Forewords |
|
xviii | |
Acknowledgments |
|
xxi | |
Introduction |
|
xxii | |
|
Chapter 1 Becoming a CISSP |
|
|
1 | (16) |
|
|
1 | (1) |
|
|
2 | (5) |
|
|
7 | (1) |
|
How Do You Become a CISSP? |
|
|
8 | (1) |
|
What Does This Book Cover? |
|
|
8 | (1) |
|
Tips for Taking the CISSP Exam |
|
|
9 | (2) |
|
|
11 | (6) |
|
|
11 | (4) |
|
|
15 | (2) |
|
Chapter 2 Security Trends |
|
|
17 | (28) |
|
How Security Became an Issue |
|
|
17 | (3) |
|
|
20 | (1) |
|
|
21 | (12) |
|
Evidence of the Evolution of Hacking |
|
|
22 | (3) |
|
How Are Nations Affected? |
|
|
25 | (2) |
|
How Are Companies Affected? |
|
|
27 | (2) |
|
The U.S. Government's Actions |
|
|
29 | (4) |
|
|
33 | (3) |
|
So What Does This Mean to Us? |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
37 | (2) |
|
|
39 | (3) |
|
|
40 | (1) |
|
|
41 | (1) |
|
Bringing the Layers Together |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
43 | (2) |
|
Chapter 3 Information Security and Risk Management |
|
|
45 | (108) |
|
|
45 | (3) |
|
Security Management Responsibilities |
|
|
46 | (1) |
|
The Top-Down Approach to Security |
|
|
47 | (1) |
|
Security Administration and Supporting Controls |
|
|
48 | (9) |
|
Fundamental Principles of Security |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
54 | (2) |
|
Security Through Obscurity |
|
|
56 | (1) |
|
Organizational Security Model |
|
|
57 | (16) |
|
Security Program Components |
|
|
59 | (14) |
|
Information Risk Management |
|
|
73 | (3) |
|
Who Really Understands Risk Management? |
|
|
73 | (1) |
|
Information Risk Management Policy |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
76 | (26) |
|
|
77 | (1) |
|
The Value of Information and Assets |
|
|
78 | (1) |
|
Costs That Make Up the Value |
|
|
79 | (1) |
|
|
80 | (3) |
|
Failure and Fault Analysis |
|
|
83 | (3) |
|
Quantitative Risk Analysis |
|
|
86 | (5) |
|
Qualitative Risk Analysis |
|
|
91 | (3) |
|
Quantitative vs. Qualitative |
|
|
94 | (1) |
|
|
95 | (4) |
|
|
99 | (1) |
|
Total Risk vs. Residual Risk |
|
|
100 | (1) |
|
|
101 | (1) |
|
Policies, Standards, Baselines, Guidelines, and Procedures |
|
|
102 | (9) |
|
|
103 | (3) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
109 | (2) |
|
Information Classification |
|
|
111 | (6) |
|
Private Business vs. Military Classifications |
|
|
112 | (3) |
|
|
115 | (2) |
|
|
117 | (17) |
|
|
117 | (8) |
|
|
125 | (1) |
|
|
125 | (1) |
|
|
126 | (1) |
|
The Security Administrator |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
127 | (1) |
|
The Change Control Analyst |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
131 | (2) |
|
|
133 | (1) |
|
|
133 | (1) |
|
Security-Awareness Training |
|
|
134 | (4) |
|
Different Types of Security-Awareness Training |
|
|
135 | (1) |
|
|
136 | (1) |
|
Specialized Security Training |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
139 | (14) |
|
|
142 | (6) |
|
|
148 | (5) |
|
|
153 | (128) |
|
|
153 | (1) |
|
|
154 | (2) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
Identification, Authentication, Authorization, and Accountability |
|
|
156 | (54) |
|
Identification and Authentication |
|
|
158 | (11) |
|
|
169 | (25) |
|
|
194 | (16) |
|
|
210 | (6) |
|
Discretionary Access Control |
|
|
210 | (1) |
|
|
211 | (2) |
|
Role-Based Access Control |
|
|
213 | (3) |
|
Access Control Techniques and Technologies |
|
|
216 | (5) |
|
Rule-Based Access Control |
|
|
216 | (2) |
|
Constrained User Interfaces |
|
|
218 | (1) |
|
|
218 | (2) |
|
Content-Dependent Access Control |
|
|
220 | (1) |
|
Context-Dependent Access Control |
|
|
220 | (1) |
|
Access Control Administration |
|
|
221 | (8) |
|
Centralized Access Control Administration |
|
|
222 | (7) |
|
Decentralized Access Control Administration |
|
|
229 | (1) |
|
|
229 | (7) |
|
|
230 | (1) |
|
|
230 | (2) |
|
|
232 | (1) |
|
|
233 | (3) |
|
|
236 | (6) |
|
Preventive: Administrative |
|
|
238 | (1) |
|
|
238 | (1) |
|
|
239 | (3) |
|
|
242 | (6) |
|
Review of Audit Information |
|
|
244 | (1) |
|
|
244 | (1) |
|
Protecting Audit Data and Log Information |
|
|
245 | (3) |
|
Access Control Monitoring |
|
|
248 | (12) |
|
|
249 | (9) |
|
Intrusion Prevention Systems |
|
|
258 | (2) |
|
A few Threats to Access Control |
|
|
260 | (6) |
|
|
261 | (1) |
|
|
262 | (1) |
|
|
262 | (4) |
|
|
266 | (1) |
|
|
266 | (15) |
|
|
269 | (7) |
|
|
276 | (5) |
|
Chapter 5 Security Architecture and Design |
|
|
281 | (120) |
|
|
283 | (1) |
|
The Central Processing Unit |
|
|
283 | (41) |
|
|
288 | (1) |
|
Operating System Architecture |
|
|
289 | (7) |
|
|
296 | (1) |
|
|
297 | (3) |
|
|
300 | (8) |
|
|
308 | (1) |
|
CPU Modes and Protection Rings |
|
|
309 | (3) |
|
Operating System Architecture |
|
|
312 | (1) |
|
|
313 | (1) |
|
|
314 | (2) |
|
The Evolution of Terminology |
|
|
316 | (2) |
|
|
318 | (2) |
|
Additional Storage Devices |
|
|
320 | (1) |
|
Input/Output Device Management |
|
|
320 | (4) |
|
|
324 | (8) |
|
Defined Subsets of Subjects and Objects |
|
|
325 | (1) |
|
|
326 | (3) |
|
|
329 | (1) |
|
Reference Monitor and Security Kernel |
|
|
330 | (1) |
|
|
331 | (1) |
|
|
332 | (1) |
|
|
332 | (21) |
|
|
334 | (2) |
|
|
336 | (2) |
|
|
338 | (3) |
|
|
341 | (3) |
|
The Information Flow Model |
|
|
344 | (3) |
|
The Noninterference Model |
|
|
347 | (1) |
|
|
348 | (2) |
|
The Brewer and Nash Model |
|
|
350 | (1) |
|
|
351 | (1) |
|
The Harrison-Ruzzo-Ullman Model |
|
|
351 | (2) |
|
Security Modes of Operation |
|
|
353 | (4) |
|
|
353 | (1) |
|
System High-Security Mode |
|
|
353 | (1) |
|
Compartmented Security Mode |
|
|
354 | (1) |
|
|
354 | (2) |
|
|
356 | (1) |
|
Systems Evaluation Methods |
|
|
357 | (5) |
|
Why Put a Product Through Evaluation? |
|
|
357 | (1) |
|
|
358 | (4) |
|
The Orange Book and the Rainbow Series |
|
|
362 | (1) |
|
|
363 | (1) |
|
Information Technology Security Evaluation Criteria |
|
|
364 | (3) |
|
|
367 | (3) |
|
Certification vs. Accreditation |
|
|
370 | (2) |
|
|
371 | (1) |
|
|
371 | (1) |
|
|
372 | (1) |
|
|
372 | (1) |
|
|
373 | (1) |
|
|
373 | (9) |
|
|
382 | (6) |
|
|
382 | (1) |
|
Time-of-Check/Time-of-Use Attacks |
|
|
383 | (1) |
|
|
384 | (4) |
|
|
388 | (1) |
|
|
389 | (12) |
|
|
392 | (5) |
|
|
397 | (4) |
|
Chapter 6 Physical and Environmental Security |
|
|
401 | (82) |
|
Introduction to Physical Security |
|
|
401 | (3) |
|
|
404 | (24) |
|
Crime Prevention Through Environmental Design |
|
|
408 | (5) |
|
Designing a Physical Security Program |
|
|
413 | (15) |
|
|
428 | (1) |
|
|
429 | (17) |
|
|
430 | (4) |
|
|
434 | (3) |
|
|
437 | (1) |
|
Fire Prevention, Detection, and Suppression |
|
|
438 | (8) |
|
|
446 | (24) |
|
|
447 | (7) |
|
Personnel Access Controls |
|
|
454 | (1) |
|
External Boundary Protection Mechanisms |
|
|
455 | (9) |
|
Intrusion Detection Systems |
|
|
464 | (4) |
|
|
468 | (1) |
|
|
468 | (1) |
|
|
469 | (1) |
|
|
469 | (1) |
|
|
470 | (1) |
|
|
471 | (12) |
|
|
473 | (5) |
|
|
478 | (5) |
|
Chapter 7 Telecommunications and Network Security |
|
|
483 | (182) |
|
Open Systems Interconnection Reference Model |
|
|
485 | (14) |
|
|
485 | (4) |
|
|
489 | (1) |
|
|
489 | (2) |
|
|
491 | (1) |
|
|
492 | (1) |
|
|
493 | (1) |
|
|
494 | (2) |
|
|
496 | (1) |
|
Functions and Protocols in the OSI Model |
|
|
496 | (2) |
|
Tying the Layers Together |
|
|
498 | (1) |
|
|
499 | (11) |
|
|
500 | (6) |
|
|
506 | (2) |
|
|
508 | (2) |
|
|
510 | (3) |
|
|
510 | (1) |
|
Asynchronous and Synchronous |
|
|
511 | (1) |
|
|
512 | (1) |
|
|
513 | (25) |
|
|
513 | (3) |
|
LAN Media Access Technologies |
|
|
516 | (6) |
|
|
522 | (6) |
|
|
528 | (1) |
|
Media Access Technologies |
|
|
529 | (4) |
|
|
533 | (5) |
|
|
538 | (3) |
|
|
541 | (32) |
|
|
541 | (1) |
|
|
542 | (2) |
|
|
544 | (2) |
|
|
546 | (4) |
|
|
550 | (2) |
|
|
552 | (1) |
|
|
553 | (19) |
|
|
572 | (1) |
|
Network Segregation and Isolation |
|
|
572 | (1) |
|
Networking Services and Protocols |
|
|
573 | (9) |
|
|
573 | (5) |
|
|
578 | (2) |
|
Lightweight Directory Access Protocol |
|
|
580 | (1) |
|
Network Address Translation |
|
|
580 | (2) |
|
|
582 | (3) |
|
Metropolitan Area Networks |
|
|
585 | (1) |
|
|
586 | (24) |
|
Telecommunications Evolution |
|
|
587 | (2) |
|
|
589 | (3) |
|
|
592 | (18) |
|
|
610 | (14) |
|
|
610 | (1) |
|
|
611 | (2) |
|
|
613 | (1) |
|
|
613 | (2) |
|
|
615 | (6) |
|
|
621 | (2) |
|
|
623 | (1) |
|
|
624 | (25) |
|
|
625 | (2) |
|
|
627 | (3) |
|
|
630 | (11) |
|
|
641 | (1) |
|
|
642 | (1) |
|
|
643 | (1) |
|
|
644 | (2) |
|
|
646 | (3) |
|
|
649 | (3) |
|
|
650 | (1) |
|
|
651 | (1) |
|
|
652 | (1) |
|
|
652 | (13) |
|
|
656 | (4) |
|
|
660 | (5) |
|
|
665 | (112) |
|
The History of Cryptography |
|
|
666 | (5) |
|
Cryptography Definitions and Concepts |
|
|
671 | (12) |
|
|
672 | (2) |
|
The Strength of the Cryptosystem |
|
|
674 | (1) |
|
Services of Cryptosystems |
|
|
675 | (2) |
|
|
677 | (2) |
|
Running and Concealment Ciphers |
|
|
679 | (1) |
|
|
680 | (3) |
|
|
683 | (3) |
|
|
683 | (1) |
|
|
684 | (2) |
|
|
686 | (16) |
|
Symmetric vs. Asymmetric Algorithms |
|
|
686 | (1) |
|
|
686 | (5) |
|
|
691 | (5) |
|
Hybrid Encryption Methods |
|
|
696 | (6) |
|
Types of Symmetric Systems |
|
|
702 | (11) |
|
|
703 | (7) |
|
|
710 | (1) |
|
The Advanced Encryption Standard |
|
|
711 | (1) |
|
International Data Encryption Algorithm |
|
|
711 | (1) |
|
|
712 | (1) |
|
|
712 | (1) |
|
|
712 | (1) |
|
|
712 | (1) |
|
Types of Asymmetric Systems |
|
|
713 | (8) |
|
The Diffie-Hellman Algorithm |
|
|
713 | (3) |
|
|
716 | (3) |
|
|
719 | (1) |
|
Elliptic Curve Cryptosystems |
|
|
719 | (1) |
|
|
720 | (1) |
|
|
720 | (1) |
|
|
720 | (1) |
|
|
721 | (12) |
|
|
721 | (5) |
|
Various Hashing Algorithms |
|
|
726 | (1) |
|
|
727 | (1) |
|
|
727 | (1) |
|
|
727 | (2) |
|
Attacks Against One-Way Hash Functions |
|
|
729 | (1) |
|
|
730 | (3) |
|
Digital Signature Standard |
|
|
733 | (1) |
|
Public Key Infrastructure |
|
|
733 | (7) |
|
|
734 | (3) |
|
|
737 | (1) |
|
The Registration Authority |
|
|
737 | (1) |
|
|
738 | (2) |
|
|
740 | (2) |
|
Key Management Principles |
|
|
741 | (1) |
|
Rules for Keys and Key Management |
|
|
742 | (1) |
|
Link Encryption vs. End-to-End Encryption |
|
|
742 | (3) |
|
|
745 | (5) |
|
Multipurpose Internet Mail Extension |
|
|
745 | (1) |
|
|
746 | (1) |
|
Message Security Protocol |
|
|
747 | (1) |
|
|
747 | (1) |
|
|
748 | (2) |
|
|
750 | (11) |
|
|
750 | (11) |
|
|
761 | (4) |
|
|
761 | (1) |
|
|
761 | (1) |
|
|
761 | (1) |
|
Chosen-Ciphertext Attacks |
|
|
762 | (1) |
|
Differential Cryptanalysis |
|
|
762 | (1) |
|
|
763 | (1) |
|
|
763 | (1) |
|
|
764 | (1) |
|
|
764 | (1) |
|
|
764 | (1) |
|
|
764 | (1) |
|
|
765 | (1) |
|
|
765 | (12) |
|
|
769 | (4) |
|
|
773 | (4) |
|
Chapter 9 Business Continuity and Disaster Recovery |
|
|
777 | (68) |
|
Business Continuity and Disaster Recovery |
|
|
778 | (7) |
|
Business Continuity Steps |
|
|
780 | (1) |
|
Making BCP Part of the Security Policy and Program |
|
|
781 | (2) |
|
|
783 | (2) |
|
Business Continuity Planning Requirements |
|
|
785 | (47) |
|
|
786 | (7) |
|
|
793 | (1) |
|
|
794 | (2) |
|
Business Process Recovery |
|
|
796 | (1) |
|
|
797 | (6) |
|
Supply and Technology Recovery |
|
|
803 | (5) |
|
|
808 | (1) |
|
|
809 | (3) |
|
Electronic Backup Solutions |
|
|
812 | (2) |
|
Choosing a Software Backup Facility |
|
|
814 | (2) |
|
|
816 | (1) |
|
|
817 | (4) |
|
Developing Goals for the Plans |
|
|
821 | (2) |
|
|
823 | (1) |
|
Testing and Revising the Plan |
|
|
824 | (5) |
|
|
829 | (3) |
|
|
832 | (1) |
|
|
832 | (13) |
|
|
834 | (6) |
|
|
840 | (5) |
|
Chapter 10 Legal, Regulations, Compliance, and Investigations |
|
|
845 | (76) |
|
The Many Facets of Cyberlaw |
|
|
846 | (1) |
|
The Crux of Computer Crime Laws |
|
|
847 | (2) |
|
Complexities in Cybercrime |
|
|
849 | (11) |
|
|
851 | (1) |
|
|
851 | (3) |
|
|
854 | (2) |
|
|
856 | (4) |
|
Intellectual Property Laws |
|
|
860 | (5) |
|
|
861 | (1) |
|
|
861 | (1) |
|
|
862 | (1) |
|
|
862 | (1) |
|
Internal Protection of Intellectual Property |
|
|
863 | (1) |
|
|
863 | (2) |
|
|
865 | (9) |
|
Laws, Directives, and Regulations |
|
|
866 | (8) |
|
Liability and Its Ramifications |
|
|
874 | (5) |
|
|
877 | (1) |
|
|
878 | (1) |
|
|
879 | (27) |
|
|
879 | (4) |
|
Incident Response Procedures |
|
|
883 | (4) |
|
Computer Forensics and Proper Collection of Evidence |
|
|
887 | (1) |
|
International Organization on Computer Evidence |
|
|
888 | (1) |
|
Motive, Opportunity, and Means |
|
|
889 | (1) |
|
Computer Criminal Behavior |
|
|
890 | (1) |
|
|
890 | (2) |
|
The Forensics Investigation Process |
|
|
892 | (6) |
|
What Is Admissible in Court? |
|
|
898 | (3) |
|
Surveillance, Search, and Seizure |
|
|
901 | (1) |
|
Interviewing and Interrogating |
|
|
902 | (1) |
|
A Few Different Attack Types |
|
|
903 | (3) |
|
|
906 | (4) |
|
The Computer Ethics Institute |
|
|
907 | (1) |
|
The Internet Architecture Board |
|
|
908 | (1) |
|
Corporate Ethics Programs |
|
|
909 | (1) |
|
|
910 | (1) |
|
|
910 | (11) |
|
|
913 | (5) |
|
|
918 | (3) |
|
Chapter 11 Application Security |
|
|
921 | (128) |
|
|
921 | (1) |
|
Where Do We Place the Security? |
|
|
922 | (2) |
|
Different Environments Demand Different Security |
|
|
924 | (1) |
|
Environment vs. Application |
|
|
924 | (1) |
|
Complexity of Functionality |
|
|
925 | (1) |
|
Data Types, Format, and Length |
|
|
926 | (1) |
|
Implementation and Default Issues |
|
|
926 | (2) |
|
|
928 | (1) |
|
|
928 | (23) |
|
Database Management Software |
|
|
929 | (1) |
|
|
930 | (5) |
|
Database Programming Interfaces |
|
|
935 | (1) |
|
Relational Database Components |
|
|
936 | (4) |
|
|
940 | (2) |
|
|
942 | (6) |
|
Data Warehousing and Data Mining |
|
|
948 | (3) |
|
|
951 | (25) |
|
Management of Development |
|
|
951 | (1) |
|
|
952 | (16) |
|
Software Development Methods |
|
|
968 | (1) |
|
Computer-Aided Software Engineering |
|
|
969 | (1) |
|
|
970 | (1) |
|
Secure Design Methodology |
|
|
970 | (1) |
|
Secure Development Methodology |
|
|
971 | (1) |
|
|
972 | (1) |
|
|
972 | (2) |
|
The Capability Maturity Model |
|
|
974 | (2) |
|
|
976 | (1) |
|
Application Development Methodology |
|
|
976 | (2) |
|
|
978 | (11) |
|
|
984 | (2) |
|
|
986 | (1) |
|
|
986 | (1) |
|
|
987 | (1) |
|
|
987 | (2) |
|
|
989 | (6) |
|
|
989 | (2) |
|
|
991 | (2) |
|
|
993 | (1) |
|
Object Linking and Embedding |
|
|
993 | (1) |
|
Distributed Computing Environment |
|
|
994 | (1) |
|
Expert Systems and Knowledge-Based Systems |
|
|
995 | (3) |
|
Artificial Neural Networks |
|
|
998 | (2) |
|
|
1000 | (27) |
|
|
1000 | (1) |
|
|
1001 | (1) |
|
|
1001 | (1) |
|
Theft of Transaction Information |
|
|
1001 | (1) |
|
Theft of Intellectual Property |
|
|
1001 | (1) |
|
Denial-of-Service (DoS) Attacks |
|
|
1001 | (1) |
|
Create a Quality Assurance Process |
|
|
1002 | (1) |
|
Web Application Firewalls |
|
|
1002 | (1) |
|
Intrusion Prevention Systems |
|
|
1002 | (1) |
|
Implement SYN Proxies on the Firewall |
|
|
1003 | (1) |
|
Specific Threats for Web Environments |
|
|
1003 | (10) |
Mobile Code |
|
1013 | (132) |
|
|
1013 | (2) |
|
|
1015 | (1) |
|
Malicious Software (Malware) |
|
|
1016 | (6) |
|
|
1022 | (3) |
|
|
1025 | (1) |
|
|
1026 | (1) |
|
|
1027 | (8) |
|
|
1028 | (1) |
|
|
1028 | (1) |
|
|
1028 | (1) |
|
Step 4 Mitigation ("Rollback") |
|
|
1029 | (1) |
|
Step 5 Deployment ("Rollout") |
|
|
1029 | (1) |
|
Step 6 Validation, Reporting, and Logging |
|
|
1029 | (1) |
|
|
1030 | (1) |
|
|
1030 | (1) |
|
|
1030 | (1) |
|
|
1031 | (4) |
|
|
1035 | (1) |
|
|
1036 | (13) |
|
|
1040 | (4) |
|
|
1044 | (5) |
|
Chapter 12 Operations Security |
|
|
1049 | (84) |
|
The Role of the Operations Department |
|
|
1050 | (1) |
|
Administrative Management |
|
|
1051 | (5) |
|
Security and Network Personnel |
|
|
1053 | (2) |
|
|
1055 | (1) |
|
|
1055 | (1) |
|
|
1056 | (1) |
|
Operational Responsibilities |
|
|
1056 | (11) |
|
Unusual or Unexplained Occurrences |
|
|
1057 | (1) |
|
Deviations from Standards |
|
|
1057 | (1) |
|
Unscheduled Initial Program Loads (a.k.a. Rebooting) |
|
|
1058 | (1) |
|
Asset Identification and Management |
|
|
1058 | (1) |
|
|
1059 | (1) |
|
|
1060 | (2) |
|
Input and Output Controls |
|
|
1062 | (1) |
|
|
1063 | (3) |
|
|
1066 | (1) |
|
|
1067 | (3) |
|
|
1067 | (2) |
|
Change Control Documentation |
|
|
1069 | (1) |
|
|
1070 | (7) |
|
|
1077 | (2) |
|
Network and Resource Availability |
|
|
1079 | (14) |
|
Mean Time Between Failures (MTBF) |
|
|
1080 | (1) |
|
Mean Time to Repair (MTTR) |
|
|
1080 | (1) |
|
|
1081 | (8) |
|
|
1089 | (3) |
|
|
1092 | (1) |
|
|
1093 | (2) |
|
|
1095 | (15) |
|
|
1096 | (3) |
|
|
1099 | (2) |
|
|
1101 | (9) |
|
|
1110 | (12) |
|
|
1113 | (4) |
|
|
1117 | (1) |
|
Other Vulnerability Types |
|
|
1118 | (2) |
|
|
1120 | (2) |
|
|
1122 | (1) |
|
|
1122 | (11) |
|
|
1124 | (6) |
|
|
1130 | (3) |
|
Appendix A Security Content Automation Protocol Overview |
|
|
1133 | (8) |
|
|
1133 | (1) |
|
SCAP---More Than Just a Protocol |
|
|
1134 | (1) |
|
A Vulnerability Management Problem |
|
|
1134 | (2) |
|
A Vulnerability Management Solution---SCAP and SCAP Specifications |
|
|
1136 | (2) |
|
SCAP Product Validation Program |
|
|
1138 | (1) |
|
The Future of Security Automation |
|
|
1139 | (1) |
|
|
1139 | (2) |
|
Appendix B About the CD-ROM |
|
|
1141 | (4) |
|
Running the QuickTime Cryptography Video Sample |
|
|
1142 | (1) |
|
|
1143 | (1) |
|
Installing Total Seminars' Test Software |
|
|
1143 | (1) |
|
|
1143 | (1) |
|
|
1143 | (1) |
|
|
1143 | (1) |
|
Minimum System Requirements for Total Seminars' Software |
|
|
1144 | (1) |
|
|
1144 | (1) |
Glossary |
|
1145 | (16) |
Index |
|
1161 | |
Preface |
|
viii | |
Introduction |
|
x | |
|
Chapter 1 Information Security and Risk Management |
|
|
1 | (36) |
|
|
2 | (8) |
|
|
10 | (1) |
|
|
11 | (26) |
|
|
37 | (40) |
|
|
38 | (8) |
|
|
46 | (1) |
|
|
47 | (30) |
|
Chapter 3 Security Architecture and Design |
|
|
77 | (42) |
|
|
78 | (8) |
|
|
86 | (1) |
|
|
87 | (32) |
|
Chapter 4 Physical and Environmental Security |
|
|
119 | (36) |
|
|
120 | (7) |
|
|
127 | (1) |
|
|
128 | (27) |
|
Chapter 5 Telecommunications and Networking Security |
|
|
155 | (38) |
|
|
156 | (7) |
|
|
163 | (1) |
|
|
164 | (29) |
|
|
193 | (38) |
|
|
194 | (9) |
|
|
203 | (1) |
|
|
204 | (27) |
|
Chapter 7 Business Continuity and Disaster Recovery |
|
|
231 | (38) |
|
|
232 | (8) |
|
|
240 | (1) |
|
|
241 | (28) |
|
Chapter 8 Legal, Regulations, Compliance, and Investigations |
|
|
269 | (34) |
|
|
270 | (5) |
|
|
275 | (1) |
|
|
276 | (27) |
|
Chapter 9 Application Security |
|
|
303 | (38) |
|
|
304 | (8) |
|
|
312 | (1) |
|
|
313 | (28) |
|
Chapter 10 Operations Security |
|
|
341 | (34) |
|
|
342 | (8) |
|
|
350 | (1) |
|
|
351 | (24) |
Appendix About the Free Online Practice Exams and MP3s |
|
375 | (1) |
Free Online Practice Exam and MP3 Instructions |
|
375 | (1) |
Technical Support |
|
376 | (1) |
Index |
|
377 | |