Suchen und Finden
Service
Eleventh Hour CISSP - Study Guide
Eric Conrad, Seth Misenar, Joshua Feldman
Verlag Elsevier Reference Monographs, 2010
ISBN 9781597495677 , 205 Seiten
Format PDF, ePUB, OL
Kopierschutz DRM
Geräte
Front Cover
1
Eleventh Hour CISSPĀ® Study Guide
2
Copyright
5
Contents
6
About the Authors
8
Chapter 1: Domain 1: Information Security Governance and Risk Management
10
Introduction
10
Risk analysis
10
Information Security Governance
18
Summary of Exam Objectives
25
Top Five Toughest Questions
25
Chapter 2: Domain 2: Access Control
28
Introduction
28
Access Control Models
30
Procedural Issues for Access Control
33
Access control Defensive Categories and Types
34
Authentication Methods
35
Access control Technologies
40
Assessing access control
42
Summary of exam objectives
43
Top five toughest questions
44
Chapter 3: Domain 3: Cryptography
48
Introduction
48
Cornerstone Cryptographic Concepts
48
Symmetric Encryption
50
Asymmetric Encryption
54
Hash functions
55
Cryptographic Attacks
55
Implementing Cryptography
57
Summary of Exam Objectives
61
Top Five Toughest Questions
62
Chapter 4: Domain 4: Physical (Environmental) Security
64
Introduction
64
Perimeter Defenses
64
Site selection, design, and configuration
68
System defenses
69
Environmental Controls
70
Summary of Exam Objectives
75
Top Five Toughest Questions
75
Chapter 5: Domain 5: Security Architecture and Design
78
Introduction
78
Secure System Design Concepts
78
Secure Hardware Architecture
80
Secure Operating System and Software Architecture
85
System Vulnerabilities, Threats, and Countermeasures
86
Security Models
89
Evaluation Methods, Certification, and Accreditation
92
Summary of Exam Objectives
94
Top Five Toughest Questions
95
Chapter 6: Domain 6: Business Continuity and Disaster Recovery Planning
98
Introduction
98
BCP and DRP Overview and Process
98
Developing a BCP/DRP
102
DRP Testing, Training, and Awareness
109
Continued BCP/DRP maintenance
111
Specific BCP/DRP frameworks
112
Summary of Exam Objectives
113
Top Five Toughest Questions
114
Chapter 7: Domain 7: Telecommunicationsand Network Security
118
Introduction
118
Network Architecture and Design
118
Network Devices
126
Secure Communications
129
Summary of Exam Objectives
134
Top Five Toughest questions
135
Chapter 8: Domain 8: Application Development Security
138
Introduction
138
Programming Concepts
138
Application Development Methods
140
Object-Oriented Programming
143
Software Vulnerabilities, Testing, and Assurance
146
Databases
148
Summary of Exam Objectives
152
Top Five Toughest Questions
152
Chapter 9: Domain 9: Operations Security
156
Introduction
156
Administrative Security
156
Sensitive Information/Media Security
158
Continuity of Operations
159
Computer and network attacks
164
Summary of Exam Objectives
167
Top Five Toughest Questions
168
Chapter 10: Domain 10: Legal, Regulations, Investigations, and Compliance
170
Introduction
170
Major Legal Systems
170
Criminal, Civil, and Administrative Law
171
Information Security Aspects of Law
172
Legal Aspects of Investigations
174
Important Laws and Regulations
176
Ethics
179
Summary of Exam Objectives
181
Top Five Toughest Questions
181
Glossary
184
Index
192
Service
Shop