Atnaujinkite slapukų nuostatas

CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide 7th edition [Minkštas viršelis]

4.14/5 (297 ratings by Goodreads)
, (University of Notre Dame),
  • Formatas: Paperback / softback, 1080 pages, aukštis x plotis x storis: 234x188x56 mm, weight: 1383 g
  • Išleidimo metai: 23-Oct-2015
  • Leidėjas: Sybex Inc.,U.S.
  • ISBN-10: 1119042712
  • ISBN-13: 9781119042716
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 1080 pages, aukštis x plotis x storis: 234x188x56 mm, weight: 1383 g
  • Išleidimo metai: 23-Oct-2015
  • Leidėjas: Sybex Inc.,U.S.
  • ISBN-10: 1119042712
  • ISBN-13: 9781119042716
Kitos knygos pagal šią temą:
"This comprehensive book will guide readers through CISSP exam topics, including: Access Control Application Development Security Business Continuity and Disaster Recovery Planning Cryptography Information Security Governance and Risk Management Legal, Regulations, Investigations and Compliance Operations Security Physical (Environmental) Security Security Architecture and Design Telecommunications and Network Security This study guide will be complete with 100% coverage of the exam objectives, real world scenarios, hands-on exercises, and challenging review questions, both in the book and on the CD"--

Fully updated Study Guide for the CISSP

CISSP Certified Information Systems Security Professional Study Guide, 7th Edition has completely been updated for the latest 2015 CISSP Body of Knowledge. This Sybex Study Guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions.

Along with the book, you also get access to Sybex's superior online interactive learning environment that includes:

  • 250 question practice exam to help you identify where you need to study more. Get more than 90 percent of the answers correct, and you're ready to take the certification exam.
  • More than 100 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam
  • A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam

Coverage of all of the exam topics in the book means you'll be ready for:

  • Access Control
  • Application Development Security
  • Business Continuity and Disaster Recovery Planning
  • Cryptography
  • Information Security Governance and Risk Management
  • Legal, Regulations, Investigations and Compliance
  • Operations Security
  • Physical (Environmental) Security
  • Security Architecture and Design
  • Telecommunications and Network Security
Introduction xxxiii

Assessment Test xlii

Chapter 1 Security Governance Through Principles and Policies 1

Understand and Apply Concepts of Confidentiality, Integrity, and
Availability 3

Apply Security Governance Principles 13

Develop and Implement Documented Security Policy, Standards, Procedures, and
Guidelines 25

Understand and Apply Threat Modeling 28

Integrate Security Risk Considerations into Acquisition Strategy and
Practice 35

Summary 36

Exam Essentials 38

Written Lab 41

Review Questions 42

Chapter 2 Personnel Security and Risk Management Concepts 47

Contribute to Personnel Security Policies 49

Security Governance 59

Understand and Apply Risk Management Concepts 60

Establish and Manage Information Security Education, Training, and Awareness
81

Manage the Security Function 82

Summary 83

Exam Essentials 84

Written Lab 88

Review Questions 89

Chapter 3 Business Continuity Planning 93

Planning for Business Continuity 94

Project Scope and Planning 95

Business Impact Assessment 101

Continuity Planning 107

Plan Approval and Implementation 109

Summary 114

Exam Essentials 115

Written Lab 117

Review Questions 118

Chapter 4 Laws, Regulations, and Compliance 123

Categories of Laws 124

Laws 127

Compliance 146

Contracting and Procurement 147

Summary 148

Exam Essentials 149

Written Lab 151

Review Questions 152

Chapter 5 Protecting Security of Assets 157

Classifying and Labeling Assets 158

Identifying Data Roles 174

Protecting Privacy 178

Summary 181

Exam Essentials 182

Written Lab 183

Review Questions 184

Chapter 6 Cryptography and Symmetric Key Algorithms 189

Historical Milestones in Cryptography 190

Cryptographic Basics 192

Modern Cryptography 208

Symmetric Cryptography 214

Cryptographic Life Cycle 222

Summary 222

Exam Essentials 223

Written Lab 225

Review Questions 226

Chapter 7 PKI and Cryptographic Applications 231

Asymmetric Cryptography 232

Hash Functions 236

Digital Signatures 240

Public Key Infrastructure 242

Asymmetric Key Management 246

Applied Cryptography 247

Cryptographic Attacks 258

Summary 261

Exam Essentials 261

Written Lab 264

Review Questions 265

Chapter 8 Principles of Security Models, Design, and Capabilities 269

Implement and Manage Engineering Processes Using Secure Design Principles
270

Understand the Fundamental Concepts of Security Models 275

Select Controls and Countermeasures Based on Systems Security Evaluation
Models 289

Understand Security Capabilities of Information Systems 303

Summary 305

Exam Essentials 305

Written Lab 307

Review Questions 308

Chapter 9 Security Vulnerabilities, Threats, and Countermeasures 313

Assess and Mitigate Security Vulnerabilities 314

Client-Based 337

Server Based 341

Database Security 341

Distributed Systems 344

Industrial Control Systems 348

Assess and Mitigate Vulnerabilities in Web-Based Systems 349

Assess and Mitigate Vulnerabilities in Mobile Systems 350

Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical
Systems 360

Essential Security Protection Mechanisms 364

Common Architecture Flaws and Security Issues 369

Summary 375

Exam Essentials 376

Written Lab 379

Review Questions 380

Chapter 10 Physical Security Requirements 385

Apply Secure Principles to Site and Facility Design 386

Design and Implement Physical Security 389

Implement and Manage Physical Security 407

Summary 415

Exam Essentials 416

Written Lab 420

Review Questions 421

Chapter 11 Secure Network Architecture and Securing Network Components 425

OSI Model 426

TCP/IP Model 437

Converged Protocols 452

Wireless Networks 454

General Wi-Fi Security Procedure 462

Cabling, Wireless, Topology, and Communications Technology 473

Summary 490

Exam Essentials 490

Written Lab 494

Review Questions 495

Chapter 12 Secure Communications and Network Attacks 499

Network and Protocol Security Mechanisms 500

Secure Voice Communications 503

Multimedia Collaboration 507

Manage Email Security 508

Remote Access Security Management 513

Virtual Private Network 517

Virtualization 523

Network Address Translation 525

Switching Technologies 530

WAN Technologies 532

Miscellaneous Security Control Characteristics 537

Security Boundaries 539

Prevent or Mitigate Network Attacks 539

Summary 545

Exam Essentials 546

Written Lab 549

Review Questions 550

Chapter 13 Managing Identity and Authentication 555

Controlling Access to Assets 556

Comparing Identification and Authentication 560

Implementing Identity Management 573

Managing the Identity and Access Provisioning Life Cycle 582

Summary 585

Exam Essentials 586

Written Lab 588

Review Questions 589

Chapter 14 Controlling and Monitoring Access 593

Comparing Access Control Models 594

Understanding Access Control Attacks 604

Summary 621

Exam Essentials 622

Written Lab 624

Review Questions 625

Chapter 15 Security Assessment and Testing 629

Building a Security Assessment and Testing Program 630

Performing Vulnerability Assessments 634

Testing Your Software 643

Implementing Security Management Processes 649

Summary 650

Exam Essentials 651

Written Lab 653

Review Questions 654

Chapter 16 Managing Security Operations 659

Applying Security Operations Concepts 661

Provisioning and Managing Resources 670

Managing Configuration 678

Managing Change 680

Managing Patches and Reducing Vulnerabilities 684

Summary 688

Exam Essentials 689

Written Lab 691

Review Questions 692

Chapter 17 Preventing and Responding to Incidents 697

Managing Incident Response 698

Implementing Preventive Measures 704

Logging, Monitoring, and Auditing 731

Summary 748

Exam Essentials 750

Written Lab 754

Review Questions 755

Chapter 18 Disaster Recovery Planning 759

The Nature of Disaster 760

Understand System Resilience and Fault Tolerance 770

Recovery Strategy 775

Recovery Plan Development 784

Training, Awareness, and Documentation 792

Testing and Maintenance 793

Summary 795

Exam Essentials 795

Written Lab 797

Review Questions 798

Chapter 19 Incidents and Ethics 803

Investigations 804

Major Categories of Computer Crime 812

Incident Handling 817

Ethics 826

Summary 829

Exam Essentials 830

Written Lab 832

Review Questions 833

Chapter 20 Software Development Security 837

Introducing Systems Development Controls 838

Establishing Databases and Data Warehousing 860

Storing Data and Information 869

Understanding Knowledge-based Systems 870

Summary 873

Exam Essentials 874

Written Lab 875

Review Questions 876

Chapter 21 Malicious Code and Application Attacks 881

Malicious Code 882

Password Attacks 895

Application Attacks 899

Web Application Security 901

Reconnaissance Attacks 905

Masquerading Attacks 907

Summary 908

Exam Essentials 909

Written Lab 910

Review Questions 911

Appendix A Answers to Review Questions 915

Chapter 1: Security Governance Through Principles and Policies 916

Chapter 2: Personnel Security and Risk Management Concepts 917

Chapter 3: Business Continuity Planning 918

Chapter 4: Laws, Regulations, and Compliance 920

Chapter 5: Protecting Security of Assets 922

Chapter 6: Cryptography and Symmetric Key Algorithms 924

Chapter 7: PKI and Cryptographic Applications 926

Chapter 8: Principles of Security Models, Design, and Capabilities 927

Chapter 9: Security Vulnerabilities, Threats, and Countermeasures 929

Chapter 10: Physical Security Requirements 931

Chapter 11: Secure Network Architecture and Securing Network Components 932

Chapter 12: Secure Communications and Network Attacks 933

Chapter 13: Managing Identity and Authentication 935

Chapter 14: Controlling and Monitoring Access 937

Chapter 15: Security Assessment and Testing 939

Chapter 16: Managing Security Operations 940

Chapter 17: Preventing and Responding to Incidents 943

Chapter 18: Disaster Recovery Planning 946

Chapter 19: Incidents and Ethics 948

Chapter 20: Software Development Security 949

Chapter 21: Malicious Code and Application Attacks 950

Appendix B Answers to Written Labs 953

Chapter 1: Security Governance Through Principles and Policies 954

Chapter 2: Personnel Security and Risk Management Concepts 954

Chapter 3: Business Continuity Planning 955

Chapter 4: Laws, Regulations, and Compliance 956

Chapter 5: Protecting Security of Assets 956

Chapter 6: Cryptography and Symmetric Key Algorithms 957

Chapter 7: PKI and Cryptographic Applications 958

Chapter 8: Principles of Security Models, Design, and Capabilities 958

Chapter 9: Security Vulnerabilities, Threats, and Countermeasures 959

Chapter 10: Physical Security Requirements 959

Chapter 11: Secure Network Architecture and Securing Network Components 960

Chapter 12: Secure Communications and Network Attacks 960

Chapter 13: Managing Identity and Authentication 961

Chapter 14: Controlling and Monitoring Access 962

Chapter 15: Security Assessment and Testing 962

Chapter 16: Managing Security Operations 963

Chapter 17: Preventing and Responding to Incidents 963

Chapter 18: Disaster Recovery Planning 964

Chapter 19: Incidents and Ethics 965

Chapter 20: Software Development Security 965

Chapter 21: Malicious Code and Application Attacks 966

Index 967
James Michael Stewart, CISSP, CEH, CHFI, Security+, has focused on security, certification, and various operating systems for more than 20 years. He teaches numerous job skill and certification courses.

Mike Chapple, PhD, CISSP, is Senior Director for IT Service Delivery at the University of Notre Dame. He oversees information security, data governance, IT architecture, project management, strategic planning, and product management functions.

Darril Gibson, CISSP, is CEO of YCDA, LLC. He regularly writes and consults on a variety of technical and security topics, and has authored or coauthored more than 35 books.