Читать книгу CISSP For Dummies - Peter H. Gregory - Страница 5

List of Illustrations

Оглавление

1 Chapter 2FIGURE 2-1: Make your own personal business cards.

2 Chapter 3FIGURE 3-1: The CIA triad. FIGURE 3-2: Attack tree for a mobile banking application.

3 Chapter 4FIGURE 4-1: Example document marking.

4 Chapter 5FIGURE 5-1: Attack tree for a mobile banking application. FIGURE 5-2: AWS shared responsibility matrix. FIGURE 5-3: Azure shared responsibility matrix. FIGURE 5-4: Protection rings provide layers of defense in a system. FIGURE 5-5: Encryption and decryption. FIGURE 5-6: Link encryption. FIGURE 5-7: Sending a message using asymmetric key cryptography. FIGURE 5-8: Verifying message authenticity using asymmetric key cryptography. FIGURE 5-9: Encrypting and signing a message using asymmetric key cryptography....FIGURE 5-10: Diffie-Hellman key exchange is used to generate a symmetric key fo...FIGURE 5-11: A fire needs these three elements to burn.

5 Chapter 6FIGURE 6-1: The seven layers of the OSI model. FIGURE 6-2: Data encapsulation in the OSI model. FIGURE 6-3: The TCP three-way handshake. FIGURE 6-4: The LLC and MAC sublayers. FIGURE 6-5: Comparing the OSI model and the TCP/IP Model.

6 Chapter 7FIGURE 7-1: Use CER to compare FAR and FRR. FIGURE 7-2: Typical identity and access management system architecture. FIGURE 7-3: Role-based access control. FIGURE 7-4: Kerberos: Login initiation (step 1). FIGURE 7-5: Kerberos: Client/TGS session key and TGT generation (step 2). FIGURE 7-6: Kerberos: Login completion (step 3). FIGURE 7-7: Kerberos: Requesting services (step 4). FIGURE 7-8: Kerberos: Client/Server session key and service ticket generation (...FIGURE 7-9: Kerberos: Decrypt Client/Server session key (step 6). FIGURE 7-10: Kerberos: Client/server communications (step 7).

7 Chapter 10FIGURE 10-1: The DevOps life cycle process. FIGURE 10-2: The concept of Shift Security Left. FIGURE 10-3: An example of software library attributions for a software applica...

CISSP For Dummies

Подняться наверх