Experience of CISM Exam & Study Notes Part- 3

Today we are going to learn information security accident management related knowledge points, as well as some matters needing attention.

Hastags:#CISM #InformationSecurity #ISACA #Certification #Manager

Summary of Information Security Incident Management


This field mainly includes the development of effective incident response plans, and the understanding of their relationship with BIA-Business Impact Analysis, DRP-Disaster Recovery Plan, and Business Continuity Plan.


(1) You need to understand the Severity Criteria, Declaration Criteria, Escalation Criteria, and Escalation procedures.


(2) You need to know the types of various recovery sites, such as mirror sites, hot backup sites, warm backup sites, and cold backup sites. A considerable part of its knowledge points will be related to the aforementioned RTO, RPO, etc.


(3) The testing of information security incident management procedures is also an important part. It is necessary to understand the actual business meaning and effects of various tests. As an information security manager, you need to make the best testing methods under what circumstances.


(4) Information security accident management involves forensic knowledge, so you should have knowledge of the chain of custody and local law.


(5) Information security incident management also requires management’s support and commitment and is consistent with business goals.

This part should be easier to score, but it is not surprising that some unpopular knowledge and special circumstances will cause points to be lost.


Technical knowledge of CISM exam


The CISM exam focuses on the combination of management and technology, requires a certain amount of practical technical experience, but does not involve too low-level technical knowledge. The breadth of knowledge is more important than depth. In the learning process, the key technical knowledge points for review and preparation are as follows:


  • Cross-site scripting (XSS): XSS is a security vulnerability, attackers can use this vulnerability to inject malicious client code on the website.

  • Cross-Site Request Forgery (XSRF): Cross-site Request Forgery (XSRF), also known as one-click attack or session riding, commonly abbreviated as CSRF or XSRF, is a method of hijacking an attempt by a user to perform an unintended action on a currently logged Web application. In contrast to cross-site scripting (XSS), XSS exploits the user's trust in a given site, while CSRF exploits the site's trust in the user's web browser.

  • Authentication Replay

  • SQL Injection Attack

  • Man-in-the-middle (MitM) attack

  • Certificate-based authentication of the web client

  • Knowledge of public key infrastructure PKI

  • Knowledge of encryption and decryption

  • Knowledge of firewall/VPN/DMZ, etc.

  • Role-based access controls

  • Mandatory access controls: Mandatory access controls restrict access to files based on their security classification. This prevents users from sharing files with unauthorized users

  • Wifi Management

  • WPA2 is currently one of the most secure authentication and encryption protocols in mainstream wireless products.

  • WEP is no longer a secure encryption mechanism for wireless communication. The cracking software can easily crack the WEP key within minutes

  • IDS (intrusion detection system): The characteristics and differences between IDS (Statistical anomaly-based IDS) and signature-based IDS (Signature-based IDS)

  • SIEM: Collect event log entries, perform correlation and generate alerts, and send them to relevant personnel for investigation and action.

  • Cloud Access Security Brokers (CASB): I think there will be more cloud service management knowledge points in the CISM exam in the future.

The CISM exam also requires a broad technical knowledge and understanding of the IT field.

In addition, with the widespread use of cloud computing in enterprises, cloud service-related security management may account for more of the CISM exam. You can do some technical knowledge reserves.


Regulations, standards, and frameworks related to CISM


Many industry standards and frameworks are involved in the official textbooks of CISM.

  • Security Architecture such as Sherwood Applied Business Security Architecture (SABSA), Zachman framework, etc.

  • Security Management Frameworks, such as ISO/IEC 27001, COBIT, NIST, etc.

  • Control Framework, such as COBIT, ITIL, HIPAA, PCI-DSS, CIS, NIST SP series, ISO/IEC 27001, etc.

  • Security laws and regulations, such as GDPR, etc.

Its specific standards and provisions will not be involved in the CISM exam. However, information security managers should have some understanding of its overall framework, industry adaptation, and logical methods, which can be used as the direction for continuous learning in the future (combined with their actual situation and industry).


The test time


The CISM exam format is to complete 150 multiple choice questions within 4 hours. From my experience, there is plenty of time. In the beginning, you may encounter a problem that you are not familiar with. You can mark it first, and come back to do it again. The interface design of the examination software is very friendly, if you are not sure about the interface operation, you can ask the invigilator.


Be sure to read the questions carefully, don't take for granted some seemingly simple questions, try to figure out the intention of the questioner, and the key points to be investigated.


Among the four answers, you will definitely encounter situations where the answers are relatively close or seem to be correct. At this time, you need to compare your current choice with the others to see if they have anything in common. If so, your current answer may not be correct, because there is only one correct answer to the multiple-choice question. It is impossible that both options are right. You should consider if there is a more appropriate answer, or if you have not considered it well.


The above is my personal summary of this certification exam, I hope it will be helpful to everyone.


Check out part 1 and part 2 of this article from here:

Part 1: https://www.591lab.com/post/experience-of-cism-exam-study-notes

Part 2: https://www.591lab.com/post/experience-of-cism-exam-study-notes-part-2

About

Launched in 2016 as 591Lab International and locally in China known as “WUQIUYAO Tech. Ltd” we are committed to offering our clients excellent experience on ISACA, PMI, Cisco and Huawei examination preparatory services. We focus strongly on popular exams, and exam preparations services. We provide our customers with the complete training needed to earn the best scores for their respective Management and IT career certifications. We have a huge list of satisfied customers with top grades to back up all the claims we make.

Quick Links

Contact

This material is not sponsored by, endorsed by, or affiliated with Cisco Systems, Inc & Huawei Technologies Co., Ltd. Cisco Certified Internetworking Engineer, the Cisco Systems logo and the CCIE™ logo are trademarks or registered trademarks of Cisco Systems, Inc. in the United States and certain other countries.Huawei Certified Internetwork Expert, the Huawei logo and the HCIE™ logo are trademarks or registered trademarks of Huawei Technologies Co., Ltd . in China and certain other countries All other trademarks are trademarks of their respective owners. 

© Copyright 591Lab 2020. All Rights Reserved.