Читать книгу (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide - Mike Chapple - Страница 4

List of Illustrations

Оглавление

1 Chapter 1FIGURE 1.1 The CIA TriadFIGURE 1.2 The five elements of AAA servicesFIGURE 1.3 Strategic, tactical, and operational plan timeline comparisonFIGURE 1.4 An example of diagramming to reveal threat concernsFIGURE 1.5 A risk matrix or risk heat map

2 Chapter 2FIGURE 2.1 Ex-employees must return all company property.FIGURE 2.2 The cyclical relationships of risk elementsFIGURE 2.3 The six major elements of quantitative risk analysisFIGURE 2.4 The categories of security controls in a defense-in-depth impleme...FIGURE 2.5 The elements of the risk management framework (RMF) (from NIST SP...

3 Chapter 3FIGURE 3.1 Earthquake hazard map of the United States

4 Chapter 5FIGURE 5.1 Data classificationsFIGURE 5.2 Clearing a hard drive

5 Chapter 6FIGURE 6.1 Challenge-response authentication protocolFIGURE 6.2 The magic doorFIGURE 6.3 Symmetric key cryptographyFIGURE 6.4 Asymmetric key cryptography

6 Chapter 7FIGURE 7.1 Asymmetric key cryptographyFIGURE 7.2 Steganography toolFIGURE 7.3 Image with embedded message

7 Chapter 8FIGURE 8.1 Transitive trustFIGURE 8.2 The TCB, security perimeter, and reference monitorFIGURE 8.3 The take-grant model's directed graphFIGURE 8.4 The Bell–LaPadula modelFIGURE 8.5 The Biba modelFIGURE 8.6 Memorizing Bell–LaPadula and BibaFIGURE 8.7 The Clark–Wilson model

8 Chapter 9FIGURE 9.1 The four-layer protection ring modelFIGURE 9.2 The lifecycle of an executed processFIGURE 9.3 Types of hypervisorsFIGURE 9.4 Application containers versus a hypervisor

9 Chapter 10FIGURE 10.1 A smartcard's ISO 7816 interfaceFIGURE 10.2 Hot and cold aislesFIGURE 10.3 The fire triangleFIGURE 10.4 The four primary stages of fireFIGURE 10.5 A secure physical boundary with an access control vestibule and ...

10 Chapter 11FIGURE 11.1 The OSI modelFIGURE 11.2 OSI model encapsulationFIGURE 11.3 The OSI model peer layer logical channelsFIGURE 11.4 OSI model layer-based network container namesFIGURE 11.5 Comparing the OSI model with the TCP/IP modelFIGURE 11.6 The TCP three-way handshakeFIGURE 11.7 An RFID antennaFIGURE 11.8 The configuration dialog boxes for a transparent (left) vs. a no...FIGURE 11.9 A ring topologyFIGURE 11.10 A linear bus topology and a tree bus topologyFIGURE 11.11 A star topologyFIGURE 11.12 A mesh topology

11 Chapter 12FIGURE 12.1 IPsec's encryption of a packet in transport modeFIGURE 12.2 IPsec's encryption of a packet in tunnel modeFIGURE 12.3 Two LANs being connected using a tunnel-mode VPN across the inte...FIGURE 12.4 A client connecting to a network via a remote-access/tunnel VPN ...

12 Chapter 13FIGURE 13.1 Graph of FRR and FAR errors indicating the CER point

13 Chapter 14FIGURE 14.1 Role-Based Access ControlFIGURE 14.2 A representation of the boundaries provided by lattice-based acc...FIGURE 14.3 Wireshark capture

14 Chapter 15FIGURE 15.1 Nmap scan of a web server run from a Linux systemFIGURE 15.2 Default Apache server page running on the server scanned in Figu...FIGURE 15.3 Nmap scan of a large network run from a Mac system using the Ter...FIGURE 15.4 Network vulnerability scan of the same web server that was port ...FIGURE 15.5 Web application vulnerability scan of the same web server that w...FIGURE 15.6 Scanning a database-backed application with sqlmapFIGURE 15.7 Penetration testing processFIGURE 15.8 The Metasploit Framework automated system exploitation tool allo...FIGURE 15.9 Fagan inspections follow a rigid formal process, with defined en...FIGURE 15.10 Prefuzzing input file containing a series of 1sFIGURE 15.11 The input file from Figure 15.10 after being run through the zz...

15 Chapter 16FIGURE 16.1 Cloud shared responsibility modelFIGURE 16.2 Creating and deploying imagesFIGURE 16.3 Web server and database server

16 Chapter 17FIGURE 17.1 Incident managementFIGURE 17.2 SYN flood attackFIGURE 17.3 A man-in-the-middle attackFIGURE 17.4 Intrusion prevention systemFIGURE 17.5 Viewing a log entry

17 Chapter 18FIGURE 18.1 Seismic hazard mapFIGURE 18.2 Flood hazard map for Miami–Dade County, FloridaFIGURE 18.3 Failover cluster with network load balancing

18 Chapter 20FIGURE 20.1 RStudio Desktop IDEFIGURE 20.2 Security vs. user-friendliness vs. functionalityFIGURE 20.3 The iterative lifecycle model with feedback loopFIGURE 20.4 The spiral lifecycle modeFIGURE 20.5 Software Assurance Maturity ModelFIGURE 20.6 The IDEAL modelFIGURE 20.7 Gantt chartFIGURE 20.8 The DevOps modelFIGURE 20.9 Hierarchical data modelFIGURE 20.10 Customers table from a relational databaseFIGURE 20.11 ODBC as the interface between applications and a back-end datab...

19 Chapter 21FIGURE 21.1 Account number input pageFIGURE 21.2 Account information pageFIGURE 21.3 Account information page after blind SQL injectionFIGURE 21.4 Account creation pageFIGURE 21.5 Example web server directory structureFIGURE 21.6 Message board post rendered in a browserFIGURE 21.7 XSS attack rendered in a browserFIGURE 21.8 Web application firewallFIGURE 21.9 SQL error disclosure

(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide

Подняться наверх