Жанры
Авторы
Контакты
О сайте
Книжные новинки
Популярные книги
Найти
Главная
Авторы
Mike Chapple
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Читать книгу (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide - Mike Chapple - Страница 1
Оглавление
Предыдущая
Следующая
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
...
241
Оглавление
Купить и скачать книгу
Вернуться на страницу книги (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Оглавление
Страница 1
Table of Contents
List of Tables
List of Illustrations
Guide
Pages
(ISC)
2®
CISSP
®
Certified Information Systems Security Professional Official Study Guide
Страница 8
Страница 9
Acknowledgments
About the Authors
About the Technical Editors
Foreword
Introduction
(ISC)
2
Topical Domains
Prequalifications
Overview of the CISSP Exam
CISSP Exam Question Types
Advice on Taking the Exam
Study and Exam Preparation Tips
Completing the Certification Process
The Elements of This Study Guide
Interactive Online Learning Environment and TestBank
Study Guide Exam Objectives
Objective Map
Reader Support for This Book How to Contact the Publisher
Assessment Test
Answers to Assessment Test
Chapter 1 Security Governance Through Principles and Policies
Security 101
Understand and Apply Security Concepts
Confidentiality
Integrity
Availability
DAD, Overprotection, Authenticity, Non-repudiation, and AAA Services
Identification
Authentication
Authorization
Auditing
Accountability
Protection Mechanisms
Defense in Depth
Abstraction
Data Hiding
Encryption
Security Boundaries
Evaluate and Apply Security Governance Principles
Third-Party Governance
Documentation Review
Manage the Security Function
Alignment of Security Function to Business Strategy, Goals, Mission, and Objectives
Organizational Processes
Organizational Roles and Responsibilities
Security Control Frameworks
Due Diligence and Due Care
Security Policy, Standards, Procedures, and Guidelines
Security Policies
Acceptable Use Policy
Security Standards, Baselines, and Guidelines
Security Procedures
Threat Modeling
Identifying Threats
Be Alert for Individual Threats
Determining and Diagramming Potential Attacks
Performing Reduction Analysis
Prioritization and Response
Supply Chain Risk Management
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 2 Personnel Security and Risk Management Concepts
Personnel Security Policies and Procedures
Job Descriptions and Responsibilities
Candidate Screening and Hiring
Onboarding: Employment Agreements and Policies
Employee Oversight
Offboarding, Transfers, and Termination Processes
Firing: Timing Is Everything
Vendor, Consultant, and Contractor Agreements and Controls
Compliance Policy Requirements
Privacy Policy Requirements
Understand and Apply Risk Management Concepts
Risk Terminology and Concepts
Asset Valuation
Identify Threats and Vulnerabilities
The Consultant Cavalry
Risk Assessment/Analysis
Qualitative Risk Analysis
Scenarios
Delphi Technique
Quantitative Risk Analysis
Risk Responses
Legal and in Compliance
Cost vs. Benefit of Security Controls
Yikes, So Much Math!
Countermeasure Selection and Implementation
Administrative
Technical or Logical
Physical
Applicable Types of Controls
Preventive
Deterrent
Detective
Compensating
Corrective
Recovery
Directive
Security Control Assessment
Monitoring and Measurement
Risk Reporting and Documentation
Continuous Improvement
Risk Frameworks
Social Engineering
Social Engineering Principles
Authority
Intimidation
Consensus
Scarcity
Familiarity
Trust
Urgency
Eliciting Information
Prepending
Phishing
Spear Phishing
Whaling
Smishing
Vishing
Spam
Shoulder Surfing
Invoice Scams
Hoax
Impersonation and Masquerading
Tailgating and Piggybacking
Baiting
Dumpster Diving
Identity Fraud
Typo Squatting
Influence Campaigns
Hybrid Warfare
Social Media
Establish and Maintain a Security Awareness, Education, and Training Program
Awareness
Training
Education
Improvements
Effectiveness Evaluation
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 3 Business Continuity Planning
Planning for Business Continuity
Business Continuity Planning vs. Disaster Recovery Planning
Project Scope and Planning
Organizational Review
BCP Team Selection
Tips for Selecting an Effective BCP Team
Senior Management and BCP
Resource Requirements
Real World Scenario Explaining the Benefits of BCP
Legal and Regulatory Requirements
Business Impact Analysis
Identifying Priorities
Risk Identification
Business Impact Analysis and the Cloud
Likelihood Assessment
Impact Analysis
Resource Prioritization
Continuity Planning
Strategy Development
Provisions and Processes
People
Buildings and Facilities
Infrastructure
Plan Approval and Implementation
Plan Approval
Plan Implementation
Training and Education
BCP Documentation
Continuity Planning Goals
Statement of Importance
Statement of Priorities
Statement of Organizational Responsibility
Statement of Urgency and Timing
Risk Assessment
Risk Acceptance/Mitigation
Vital Records Program
Emergency Response Guidelines
Maintenance
Testing and Exercises
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 4 Laws, Regulations, and Compliance
Categories of Laws
Criminal Law
Real World Scenario Don't Underestimate Technology Crime Investigators
Civil Law
Administrative Law
Laws
Computer Crime
Computer Fraud and Abuse Act
CFAA Amendments
National Information Infrastructure Protection Act of 1996
Federal Sentencing Guidelines
Federal Information Security Management Act
Federal Cybersecurity Laws of 2014
Intellectual Property (IP)
Copyright and the Digital Millennium Copyright Act
Trademarks
Patents
Protecting Software
Design Patents
Trade Secrets
Economic Espionage Act of 1996
Licensing
Import/Export
Countries of Concern
Encryption Export Controls
Privacy
U.S. Privacy Law
Data Breach Notification Laws
Real World Scenario Privacy in the Workplace
European Union Privacy Law
European Union Data Protection Directive (DPD)
European Union General Data Protection Regulation
Cross-Border Information Sharing
Canadian Privacy Law
State Privacy Laws
Compliance
Real World Scenario Payment Card Industry Data Security Standard
Contracting and Procurement
Summary
Exam Essentials
Written Lab
Review Questions
{buyButton}
Подняться наверх