MCDST: Microsoft Certified Desktop Support Technician Study Guide (70-271 and 70-272)
Author: Bill Ferguson
Here's the book you need to prepare for Microsoft's new MCDST exams—70-271: Supporting Users and Troubleshooting a Microsoft XP Operating System; and 70-272: Supporting Users and Troubleshooting Desktop Applications on a Microsoft Windows XP Operating System.
This two-in-one Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the consistent and accessible instructional approach that earned Sybex the "Best Study Guide" designation in the 2003 CertCities Readers Choice Awards, this book provides:
• In-depth coverage of all exam topics
• Practical information on supporting users and troubleshooting applications
• Hundreds of challenging review questions
• Leading-edge exam preparation software, including a test engine and electronic flashcards
Authoritative coverage of all exam objectives, including:
Exam 70-271:
• Installing a Windows Desktop Operating System
• Managing and Troubleshooting Access to Resources
• Configuring and Troubleshooting Hardware Devices and Drivers
• Configuring and Troubleshooting the Desktop and User Environments
• Troubleshooting Network Protocols and Services
Exam 70-272:
• Configuring and Troubleshooting Applications
• Resolving Issues Related to Usability
• Resolving Issues Related to Application Customization
• Configuring and Troubleshooting Connectivity for Applications
• Configuring ApplicationSecurity
New interesting textbook: Thanksgiving or Game Bird Classic Recipes
FISMA Certification and Accreditation Handbook
Author: L Taylor
The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements.
This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws will be cited and discussed including the three leading types of C&A: NIST, NIAP, and DITSCAP. Next, the book explains how to prepare for, perform, and document a C&A project. The next section to the book illustrates addressing security awareness, end-user rules of behavior, and incident response requirements. Once this phase of the C&A project is complete, the reader will learn to perform the security tests and evaluations, business impact assessments system risk assessments, business risk assessments, contingency plans, business impact assessments, and system security plans. Finally the reader will learn to audit their entire C&A project and correct any failures.
* Focuses on federally mandated certification and accreditation requirements
* Author Laura Taylor's research on Certification and Accreditation has been used by the FDIC, the FBI, and the Whitehouse
* Full of vital information on compliance for both corporate and government IT Managers
Table of Contents:
Foreword xxiiiPreface xxv
What Is Certification and Accreditation? 1
Introduction 2
Terminology 3
Audit and Report Cards 6
A Standardized Process 7
Templates, Documents, and Paperwork 8
Certification and Accreditation Laws Summarized 9
Summary 10
Notes 11
Types of Certification and Accreditation 13
Introduction 14
The NIACAP Process 15
The NIST Process 16
NIACAP and NIST Phases, Differences, and Similarities 16
NIACAP and NIST Compared 17
DITSCAP 18
DCID 6/3 19
The Common Denominator of All C&A Methodologies 20
C&A for Private Enterprises 21
Summary 23
Notes 23
Understanding the Certification and Accreditation Process 25
Introduction 26
Recognizing the Need for C&A 26
Roles and Responsibilities 27
Chief Information Officer 27
Authorizing Official 29
Senior Agency InformationSecurity Officer 30
Senior Agency Privacy Official 31
Certification Agent/Evaluation Team 31
Business Owner 33
System Owner 33
Information Owner 33
Information System Security Officer 34
C&A Preparers 35
Agency Inspectors 35
GAO Inspectors 36
Levels of Audit 36
Stepping through the Process 37
The Initiation Phase 37
The Certification Phase 40
The Accreditation Phase 41
The Continuous Monitoring Phase 42
Summary 44
Establishing a C&A Program 45
Introduction 46
C&A Handbook Development 46
What to Include in Your Handbook 47
Who Should Write the Handbook? 48
Template Development 48
Provide Package Delivery Instructions 50
Create an Evaluation Process 51
Authority and Endorsement 51
Improve Your C&A Program Each Year 52
Problems of Not Having a C&A Program 52
Missing Information 52
Lack of Organization 53
Inconsistencies in the Evaluation Process 53
Unknown Security Architecture and Configuration 53
Unknown Risks 54
Laws and Report Cards 54
Summary 55
Developing a Certification Package 57
Introduction 58
Initiating Your C&A Project 58
Put Together a Contact List 58
Hold a Kick-Off Meeting 59
Obtain Any Existing Agency Guidelines 60
Analyze Your Research 61
Preparing the Documents 61
It's Okay to Be Redundant 62
Different Agencies Have Different Requirements 62
Including Multiple Applications and Systems in One Package 63
Verify Your Information 64
Retain Your Ethics 64
Summary 66
Preparing the Hardware and Software Inventory 67
Introduction 68
Determining the Accreditation Boundaries 68
Collecting the Inventory Information 70
Structure of Inventory Information 71
Delivery of Inventory Document 72
Summary 74
Determining the Certification Level 75
Introduction 76
What Are the C&A Levels? 76=970 03$lLevel 1 76=970 03$lLevel 2 77=970 03$lLevel 3 77=970 03$lLevel 4 78
Importance of Determining the C&A Level 79
Don't Make This Mistake 79
Criteria to Use for Determining the Levels 81
Confidentiality, Integrity, and Availability 81
Confidentiality 82
Determining the Confidentiality Level 83
Integrity 84
Determining the Integrity Level 84
Availability 85
Determining the Availability Level 86
How to Categorize Multiple Data Sets 86
Impact Levels and System Criticality 87
System Attribute Characteristics 89
Interconnection State (Interfacing Mode) 89
Access State (Processing Mode) 90
Accountability State (Attribution Mode) 91
Mission Criticality 92
Determining Level of Certification 93
Template for Levels of Determination 94
Rationale for the Security Level Recommendation 97
Process and Rationale for the C&A Level Recommendation 99
The Explanatory Memo 102
Template for Explanatory Memo 103
Summary 105
Performing and Preparing the Self-Assessment 107
Introduction 108
Objectives 108
Designing the Survey 109
Levels of Compliance 109
Management Controls 111
Operational Controls 112
Technical Controls 113
Correlation with Security Policies and Laws 113
Answering the Questions 114
Questions for Self-Assessment Survey 116
Summary 137
Notes 138
Addressing Security Awareness and Training Requirements 139
Introduction 140
Purpose of Security Awareness and Training 140
Security Training 141
Security Awareness 142
The Awareness and Training Message 142
Online Training Makes It Easy 144
Document Your Plan 144
Security Awareness and Training Checklist 145
Security Awareness Material Evaluation 145
Security Awareness Class Evaluation 147
Summary 148
Notes 148
Addressing End-User Rules of Behavior 149
Introduction 150
Implementing Rules of Behavior 150
What Rules to Include 151
Rules for Applications, Servers, and Databases 151
Additional Rules for Handhelds 152
Additional Rules for Laptops and Desktop Systems 153
Additional Rules for Privileged Users 154
Consequences of Noncompliance 155
Rules of Behavior Checklist 155
Summary 156
Addressing Incident Response 157
Introduction 158
Purpose and Applicability 158
Policies and Guidelines 159
Reporting Framework 160
Roles and Responsibilities 162
Agency CSIRC 162
Information System Owner and ISSO 163
Incident Response Manager 164
Definitions 165
Incident 165
Impact, Notification, and Escalation 166
Incident Handling 168
Detecting an Incident 169
Containment and Eradication 171
Recovery and Closure 172
Forensic Investigations 173
Incident Types 176
Incident Response Plan Checklist 180
Security Incident Reporting Form 181
Summary 183
Additional Resources 183
Incident Response Organizations 183
Additional Resources 184
Articles and Papers on Incident Response 185
Notes 186
Performing the Security Tests and Evaluation 187
Introduction 188
Types of Security Tests 188
Confidentiality Tests 189
Integrity Tests 191
Availability Tests 192
Types of Security Controls 193
Management Controls 193
Operational Controls 194
Technical Controls 194
Testing Methodology and Tools 194
Algorithm Testing 197
Code and Memory Analyzers 198
Network and Application Scanners 199
Port Scanners 200
Port Listeners 201
Modem Scanners 201
Wireless Network Scanner 202
Wireless Intrusion Detection Systems 202
Wireless Key Recovery 203
Password Auditing Tools 203
Database Vulnerability Testing Tools 204
Test Management Packages 204
Who Should Perform the Tests? 205
Documenting the Tests 205
Analyzing the Tests and Their Results 205
Summary 207
Additional Resources 207
Books Related to Security Testing 207
Articles and Papers Related to Security Testing 208
Notes 209
Conducting a Privacy Impact Assessment 211
Introduction 212
Privacy Laws, Regulations, and Rights 212
OMB Memoranda 213
Laws and Regulations 213
PIA Answers Questions 214
Personally Identifiable Information (PII) 215
Persistent Tracking Technologies 217
Determine Privacy Threats and Safeguards 218
Decommissioning of PII 219
System of Record Notice (SORN) 220
Posting the Privacy Policy 220
PIA Checklist 220
Summary 222
Books on Privacy 222
Notes 222
Performing the Business Risk Assessment 225
Introduction 226
Determine the Mission 227
Create a Mission Map 229
Construct Risk Statements 230
Describe the Sensitivity Model 232
Impact Scale 233
Likelihood Scale 234
Calculating Risk Exposure 234
Lead the Team to Obtain the Metrics 235
Analyze the Risks 235
Make an Informed Decision 237
Accept the Risk 237
Transfer the Risk 238
Mitigate the Risk 238
Summary 241
Books and Articles on Risk Assessment 241
Notes 242
Preparing the Business Impact Assessment 243
Introduction 244
Document Recovery Times 244
Establish Relative Recovery Priorities 245
Telecommunications 246
Infrastructure Systems 247
Secondary Systems 247
Define Escalation Thresholds 248
Record License Keys 249
BIA Organization 250
Summary 252
Additional Resources 252
Developing the Contingency Plan 253
Introduction 254
List Assumptions 255
Concept of Operations 255
System Description 255
Network Diagrams and Maps 256
Data Sources and Destinations 256
Roles and Responsibilities 257
Contingency Planning Coordinator 258
Damage Assessment Coordinator 259
Emergency Relocation Site Adviser and Coordinator 260
Information Systems Operations Coordinator 260
Logistics Coordinator 260
Security Coordinator 261
Telecommunications Coordinator 261
Levels of Disruption 262
Procedures 263
Backup and Restoration Procedures 263
Procedures to Access Off-site Storage 264
Operating System Recovery Procedures 264
Application Recovery Procedures 265
Connectivity Recovery Procedures 265
Key Recovery Procedures 266
Power Recovery Procedures 266
Recovering and Assisting Personnel 267
Notification and Activation 267
Line of Succession 269
Service Level Agreements 269
Contact Lists 270
Testing the Contingency Plan 270
Appendices 271
Contingency Plan Checklist 271
Additional Resources 272
Performing a System Risk Assessment 275
Introduction 276
Risk Assessment Creates Focus 276
Determine Vulnerabilities 278
Threats 280
Threats Initiated by People 280
Threats Initiated by Computers or Devices 280
Threats from Natural Disasters 281
Qualitative Risk Assessment 282
Quantitative Risk Assessment 283
Qualitative versus Quantitative Risk Assessment 287
Present the Risks 288
Make Decisions 291
Checklist 291
Summary 293
Additional Resources 293
Notes 294
Developing a Configuration Management Plan 295
Introduction 296
Establish Definitions 296
Describe Assets Controlled by the Plan 297
Describe the Configuration Management System 298
Define Roles and Responsibilities 299
Establish Baselines 301
Change Control Process 302
Change Request Procedures 303
Emergency Change Request Procedures 303
Change Request Parameters 304
Configuration Control Board 304
Configuration Management Audit 306
Configuration and Change Management Tools 307
Configuration Management Plan Checklist 308
Summary 309
Additional Resources 309
Preparing the System Security Plan 311
Introduction 312
Laws, Regulations, and Policies 312
The System Description 313
System Boundaries 315
System Mission 316
Data Flows 318
Security Requirements and Controls 318
Management Controls 325
Risk Mitigation 325
Reporting and Review by Management 326
System Lifecycle Requirements 328
Security Planning 329
Documentation for Managers 329
Operational Controls 330
Personnel Security 330
Physical and Environmental Controls and Safeguards 331
Administration and Implementation 332
Preventative Maintenance 333
Contingency and Disaster Recovery Planning 334
Training and Security Awareness 334
Incident Response Procedures 335
Preservation of Data Integrity 335
Network and System Security Operations 336
Technical Controls 338
Authentication and Identity Verification 338
Logical Access Controls 341
Secure Configurations 341
Interconnectivity Security 344
Audit Mechanisms 346
ISSO Appointment Letter 349
System Security Plan Checklist 351
Summary 353
Additional Resources 353
Notes 354
Submitting the C&A Package 355
Introduction 356
Structure of Documents 356
Who Puts the Package Together? 357
Markings and Format 357
Signature Pages 358
A Word About "Not Applicable" Information 359
Submission and Revision 360
Defending the Certification Package 360
Checklist 362
Summary 363
Additional Resources 363
Evaluating the
Certification Package for Accreditation 365
Introduction 366
The Security Assessment Report 366
Checklists for Compliance 366
Compliance Checklist for Management Controls 368
Compliance Checklist for Operational Controls 380
Compliance Checklist for Technical Controls 392
Recommendation to Accredit or Not 404
Accreditation and Authority to Operate 405
Interim Authority to Operate 405
Evaluations by an OIG 407
Evaluations by the GAO 408
Checklist 409
Summary 410
Addressing C&A Findings 411
Introduction 412
POA&Ms 412
Development and Approval 412
POA&M Elements 413
A Word to the Wise 416
Checklist 416
Summary 417
Improving Your Federal Computer Security Report Card Scores 419
Introduction 420
Elements of the Report Card 420
Actions for Improvement 421
Trends 422
Summary 423
Resources 425
Acronyms 428
FISMA 431
OMB Circular A-130: Appendix III 453
FIPS 199 473
Index 485
No comments:
Post a Comment