Eleventh Hour CISSP -  Eric Conrad,  Joshua Feldman,  Seth Misenar

Eleventh Hour CISSP (eBook)

Study Guide
eBook Download: PDF | EPUB
2010 | 1. Auflage
208 Seiten
Elsevier Science (Verlag)
978-1-59749-567-7 (ISBN)
Systemvoraussetzungen
Systemvoraussetzungen
22,95 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Eleventh Hour CISSP Study Guide serves as a guide for those who want to be information security professionals. The main job of an information security professional is to evaluate the risks involved in securing assets and to find ways to mitigate those risks. Information security jobs include firewall engineers, penetration testers, auditors, and the like. The book is composed of 10 domains of the Common Body of Knowledge. In each section, it defines each domain. The first domain provides information about risk analysis and mitigation, and it discusses security governance. The second domain discusses techniques of access control, which is the basis for all security disciplines. The third domain explains the concepts behind cryptography, which is a secure way of communicating that is understood only by certain recipients. Domain 5 discusses security system design, which is fundamental in operating the system and software security components. Domain 6 is one of the critical domains in the Common Body of Knowledge, the Business Continuity Planning and Disaster Recovery Planning. It is the final control against extreme events such as injury, loss of life, or failure of an organization. Domain 7, Domain 8 and Domain 9 discuss telecommunications and network security, application development security, and the operations domain, respectively. Domain 10 focuses on the major legal systems that provide a framework for determining laws about information system. - The only guide you need for last-minute studying - Answers the toughest questions and highlights core topics - Can be paired with any other study guide so you are completely prepared

Eric Conrad (CISSP, GIAC GSE, GPEN, GCIH, GCIA, GCFA, GAWN, GSEC, GMON, GISP), is a SANS fellow and Chief Technology Officer of Backshore Communications, which provides threat hunting, penetration testing, incident handling, and intrusion detection consulting services. Eric started his professional career in 1991 as a UNIX systems administrator for a small oceanographic communications company. He gained information security experience in a variety of industries, including research, education, power, Internet, and healthcare, in positions ranging from systems programmer to security engineer to HIPAA security officer and ISSO. He is coauthor of MGT414: SANS Training Program for the CISSP Certification, SEC511: Continuous Monitoring and Security Operations, and SEC542: Web App Penetration Testing and Ethical Hacking. Eric graduated from the SANS Technology Institute with a Master of Science degree in Information Security Engineering.
Eleventh Hour CISSP Study Guide serves as a guide for those who want to be information security professionals. The main job of an information security professional is to evaluate the risks involved in securing assets and to find ways to mitigate those risks. Information security jobs include firewall engineers, penetration testers, auditors, and the like. The book is composed of 10 domains of the Common Body of Knowledge. In each section, it defines each domain. The first domain provides information about risk analysis and mitigation, and it discusses security governance. The second domain discusses techniques of access control, which is the basis for all security disciplines. The third domain explains the concepts behind cryptography, which is a secure way of communicating that is understood only by certain recipients. Domain 5 discusses security system design, which is fundamental in operating the system and software security components. Domain 6 is one of the critical domains in the Common Body of Knowledge, the Business Continuity Planning and Disaster Recovery Planning. It is the final control against extreme events such as injury, loss of life, or failure of an organization. Domain 7, Domain 8 and Domain 9 discuss telecommunications and network security, application development security, and the operations domain, respectively. Domain 10 focuses on the major legal systems that provide a framework for determining laws about information system. - The only guide you need for last-minute studying- Answers the toughest questions and highlights core topics- Can be paired with any other study guide so you are completely prepared

Front Cover 1
Eleventh Hour CISSP® Study Guide 2
Copyright 5
Contents 6
About the Authors 8
Chapter 1: Domain 1: Information Security Governance and Risk Management 10
Introduction 10
Risk analysis 10
Information Security Governance 18
Summary of Exam Objectives 25
Top Five Toughest Questions 25
Chapter 2: Domain 2: Access Control 28
Introduction 28
Access Control Models 30
Procedural Issues for Access Control 33
Access control Defensive Categories and Types 34
Authentication Methods 35
Access control Technologies 40
Assessing access control 42
Summary of exam objectives 43
Top five toughest questions 44
Chapter 3: Domain 3: Cryptography 48
Introduction 48
Cornerstone Cryptographic Concepts 48
Symmetric Encryption 50
Asymmetric Encryption 54
Hash functions 55
Cryptographic Attacks 55
Implementing Cryptography 57
Summary of Exam Objectives 61
Top Five Toughest Questions 62
Chapter 4: Domain 4: Physical (Environmental) Security 64
Introduction 64
Perimeter Defenses 64
Site selection, design, and configuration 68
System defenses 69
Environmental Controls 70
Summary of Exam Objectives 75
Top Five Toughest Questions 75
Chapter 5: Domain 5: Security Architecture and Design 78
Introduction 78
Secure System Design Concepts 78
Secure Hardware Architecture 80
Secure Operating System and Software Architecture 85
System Vulnerabilities, Threats, and Countermeasures 86
Security Models 89
Evaluation Methods, Certification, and Accreditation 92
Summary of Exam Objectives 94
Top Five Toughest Questions 95
Chapter 6: Domain 6: Business Continuity and Disaster Recovery Planning 98
Introduction 98
BCP and DRP Overview and Process 98
Developing a BCP/DRP 102
DRP Testing, Training, and Awareness 109
Continued BCP/DRP maintenance 111
Specific BCP/DRP frameworks 112
Summary of Exam Objectives 113
Top Five Toughest Questions 114
Chapter 7: Domain 7: Telecommunicationsand Network Security 118
Introduction 118
Network Architecture and Design 118
Network Devices 126
Secure Communications 129
Summary of Exam Objectives 134
Top Five Toughest questions 135
Chapter 8: Domain 8: Application Development Security 138
Introduction 138
Programming Concepts 138
Application Development Methods 140
Object-Oriented Programming 143
Software Vulnerabilities, Testing, and Assurance 146
Databases 148
Summary of Exam Objectives 152
Top Five Toughest Questions 152
Chapter 9: Domain 9: Operations Security 156
Introduction 156
Administrative Security 156
Sensitive Information/Media Security 158
Continuity of Operations 159
Computer and network attacks 164
Summary of Exam Objectives 167
Top Five Toughest Questions 168
Chapter 10: Domain 10: Legal, Regulations, Investigations, and Compliance 170
Introduction 170
Major Legal Systems 170
Criminal, Civil, and Administrative Law 171
Information Security Aspects of Law 172
Legal Aspects of Investigations 174
Important Laws and Regulations 176
Ethics 179
Summary of Exam Objectives 181
Top Five Toughest Questions 181
Glossary 184
Index 192

Erscheint lt. Verlag 13.12.2010
Sprache englisch
Themenwelt Schulbuch / Wörterbuch Unterrichtsvorbereitung Unterrichts-Handreichungen
Informatik Netzwerke Sicherheit / Firewall
Informatik Weitere Themen Zertifizierung
Sozialwissenschaften Pädagogik
Wirtschaft Betriebswirtschaft / Management
ISBN-10 1-59749-567-0 / 1597495670
ISBN-13 978-1-59749-567-7 / 9781597495677
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 3,7 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

EPUBEPUB (Adobe DRM)
Größe: 2,8 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99