dummies
 

Suchen und Finden

Titel

Autor/Verlag

Inhaltsverzeichnis

Nur ebooks mit Firmenlizenz anzeigen:

 

Eleventh Hour CISSP - Study Guide

Eric Conrad, Seth Misenar, Joshua Feldman

 

Verlag Elsevier Reference Monographs, 2010

ISBN 9781597495677 , 205 Seiten

Format PDF, ePUB, OL

Kopierschutz DRM

Geräte

22,95 EUR


 

Front Cover

1

Eleventh Hour CISSPĀ® Study Guide

2

Copyright

5

Contents

6

About the Authors

8

Chapter 1: Domain 1: Information Security Governance and Risk Management

10

Introduction

10

Risk analysis

10

Information Security Governance

18

Summary of Exam Objectives

25

Top Five Toughest Questions

25

Chapter 2: Domain 2: Access Control

28

Introduction

28

Access Control Models

30

Procedural Issues for Access Control

33

Access control Defensive Categories and Types

34

Authentication Methods

35

Access control Technologies

40

Assessing access control

42

Summary of exam objectives

43

Top five toughest questions

44

Chapter 3: Domain 3: Cryptography

48

Introduction

48

Cornerstone Cryptographic Concepts

48

Symmetric Encryption

50

Asymmetric Encryption

54

Hash functions

55

Cryptographic Attacks

55

Implementing Cryptography

57

Summary of Exam Objectives

61

Top Five Toughest Questions

62

Chapter 4: Domain 4: Physical (Environmental) Security

64

Introduction

64

Perimeter Defenses

64

Site selection, design, and configuration

68

System defenses

69

Environmental Controls

70

Summary of Exam Objectives

75

Top Five Toughest Questions

75

Chapter 5: Domain 5: Security Architecture and Design

78

Introduction

78

Secure System Design Concepts

78

Secure Hardware Architecture

80

Secure Operating System and Software Architecture

85

System Vulnerabilities, Threats, and Countermeasures

86

Security Models

89

Evaluation Methods, Certification, and Accreditation

92

Summary of Exam Objectives

94

Top Five Toughest Questions

95

Chapter 6: Domain 6: Business Continuity and Disaster Recovery Planning

98

Introduction

98

BCP and DRP Overview and Process

98

Developing a BCP/DRP

102

DRP Testing, Training, and Awareness

109

Continued BCP/DRP maintenance

111

Specific BCP/DRP frameworks

112

Summary of Exam Objectives

113

Top Five Toughest Questions

114

Chapter 7: Domain 7: Telecommunicationsand Network Security

118

Introduction

118

Network Architecture and Design

118

Network Devices

126

Secure Communications

129

Summary of Exam Objectives

134

Top Five Toughest questions

135

Chapter 8: Domain 8: Application Development Security

138

Introduction

138

Programming Concepts

138

Application Development Methods

140

Object-Oriented Programming

143

Software Vulnerabilities, Testing, and Assurance

146

Databases

148

Summary of Exam Objectives

152

Top Five Toughest Questions

152

Chapter 9: Domain 9: Operations Security

156

Introduction

156

Administrative Security

156

Sensitive Information/Media Security

158

Continuity of Operations

159

Computer and network attacks

164

Summary of Exam Objectives

167

Top Five Toughest Questions

168

Chapter 10: Domain 10: Legal, Regulations, Investigations, and Compliance

170

Introduction

170

Major Legal Systems

170

Criminal, Civil, and Administrative Law

171

Information Security Aspects of Law

172

Legal Aspects of Investigations

174

Important Laws and Regulations

176

Ethics

179

Summary of Exam Objectives

181

Top Five Toughest Questions

181

Glossary

184

Index

192