Encryption:


2. Asynchronous (Asymmetric) Encryption:


In Short:




1. Certificate Authority (CA)


2. Registration Authority (RA)


3. Work Factor in Cryptography


4. Methods of Cryptography

a. Stream Cipher:

b. Block Cipher:


5. Initialization Vector (IV)


6. One-Time Pad

1000027935.jpg


7. Steganography


8. ECB vs. CBC (Modes of Block Cipher)


Stream vs. Block Ciphers:


Block Cipher Modes of Operation:

1. CFB (Cipher Feedback Mode):


2. OFB (Output Feedback Mode):


3. CTR (Counter Mode):


In Short:

These modes help block ciphers work like stream ciphers, offering flexibility and better security in different situations.



Cryptography Algorithms: Quick and Easy Notes


1. Data Encryption Standard (DES)


2. AES (Advanced Encryption Standard)


3. SAFER (Secure and Fast Encryption Routine)


4. RSA (Rivest-Shamir-Adleman)


5. Diffie-Hellman Algorithm


6. ElGamal Algorithm


7. ECC (Elliptic Curve Cryptography)


8. Birthday Paradox/Birthday Attack


In Short:

These notes should help you quickly understand these essential cryptography concepts!

  1. Linear Cryptanalysis:
    • Finds linear relationships between plaintext, ciphertext, and key.
    • Used to approximate encryption behavior.
  2. Chosen Plaintext Attack:
    • Attacker selects plaintexts and observes ciphertexts.
    • Aims to find encryption keys.
  3. Differential Cryptanalysis:
    • Analyzes how changes in plaintext affect ciphertext.
    • Effective for block ciphers.
  4. Implementation Attacks: Exploit weaknesses in the implementation, not the algorithm itself.
    • Side Channel Attack: Uses physical data like power, timing.
    • Fault Analysis: Induces errors to extract key info.
    • Probing Attack: Physically accesses internal data paths.
    • Replay Attack: Captures and reuses valid data for unauthorized access.

Domain 4: Communication and Network Security

OSI Layers (Open Systems Interconnection Model)

The OSI model is a conceptual framework that standardizes network communication. It has 7 layers, each serving a specific function in data transmission:

  1. Physical Layer (Layer 1): Deals with hardware transmission like cables and signals.
  2. Data Link Layer (Layer 2): Manages data frames between devices. Uses MAC addresses.(Frames)
  3. Network Layer (Layer 3): Handles routing and logical addressing (IP addresses).
  4. Transport Layer (Layer 4): Ensures reliable data transfer using protocols like TCP and UDP.
  5. Session Layer (Layer 5): Manages sessions and connections.
  6. Presentation Layer (Layer 6): Transforms data formats (encryption, compression).
  7. Application Layer (Layer 7): Interface for end-user applications (HTTP, FTP).

CSMA (Carrier Sense Multiple Access)


Ethernet (IEEE 802.3)


ADSL (Asymmetric Digital Subscriber Line)


RADSL (Rate-Adaptive Digital Subscriber Line)


VDSL (Very High Bitrate Digital Subscriber Line)

image.png




→ ARP (Address Resolution Protocol)

is used to map IP addresses to MAC addresses within a local network, enabling devices to communicate effectively by translating logical IP addresses to physical MAC addresses.

→ MPLS (Multiprotocol Label Switching)

is a network technology that uses labels to efficiently route data packets, improving traffic management and ensuring faster, more reliable data transmission, particularly for applications requiring low latency and predictable performance.

ICMP (Internet Control Message Protocol)

A network layer protocol used for error reporting and diagnostic functions. It helps network devices like routers and hosts communicate issues like unreachable destinations or timeouts.

Examples:

  1. When you use the ping command, ICMP is used to check if a device is reachable.
  2. ICMP messages help detect network congestion or misconfigurations.
  3. ICMP can report if a packet’s TTL (Time to Live) has expired.

IGMP (Internet Group Management Protocol)

A communication protocol used for managing multicast group memberships in IPv4 networks. It allows devices to join or leave multicast groups.

Examples:

  1. A router uses IGMP to check if there are devices interested in a specific multicast stream.
  2. Streaming services use IGMP to deliver content to multiple users efficiently.
  3. IGMP Snooping helps switches optimize multicast traffic.

OSPF (Open Shortest Path First)

A routing protocol used to find the best path for data within an IP network. It operates within a single Autonomous System (AS) and uses the Dijkstra algorithm.

Examples:

  1. OSPF quickly adjusts routing tables when network changes occur.
  2. It’s commonly used in large enterprise networks.
  3. OSPF divides networks into areas to optimize routing.

SNMP (Simple Network Management Protocol)

A protocol used to monitor, manage, and configure network devices like routers, switches, servers, and printers. It uses a centralized manager to collect data from devices using agents.

Examples:

  1. Network administrators use SNMP to monitor device performance.
  2. SNMP can trigger alerts if a device fails or exceeds usage thresholds.
  3. SNMPv3 includes enhanced security features like authentication and encryption.

LDAP (Lightweight Directory Access Protocol)

A protocol used to access and maintain distributed directory information services over an IP network. It’s often used for centralized authentication.

Examples:

  1. LDAP is used to authenticate users in Active Directory environments.
  2. Email servers use LDAP to find user information like email addresses.
  3. LDAP can integrate with Single Sign-On (SSO) for secure access control.

SDN (Software-Defined Networking)

A networking approach that separates the control plane (decision-making) from the data plane (traffic forwarding). This allows centralized, programmable network management using software applications, making networks more flexible and easier to manage.

Examples:

  1. SDN controllers can dynamically adjust network traffic based on changing conditions.
  2. Cloud providers use SDN to manage virtual networks across data centers.
  3. SDN simplifies network management by enabling centralized monitoring and automation.

CDN (Content Delivery Network)

A distributed network of servers that deliver web content to users based on their geographic location. CDNs improve website speed, reduce latency, and enhance the user experience by caching content closer to the end-users.

Examples:

  1. Streaming platforms use CDNs to deliver videos smoothly worldwide.
  2. A CDN helps reduce website loading time for users far from the origin server.
  3. CDNs protect against DDoS attacks by distributing traffic across multiple servers.

PAT (Port Address Translation)

A type of NAT (Network Address Translation) that allows multiple devices on a local network to share a single public IP address by mapping each device’s connection to a unique port number. It is also known as NAT Overload.

Examples:

  1. PAT lets multiple devices in a home network access the internet using a single public IP address.
  2. When you browse the internet from multiple devices on the same network, PAT assigns unique port numbers to each session.
  3. PAT helps conserve public IPv4 addresses and provides a layer of security by hiding internal IP addresses.

SIP (Session Initiation Protocol)

A signaling protocol used to establish, maintain, modify, and terminate real-time communication sessions, such as voice calls, video conferences, and messaging over IP networks. It operates mainly at the Application Layer of the OSI model.

Examples:

  1. SIP is used to initiate and end VoIP (Voice over IP) calls.
  2. Video conferencing platforms use SIP to set up multimedia sessions between participants.
  3. SIP works alongside protocols like RTP (Real-Time Protocol) to transmit voice and video data.

IRC (Internet Relay Chat)

A text-based communication protocol used for real-time chatting over the internet. It enables users to join channels (chat rooms) or have private conversations. IRC was widely popular before modern messaging apps.

Examples:

  1. Developers use IRC channels to discuss open-source projects and collaborate.
  2. Some gaming communities still use IRC for real-time communication.
  3. IRC networks can be accessed using dedicated clients like mIRC or HexChat.

Domain 5: Identity and Access Management

Centralized vs. Decentralized vs. Hybrid


Access Control Management

Processes and technologies used to grant, restrict, and monitor access to resources based on policies. It ensures users have appropriate access levels and maintains system security.


Physical Access Control Systems (PACS)

Security systems that control physical entry to facilities using devices like card readers, biometric scanners, and surveillance. Examples: keypads, turnstiles.


Access Control Token

Physical or digital devices (cards, fobs, software tokens) used to authenticate and authorize user access. Can include One-Time Passwords (OTPs) for enhanced security.


Provisioning and Deprovisioning


Biometrics

Authentication methods using unique physical or behavioral traits like fingerprints, iris scans, voice recognition. Offers strong security but raises privacy concerns.


FIM (Federated Identity Management)

Allows a user to access multiple systems across different domains using a single identity. Reduces the need for multiple credentials.


SAML (Security Assertion Markup Language)

An XML-based protocol for authentication and authorization data exchange. Commonly used for Single Sign-On (SSO) in web applications.


OAuth (Open Authorization)

An authorization protocol allowing third-party applications to access resources without sharing user credentials. Commonly used by platforms like Google and Facebook.


OpenID

An authentication protocol that allows users to authenticate with multiple services using a single identity. Often paired with OAuth for combined authentication and authorization.


LDAP (Lightweight Directory Access Protocol)

A protocol used to query and manage directory information, like user data in a network. Commonly used for authentication in corporate environments.


Types of Access Control


Accountability in Identity and Access Management (IAM)

Ensures users are responsible for their actions by maintaining logs, audits, and monitoring activities. Crucial for compliance and incident response.

Domain 6: Security Assessment and Testing

🧪 1. What Is Security Assessment & Testing?


🔍 2. Why Do We Test Security?


🧰 3. Types of Tests

Vulnerability Assessment

Penetration Testing (Pen Test)

Security Audit

Security Assessment

Log Review


🧠 4. Testing Methods


👨‍🔧 5. Security Processes to Review


📊 6. Test Data Handling


📋 7. Reporting Results


📈 8. Continuous Monitoring


⚠️ 9. Common Tools and Techniques


Synthetic Monitoring:

A technique where automated, simulated transactions are used to test the performance and functionality of an application from an end-user perspective.

Example: Companies use synthetic monitoring to check website uptime from various global locations.

SAST (Static Application Security Testing):

A method of analyzing source code for security vulnerabilities without executing the program. It focuses on finding issues early in the development phase.

Example: Developers use SAST tools to identify insecure coding practices during the coding process.

Black Box vs. White Box Testing:

Dynamic Testing vs. Static Testing:

Fuzz Testing:

An automated testing technique that feeds random or unexpected inputs into a system to discover vulnerabilities or unexpected behaviors.

Example: A security team uses fuzz testing to see if invalid inputs can crash an application.

Domain 7: Security Operations


🛡️ 1. What Is Security Operations?


📆 2. Operational Activities


🚨 3. Incident Response

Respond quickly and properly when something bad happens.


🔁 4. Business Continuity & Disaster Recovery

Important Metrics:


🏷️ 5. Digital Forensics


🔐 6. Security Concepts in Operations


👥 7. Personnel Security


🔧 8. Resource Protection


🧪 9. Testing Controls


🛰️ 10. SIEM and Monitoring


🧯 11. Fire Prevention & Safety


CISSP Domain 8: Software Development Security


💻 1. What Is Software Development Security?


🧱 2. Software Development Life Cycle (SDLC)

SDLC = Steps followed to make software.

Phases:

  1. Planning – What are we building?
  2. Design – How will it work?
  3. Development – Write the code.
  4. Testing – Check for bugs or security issues.
  5. Deployment – Release it to users.
  6. Maintenance – Fix bugs, update as needed.

🛡️ Add security at every step (called Secure SDLC).


🧪 3. Software Testing Types


🔐 4. Common Software Flaws

🛠️ Fix bugs early to avoid bigger problems later.


🛑 5. Secure Coding Practices


👥 6. Development Roles

Everyone must work together for secure software.


🔁 7. Change & Version Control


📜 8. Software Security Models & Concepts


🔧 9. Software Development Methods


📥 10. Third-Party & Open-Source Software


⚙️ 11. Deployment & Secure Environments

💡 Never mix testing and production environments!

Edit page
Share this post on:

Previous Post
Ultimate OSINT Toolkit – Tools, Links & Intelligence Resources
Next Post
RHEL Intensive - Services: AWS, Networking, FTP, Apache, Firewalls, SELinux, and Samba