Certified Information Systems Security Professional: Official Study Guide |
|
|
|
xxxiii | |
|
|
xlii | |
|
Chapter 1 Security Governance Through Principles and Policies |
|
|
1 | (48) |
|
Understand and Apply Concepts of Confidentiality, Integrity, and Availability |
|
|
2 | (12) |
|
|
3 | (1) |
|
|
4 | (2) |
|
|
6 | (2) |
|
|
8 | (4) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
Evaluate and Apply Security Governance Principles |
|
|
14 | (12) |
|
Alignment of Security Function to Business Strategy, Goals, Mission, and Objectives |
|
|
15 | (2) |
|
|
17 | (6) |
|
Organizational Roles and Responsibilities |
|
|
23 | (2) |
|
Security Control Frameworks |
|
|
25 | (1) |
|
Due Care and Due Diligence |
|
|
26 | (1) |
|
Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines |
|
|
26 | (4) |
|
|
26 | (2) |
|
Security Standards, Baselines, and Guidelines |
|
|
28 | (1) |
|
|
28 | (2) |
|
Understand and Apply Threat Modeling Concepts and Methodologies |
|
|
30 | (8) |
|
|
31 | (4) |
|
Determining and Diagramming Potential Attacks |
|
|
35 | (1) |
|
Performing Reduction Analysis |
|
|
36 | (1) |
|
Prioritization and Response |
|
|
37 | (1) |
|
Apply Risk-Based Management Concepts to the Supply Chain |
|
|
38 | (2) |
|
|
40 | (2) |
|
|
42 | (2) |
|
|
44 | (1) |
|
|
45 | (4) |
|
Chapter 2 Personnel Security and Risk Management Concepts |
|
|
49 | (48) |
|
Personnel Security Policies and Procedures |
|
|
51 | (11) |
|
Candidate Screening and Hiring |
|
|
55 | (1) |
|
Employment Agreements and Policies |
|
|
55 | (2) |
|
Onboarding and Termination Processes |
|
|
57 | (3) |
|
Vendor, Consultant, and Contractor Agreements and Controls |
|
|
60 | (1) |
|
Compliance Policy Requirements |
|
|
60 | (1) |
|
Privacy Policy Requirements |
|
|
61 | (1) |
|
|
62 | (1) |
|
Understand and Apply Risk Management Concepts |
|
|
63 | (23) |
|
|
64 | (3) |
|
Identify Threats and Vulnerabilities |
|
|
67 | (1) |
|
|
68 | (8) |
|
|
76 | (1) |
|
Countermeasure Selection and Implementation |
|
|
77 | (2) |
|
Applicable Types of Controls |
|
|
79 | (2) |
|
Security Control Assessment |
|
|
81 | (1) |
|
Monitoring and Measurement |
|
|
81 | (1) |
|
Asset Valuation and Reporting |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
83 | (3) |
|
Establish and Maintain a Security Awareness, Education, and Training Program |
|
|
86 | (1) |
|
Manage the Security Function |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
89 | (3) |
|
|
92 | (1) |
|
|
93 | (4) |
|
Chapter 3 Business Continuity Planning |
|
|
97 | (28) |
|
Planning for Business Continuity |
|
|
98 | (1) |
|
Project Scope and Planning |
|
|
99 | (6) |
|
Business Organization Analysis |
|
|
100 | (1) |
|
|
101 | (2) |
|
|
103 | (1) |
|
Legal and Regulatory Requirements |
|
|
104 | (1) |
|
Business Impact Assessment |
|
|
105 | (6) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
108 | (2) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
111 | (3) |
|
|
112 | (1) |
|
|
112 | (2) |
|
Plan Approval and Implementation |
|
|
114 | (5) |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
115 | (4) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
121 | (4) |
|
Chapter 4 Laws, Regulations, and Compliance |
|
|
125 | (34) |
|
|
126 | (3) |
|
|
126 | (2) |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
129 | (20) |
|
|
129 | (5) |
|
|
134 | (5) |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
141 | (8) |
|
|
149 | (1) |
|
Contracting and Procurement |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
154 | (5) |
|
Chapter 5 Protecting Security of Assets |
|
|
159 | (36) |
|
Identify and Classify Assets |
|
|
160 | (18) |
|
|
160 | (2) |
|
Defining Data Classifications |
|
|
162 | (3) |
|
Defining Asset Classifications |
|
|
165 | (1) |
|
Determining Data Security Controls |
|
|
165 | (3) |
|
Understanding Data States |
|
|
168 | (1) |
|
Handling Information and Assets |
|
|
169 | (7) |
|
|
176 | (2) |
|
|
178 | (8) |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
181 | (3) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
190 | (5) |
|
Chapter 6 Cryptography and Symmetric Key Algorithms |
|
|
195 | (42) |
|
Historical Milestones in Cryptography |
|
|
196 | (2) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
198 | (16) |
|
|
198 | (2) |
|
|
200 | (2) |
|
Cryptographic Mathematics |
|
|
202 | (5) |
|
|
207 | (7) |
|
|
214 | (5) |
|
|
214 | (1) |
|
|
215 | (1) |
|
Asymmetric Key Algorithms |
|
|
216 | (3) |
|
|
219 | (1) |
|
|
219 | (9) |
|
|
220 | (2) |
|
|
222 | (1) |
|
International Data Encryption Algorithm |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
223 | (1) |
|
Advanced Encryption Standard |
|
|
224 | (2) |
|
|
226 | (2) |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
229 | (2) |
|
|
231 | (1) |
|
|
232 | (5) |
|
Chapter 7 PKI and Cryptographic Applications |
|
|
237 | (38) |
|
|
238 | (4) |
|
|
238 | (1) |
|
|
239 | (2) |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
242 | (4) |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
246 | (3) |
|
|
247 | (1) |
|
Digital Signature Standard |
|
|
248 | (1) |
|
Public Key Infrastructure |
|
|
249 | (4) |
|
|
249 | (1) |
|
|
250 | (1) |
|
Certificate Generation and Destruction |
|
|
251 | (2) |
|
Asymmetric Key Management |
|
|
253 | (1) |
|
|
254 | (11) |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
256 | (3) |
|
Digital Rights Management |
|
|
259 | (3) |
|
|
262 | (3) |
|
|
265 | (3) |
|
|
268 | (1) |
|
|
269 | (1) |
|
|
270 | (1) |
|
|
271 | (4) |
|
Chapter 8 Principles of Security Models, Design, and Capabilities |
|
|
275 | (44) |
|
Implement and Manage Engineering Processes Using Secure Design Principles |
|
|
276 | (5) |
|
|
277 | (1) |
|
|
277 | (2) |
|
Techniques for Ensuring Confidentiality, Integrity, and Availability |
|
|
279 | (1) |
|
|
280 | (1) |
|
|
281 | (1) |
|
Understand the Fundamental Concepts of Security Models |
|
|
281 | (14) |
|
|
282 | (2) |
|
|
284 | (1) |
|
|
285 | (1) |
|
|
285 | (1) |
|
|
286 | (1) |
|
|
286 | (2) |
|
|
288 | (2) |
|
|
290 | (2) |
|
|
292 | (1) |
|
Brewer and Nash Model (aka Chinese Wall) |
|
|
293 | (1) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
294 | (1) |
|
Select Controls Based On Systems Security Requirements |
|
|
295 | (14) |
|
|
296 | (5) |
|
ITSEC Classes and Required Assurance and Functionality |
|
|
301 | (1) |
|
|
302 | (3) |
|
Industry and International Security Implementation Guidelines |
|
|
305 | (1) |
|
Certification and Accreditation |
|
|
306 | (3) |
|
Understand Security Capabilities of Information Systems |
|
|
309 | (2) |
|
|
309 | (1) |
|
|
310 | (1) |
|
|
310 | (1) |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
312 | (1) |
|
|
313 | (1) |
|
|
314 | (5) |
|
Chapter 9 Security Vulnerabilities, Threats, and Countermeasures |
|
|
319 | (80) |
|
Assess and Mitigate Security Vulnerabilities |
|
|
320 | (22) |
|
|
321 | (20) |
|
|
341 | (1) |
|
|
342 | (4) |
|
|
342 | (2) |
|
|
344 | (2) |
|
|
346 | (1) |
|
Database Systems Security |
|
|
347 | (3) |
|
|
347 | (1) |
|
|
348 | (1) |
|
Data Mining and Data Warehousing |
|
|
348 | (1) |
|
|
349 | (1) |
|
Large-Scale Parallel Data Systems |
|
|
350 | (8) |
|
Distributed Systems and Endpoint Security |
|
|
350 | (3) |
|
Cloud-Based Systems and Cloud Computing |
|
|
353 | (4) |
|
|
357 | (1) |
|
|
358 | (1) |
|
|
358 | (1) |
|
Industrial Control Systems |
|
|
359 | (1) |
|
Assess and Mitigate Vulnerabilities in Web-Based Systems |
|
|
360 | (5) |
|
Assess and Mitigate Vulnerabilities in Mobile Systems |
|
|
365 | (10) |
|
|
366 | (4) |
|
|
370 | (2) |
|
|
372 | (3) |
|
Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems |
|
|
375 | (4) |
|
Examples of Embedded and Static Systems |
|
|
376 | (1) |
|
Methods of Securing Embedded and Static Systems |
|
|
377 | (2) |
|
Essential Security Protection Mechanisms |
|
|
379 | (5) |
|
|
380 | (3) |
|
Security Policy and Computer Architecture |
|
|
383 | (1) |
|
|
383 | (1) |
|
Common Architecture Flaws and Security Issues |
|
|
384 | (6) |
|
|
385 | (1) |
|
Attacks Based on Design or Coding Flaws and Security Issues |
|
|
385 | (3) |
|
|
388 | (1) |
|
Timing, State Changes, and Communication Disconnects |
|
|
389 | (1) |
|
Technology and Process Integration |
|
|
389 | (1) |
|
Electromagnetic Radiation |
|
|
389 | (1) |
|
|
390 | (1) |
|
|
391 | (3) |
|
|
394 | (1) |
|
|
395 | (4) |
|
Chapter 10 Physical Security Requirements |
|
|
399 | (40) |
|
Apply Security Principles to Site and Facility Design |
|
|
400 | (3) |
|
|
401 | (1) |
|
|
401 | (1) |
|
|
402 | (1) |
|
|
402 | (1) |
|
|
402 | (1) |
|
Implement Site and Facility Security Controls |
|
|
403 | (19) |
|
|
404 | (1) |
|
|
405 | (2) |
|
Server Rooms/Data Centers |
|
|
407 | (5) |
|
|
412 | (1) |
|
|
413 | (1) |
|
Restricted and Work Area Security |
|
|
413 | (1) |
|
Utilities and HVAC Considerations |
|
|
414 | (3) |
|
Fire Prevention, Detection, and Suppression |
|
|
417 | (5) |
|
Implement and Manage Physical Security |
|
|
422 | (9) |
|
Perimeter Security Controls |
|
|
422 | (3) |
|
Internal Security Controls |
|
|
425 | (6) |
|
|
431 | (1) |
|
|
432 | (2) |
|
|
434 | (1) |
|
|
435 | (4) |
|
Chapter 11 Secure Network Architecture and Securing Network Components |
|
|
439 | (82) |
|
|
440 | (11) |
|
|
441 | (1) |
|
|
441 | (1) |
|
Encapsulation/Deencapsulation |
|
|
442 | (2) |
|
|
444 | (7) |
|
|
451 | (19) |
|
TCP/IP Protocol Suite Overview |
|
|
452 | (18) |
|
|
470 | (2) |
|
Content Distribution Networks |
|
|
472 | (1) |
|
|
472 | (14) |
|
Securing Wireless Access Points |
|
|
473 | (2) |
|
|
475 | (1) |
|
|
476 | (1) |
|
Using Secure Encryption Protocols |
|
|
476 | (3) |
|
Determining Antenna Placement |
|
|
479 | (1) |
|
|
480 | (1) |
|
Adjusting Power Level Controls |
|
|
480 | (1) |
|
|
481 | (1) |
|
|
481 | (1) |
|
General Wi-Fi Security Procedure |
|
|
481 | (1) |
|
|
482 | (4) |
|
Secure Network Components |
|
|
486 | (9) |
|
|
487 | (1) |
|
|
487 | (4) |
|
|
491 | (1) |
|
Secure Operation of Hardware |
|
|
492 | (3) |
|
Cabling, Wireless, Topology, Communications, and Transmission Media Technology |
|
|
495 | (18) |
|
|
496 | (4) |
|
|
500 | (3) |
|
Wireless Communications and Security |
|
|
503 | (6) |
|
|
509 | (4) |
|
|
513 | (1) |
|
|
514 | (2) |
|
|
516 | (1) |
|
|
517 | (4) |
|
Chapter 12 Secure Communications and Network Attacks |
|
|
521 | (58) |
|
Network and Protocol Security Mechanisms |
|
|
522 | (3) |
|
Secure Communications Protocols |
|
|
523 | (1) |
|
|
524 | (1) |
|
Secure Voice Communications |
|
|
525 | (4) |
|
Voice over Internet Protocol (VoIP) |
|
|
525 | (1) |
|
|
526 | (1) |
|
|
527 | (2) |
|
|
529 | (1) |
|
|
529 | (1) |
|
|
530 | (1) |
|
|
530 | (6) |
|
|
531 | (1) |
|
Understand Email Security Issues |
|
|
532 | (1) |
|
|
533 | (3) |
|
Remote Access Security Management |
|
|
536 | (4) |
|
Plan Remote Access Security |
|
|
538 | (1) |
|
|
539 | (1) |
|
Centralized Remote Authentication Services |
|
|
540 | (1) |
|
|
540 | (6) |
|
|
541 | (1) |
|
|
542 | (1) |
|
|
543 | (2) |
|
|
545 | (1) |
|
|
546 | (3) |
|
|
547 | (1) |
|
|
548 | (1) |
|
Network Address Translation |
|
|
549 | (4) |
|
|
550 | (1) |
|
|
551 | (1) |
|
|
552 | (1) |
|
Automatic Private IP Addressing |
|
|
552 | (1) |
|
|
553 | (3) |
|
|
554 | (1) |
|
|
554 | (1) |
|
|
555 | (1) |
|
|
556 | (5) |
|
WAN Connection Technologies |
|
|
558 | (3) |
|
Dial-Up Encapsulation Protocols |
|
|
561 | (1) |
|
Miscellaneous Security Control Characteristics |
|
|
561 | (2) |
|
|
561 | (1) |
|
|
562 | (1) |
|
|
562 | (1) |
|
|
563 | (1) |
|
Prevent or Mitigate Network Attacks |
|
|
564 | (5) |
|
|
564 | (1) |
|
|
565 | (1) |
|
Impersonation/Masquerading |
|
|
566 | (1) |
|
|
567 | (1) |
|
|
567 | (1) |
|
Address Resolution Protocol Spoofing |
|
|
567 | (1) |
|
DNS Poisoning, Spoofing, and Hijacking |
|
|
568 | (1) |
|
|
568 | (1) |
|
|
569 | (2) |
|
|
571 | (2) |
|
|
573 | (1) |
|
|
574 | (5) |
|
Chapter 13 Managing Identity and Authentication |
|
|
579 | (44) |
|
Controlling Access to Assets |
|
|
580 | (4) |
|
Comparing Subjects and Objects |
|
|
581 | (1) |
|
The CIA Triad and Access Controls |
|
|
581 | (1) |
|
|
582 | (2) |
|
Comparing Identification and Authentication |
|
|
584 | (18) |
|
Registration and Proofing of Identity |
|
|
585 | (1) |
|
Authorization and Accountability |
|
|
586 | (1) |
|
|
587 | (1) |
|
|
588 | (4) |
|
|
592 | (3) |
|
|
595 | (4) |
|
Multifactor Authentication |
|
|
599 | (1) |
|
|
600 | (1) |
|
|
601 | (1) |
|
Implementing Identity Management |
|
|
602 | (9) |
|
|
602 | (5) |
|
Credential Management Systems |
|
|
607 | (1) |
|
Integrating Identity Services |
|
|
608 | (1) |
|
|
608 | (1) |
|
|
609 | (2) |
|
Managing the Identity and Access Provisioning Lifecycle |
|
|
611 | (3) |
|
|
611 | (1) |
|
|
612 | (1) |
|
|
613 | (1) |
|
|
614 | (1) |
|
|
615 | (2) |
|
|
617 | (1) |
|
|
618 | (5) |
|
Chapter 14 Controlling and Monitoring Access |
|
|
623 | (38) |
|
Comparing Access Control Models |
|
|
624 | (11) |
|
Comparing Permissions, Rights, and Privileges |
|
|
624 | (1) |
|
Understanding Authorization Mechanisms |
|
|
625 | (1) |
|
Defining Requirements with a Security Policy |
|
|
626 | (1) |
|
Implementing Defense in Depth |
|
|
627 | (1) |
|
Summarizing Access Control Models |
|
|
628 | (1) |
|
Discretionary Access Controls |
|
|
629 | (1) |
|
Nondiscretionary Access Controls |
|
|
630 | (5) |
|
Understanding Access Control Attacks |
|
|
635 | (17) |
|
|
636 | (1) |
|
|
637 | (1) |
|
|
638 | (2) |
|
Identifying Vulnerabilities |
|
|
640 | (1) |
|
Common Access Control Attacks |
|
|
641 | (11) |
|
Summary of Protection Methods |
|
|
652 | (1) |
|
|
653 | (1) |
|
|
654 | (2) |
|
|
656 | (1) |
|
|
657 | (4) |
|
Chapter 15 Security Assessment and Testing |
|
|
661 | (36) |
|
Building a Security Assessment and Testing Program |
|
|
662 | (6) |
|
|
662 | (2) |
|
|
664 | (1) |
|
|
665 | (3) |
|
Performing Vulnerability Assessments |
|
|
668 | (13) |
|
Describing Vulnerabilities |
|
|
668 | (1) |
|
|
668 | (11) |
|
|
679 | (2) |
|
|
681 | (7) |
|
|
682 | (4) |
|
|
686 | (1) |
|
|
686 | (1) |
|
|
686 | (1) |
|
|
687 | (1) |
|
Implementing Security Management Processes |
|
|
688 | (2) |
|
|
688 | (1) |
|
|
689 | (1) |
|
|
689 | (1) |
|
Key Performance and Risk Indicators |
|
|
690 | (1) |
|
|
690 | (1) |
|
|
691 | (1) |
|
|
692 | (1) |
|
|
693 | (4) |
|
Chapter 16 Managing Security Operations |
|
|
697 | (40) |
|
Applying Security Operations Concepts |
|
|
698 | (12) |
|
Need-to-Know and Least Privilege |
|
|
698 | (2) |
|
Separation of Duties and Responsibilities |
|
|
700 | (3) |
|
|
703 | (1) |
|
|
703 | (1) |
|
Privileged Account Management |
|
|
704 | (2) |
|
Managing the Information Lifecycle |
|
|
706 | (1) |
|
|
707 | (1) |
|
Addressing Personnel Safety and Security |
|
|
708 | (2) |
|
Securely Provisioning Resources |
|
|
710 | (8) |
|
Managing Hardware and Software Assets |
|
|
710 | (1) |
|
Protecting Physical Assets |
|
|
711 | (1) |
|
|
712 | (1) |
|
Managing Cloud-Based Assets |
|
|
713 | (1) |
|
|
714 | (4) |
|
|
718 | (1) |
|
|
718 | (1) |
|
Using Images for Baselining |
|
|
718 | (1) |
|
|
719 | (4) |
|
|
721 | (1) |
|
|
722 | (1) |
|
Configuration Documentation |
|
|
723 | (1) |
|
Managing Patches and Reducing Vulnerabilities |
|
|
723 | (5) |
|
|
723 | (1) |
|
|
724 | (1) |
|
|
725 | (3) |
|
Common Vulnerabilities and Exposures |
|
|
728 | (1) |
|
|
728 | (1) |
|
|
729 | (2) |
|
|
731 | (1) |
|
|
732 | (5) |
|
Chapter 17 Preventing and Responding to Incidents |
|
|
737 | (64) |
|
Managing Incident Response |
|
|
738 | (7) |
|
|
738 | (1) |
|
|
739 | (6) |
|
Implementing Detective and Preventive Measures |
|
|
745 | (28) |
|
Basic Preventive Measures |
|
|
745 | (1) |
|
|
746 | (10) |
|
Intrusion Detection and Prevention Systems |
|
|
756 | (7) |
|
Specific Preventive Measures |
|
|
763 | (10) |
|
Logging, Monitoring, and Auditing |
|
|
773 | (17) |
|
|
773 | (8) |
|
|
781 | (2) |
|
Auditing to Assess Effectiveness |
|
|
783 | (4) |
|
Security Audits and Reviews |
|
|
787 | (1) |
|
|
788 | (2) |
|
|
790 | (2) |
|
|
792 | (3) |
|
|
795 | (1) |
|
|
796 | (5) |
|
Chapter 18 Disaster Recovery Planning |
|
|
801 | (44) |
|
|
802 | (10) |
|
|
803 | (4) |
|
|
807 | (5) |
|
Understand System Resilience and Fault Tolerance |
|
|
812 | (6) |
|
|
813 | (1) |
|
|
814 | (1) |
|
|
815 | (1) |
|
|
816 | (1) |
|
|
817 | (1) |
|
|
818 | (9) |
|
Business Unit and Functional Priorities |
|
|
818 | (1) |
|
|
819 | (1) |
|
|
820 | (1) |
|
|
820 | (1) |
|
Alternate Processing Sites |
|
|
820 | (5) |
|
Mutual Assistance Agreements |
|
|
825 | (1) |
|
|
825 | (2) |
|
Recovery Plan Development |
|
|
827 | (8) |
|
|
828 | (1) |
|
Personnel and Communications |
|
|
828 | (1) |
|
|
829 | (1) |
|
Backups and Offsite Storage |
|
|
829 | (4) |
|
Software Escrow Arrangements |
|
|
833 | (1) |
|
|
833 | (1) |
|
|
834 | (1) |
|
|
834 | (1) |
|
|
834 | (1) |
|
Training, Awareness, and Documentation |
|
|
835 | (1) |
|
|
836 | (2) |
|
|
836 | (1) |
|
|
837 | (1) |
|
|
837 | (1) |
|
|
837 | (1) |
|
|
837 | (1) |
|
|
837 | (1) |
|
|
838 | (1) |
|
|
838 | (1) |
|
|
839 | (1) |
|
|
840 | (5) |
|
Chapter 19 Investigations and Ethics |
|
|
845 | (26) |
|
|
846 | (11) |
|
|
846 | (3) |
|
|
849 | (4) |
|
|
853 | (4) |
|
Major Categories of Computer Crime |
|
|
857 | (4) |
|
Military and Intelligence Attacks |
|
|
857 | (1) |
|
|
858 | (1) |
|
|
859 | (1) |
|
|
859 | (1) |
|
|
859 | (2) |
|
|
861 | (1) |
|
|
861 | (3) |
|
|
862 | (1) |
|
|
862 | (2) |
|
|
864 | (1) |
|
|
864 | (1) |
|
|
865 | (1) |
|
|
866 | (5) |
|
Chapter 20 Software Development Security |
|
|
871 | (44) |
|
Introducing Systems Development Controls |
|
|
872 | (23) |
|
|
872 | (6) |
|
Systems Development Lifecycle |
|
|
878 | (3) |
|
|
881 | (6) |
|
|
887 | (1) |
|
Change and Configuration Management |
|
|
888 | (1) |
|
|
889 | (1) |
|
Application Programming Interfaces |
|
|
890 | (1) |
|
|
891 | (2) |
|
|
893 | (1) |
|
|
894 | (1) |
|
|
894 | (1) |
|
Establishing Databases and Data Warehousing |
|
|
895 | (9) |
|
Database Management System Architecture |
|
|
896 | (3) |
|
|
899 | (2) |
|
Security for Multilevel Databases |
|
|
901 | (2) |
|
Open Database Connectivity |
|
|
903 | (1) |
|
|
904 | (1) |
|
Storing Data and Information |
|
|
904 | (2) |
|
|
905 | (1) |
|
|
905 | (1) |
|
Understanding Knowledge-Based Systems |
|
|
906 | (3) |
|
|
907 | (1) |
|
|
908 | (1) |
|
|
908 | (1) |
|
|
909 | (1) |
|
|
909 | (1) |
|
|
909 | (1) |
|
|
910 | (1) |
|
|
911 | (4) |
|
Chapter 21 Malicious Code and Application Attacks |
|
|
915 | (34) |
|
|
916 | (13) |
|
Sources of Malicious Code |
|
|
916 | (1) |
|
|
917 | (6) |
|
|
923 | (1) |
|
|
924 | (1) |
|
|
925 | (3) |
|
|
928 | (1) |
|
|
928 | (1) |
|
|
929 | (4) |
|
|
929 | (1) |
|
|
930 | (1) |
|
|
931 | (1) |
|
|
932 | (1) |
|
|
933 | (2) |
|
|
933 | (1) |
|
Time of Check to Time of Use |
|
|
934 | (1) |
|
|
934 | (1) |
|
Escalation of Privilege and Rootkits |
|
|
935 | (1) |
|
|
935 | (5) |
|
|
935 | (1) |
|
Cross-Site Request Forgery |
|
|
936 | (1) |
|
|
937 | (3) |
|
|
940 | (1) |
|
|
940 | (1) |
|
|
940 | (1) |
|
|
941 | (1) |
|
|
941 | (1) |
|
|
942 | (1) |
|
|
942 | (1) |
|
|
942 | (1) |
|
|
943 | (1) |
|
|
944 | (1) |
|
|
945 | (4) |
|
Appendix A Answers to Review Questions |
|
|
949 | (38) |
|
Chapter 1 Security Governance Through Principles and Policies |
|
|
950 | (1) |
|
Chapter 2 Personnel Security and Risk Management Concepts |
|
|
951 | (1) |
|
Chapter 3 Business Continuity Planning |
|
|
952 | (2) |
|
Chapter 4 Laws, Regulations, and Compliance |
|
|
954 | (2) |
|
Chapter 5 Protecting Security of Assets |
|
|
956 | (2) |
|
Chapter 6 Cryptography and Symmetric Key Algorithms |
|
|
958 | (2) |
|
Chapter 7 PKI and Cryptographic Applications |
|
|
960 | (1) |
|
Chapter 8 Principles of Security Models, Design, and Capabilities |
|
|
961 | (2) |
|
Chapter 9 Security Vulnerabilities, Threats, and Countermeasures |
|
|
963 | (2) |
|
Chapter 10 Physical Security Requirements |
|
|
965 | (1) |
|
Chapter 11 Secure Network Architecture and Securing Network Components |
|
|
966 | (2) |
|
Chapter 12 Secure Communications and Network Attacks |
|
|
968 | (1) |
|
Chapter 13 Managing Identity and Authentication |
|
|
969 | (2) |
|
Chapter 14 Controlling and Monitoring Access |
|
|
971 | (2) |
|
Chapter 15 Security Assessment and Testing |
|
|
973 | (2) |
|
Chapter 16 Managing Security Operations |
|
|
975 | (2) |
|
Chapter 17 Preventing and Responding to Incidents |
|
|
977 | (3) |
|
Chapter 18 Disaster Recovery Planning |
|
|
980 | (1) |
|
Chapter 19 Investigations and Ethics |
|
|
981 | (2) |
|
Chapter 20 Software Development Security |
|
|
983 | (1) |
|
Chapter 21 Malicious Code and Application Attacks |
|
|
984 | (3) |
|
Appendix B Answers to Written Labs |
|
|
987 | (14) |
|
Chapter 1 Security Governance Through Principles and Policies |
|
|
988 | (1) |
|
Chapter 2 Personnel Security and Risk Management Concepts |
|
|
988 | (1) |
|
Chapter 3 Business Continuity Planning |
|
|
989 | (1) |
|
Chapter 4 Laws, Regulations, and Compliance |
|
|
990 | (1) |
|
Chapter 5 Protecting Security of Assets |
|
|
991 | (1) |
|
Chapter 6 Cryptography and Symmetric Key Algorithms |
|
|
991 | (1) |
|
Chapter 7 PKI and Cryptographic Applications |
|
|
992 | (1) |
|
Chapter 8 Principles of Security Models, Design, and Capabilities |
|
|
992 | (1) |
|
Chapter 9 Security Vulnerabilities, Threats, and Countermeasures |
|
|
993 | (1) |
|
Chapter 10 Physical Security Requirements |
|
|
994 | (1) |
|
Chapter 11 Secure Network Architecture and Securing Network Components |
|
|
994 | (1) |
|
Chapter 12 Secure Communications and Network Attacks |
|
|
995 | (1) |
|
Chapter 13 Managing Identity and Authentication |
|
|
996 | (1) |
|
Chapter 14 Controlling and Monitoring Access |
|
|
996 | (1) |
|
Chapter 15 Security Assessment and Testing |
|
|
997 | (1) |
|
Chapter 16 Managing Security Operations |
|
|
997 | (1) |
|
Chapter 17 Preventing and Responding to Incidents |
|
|
998 | (1) |
|
Chapter 18 Disaster Recovery Planning |
|
|
999 | (1) |
|
Chapter 19 Investigations and Ethics |
|
|
999 | (1) |
|
Chapter 20 Software Development Security |
|
|
1000 | (1) |
|
Chapter 21 Malicious Code and Application Attacks |
|
|
1000 | (1) |
|
|
1001 | |
Certified Information Systems Security Professional: Official Practice Tests |
|
|
|
xvii | |
|
Chapter 1 Security and Risk Management (Domain 1) |
|
|
1 | (26) |
|
Chapter 2 Asset Security (Domain 2) |
|
|
27 | (24) |
|
Chapter 3 Security Architecture and Engineering (Domain 3) |
|
|
51 | (28) |
|
Chapter 4 Communication and Network Security (Domain 4) |
|
|
79 | (24) |
|
Chapter 5 Identity and Access Management (Domain 5) |
|
|
103 | (24) |
|
Chapter 6 Security Assessment and Testing (Domain 6) |
|
|
127 | (24) |
|
Chapter 7 Security Operations (Domain 7) |
|
|
151 | (24) |
|
Chapter 8 Software Development Security (Domain 8) |
|
|
175 | (26) |
|
Chapter 9 Practice Test 1 |
|
|
201 | (30) |
|
Chapter 10 Practice Test 2 |
|
|
231 | (28) |
|
Chapter 11 Practice Test 3 |
|
|
259 | (28) |
|
Chapter 12 Practice Test 4 |
|
|
287 | (30) |
|
|
317 | (142) |
|
Chapter 1 Security and Risk Management (Domain 1) |
|
|
318 | (9) |
|
Chapter 2 Asset Security (Domain 2) |
|
|
327 | (11) |
|
Chapter 3 Security Architecture and Engineering (Domain 3) |
|
|
338 | (9) |
|
Chapter 4 Communication and Network Security (Domain 4) |
|
|
347 | (11) |
|
Chapter 5 Identity and Access Management (Domain 5) |
|
|
358 | (11) |
|
Chapter 6 Security Assessment and Testing (Domain 6) |
|
|
369 | (12) |
|
Chapter 7 Security Operations (Domain 7) |
|
|
381 | (12) |
|
Chapter 8 Software Development Security (Domain 8) |
|
|
393 | (11) |
|
Chapter 9 Practice Test 1 |
|
|
404 | (14) |
|
Chapter 10 Practice Test 2 |
|
|
418 | (13) |
|
Chapter 11 Practice Test 3 |
|
|
431 | (14) |
|
Chapter 12 Practice Test 4 |
|
|
445 | (14) |
|
|
459 | |
9781433154300 |
|
Contributors |
|
xi | |
Foreword |
|
xvii | |
|
Preface |
|
xxi | |
|
|
Part I |
|
|
1 The Patriarch and the Insider Movement: Debating Timothy I, Muhammad, and the Qur'an |
|
|
3 | (78) |
|
Part II |
|
|
2 Building a Missiological Foundation: Modality and Sodality |
|
|
81 | (24) |
|
|
3 Why the Church Cannot Accept Muhammad as a Prophet |
|
|
105 | (18) |
|
|
4 Muslim Followers of Jesus, Muhammad and the Qur'an |
|
|
123 | (16) |
|
|
5 Who Makes the Qur'an Valid and Valuable for Insiders? Critical Reflections on Harley Talman's Views on the Qur'an |
|
|
139 | (20) |
|
|
6 Biblical Salvation in Islam? The Pitfalls of Using the Qur'an as a Bridge to the Gospel |
|
|
159 | (20) |
|
|
7 Insider Movements: Sociologically and Theologically Incoherent |
|
|
179 | (30) |
|
|
8 The Biblical Basis for Insider Movements: Asking the Right Question, in the Right Way |
|
|
209 | (18) |
|
|
9 The New Testament Record: No Sign of Zeus Insiders, Artemis Insiders, or Unknown-God Insiders |
|
|
227 | (20) |
|
|
10 Communal Solidarity versus Brotherhood in the New Testament |
|
|
247 | (18) |
|
|
11 Messianic Judaism and Deliverance from the Two Covenants of Islam |
|
|
265 | (18) |
|
|
12 Word Games in Asici Minor |
|
|
283 | (16) |
|
|
13 "Son Of God" In Muslim Idiom Translations Of Scripture |
|
|
299 | (28) |
|
|
14 Tawbid: Implications for Discipleship in the Muslim Context |
|
|
327 | (18) |
|
|
15 A Practical Look at Discipleship and the Qur'an |
|
|
345 | (20) |
|
Part III |
|
|
16 Essential Inside Information on the Insider Movement |
|
|
365 | (10) |
|
|
17 A Response to Insider Movement Methodology |
|
|
375 | (12) |
|
|
18 Silver Bullets, Ducks, and the Gospel Ministry: Should We Seek One Best Solution for Winning People to Christ? |
|
|
387 | (8) |
|
|
19 Radical Discipleship and Faithful Witness |
|
|
395 | (2) |
|
|
20 Watching the Insider Movement Unfold |
|
|
397 | (12) |
|
|
21 The Great Commission and the Greatest Commandment |
|
|
409 | (4) |
|
|
22 Opening the Door: Moving from the Qur'an to New Testament Anointing |
|
|
413 | (2) |
|
|
23 The Insider Movement: Is This What Christ Requires? |
|
|
415 | (8) |
|
|
24 Our Believing Community Is a Cultural Insider but Theological Outsider (CITO) |
|
|
423 | (8) |
|
|
25 Question Marks on Contextualization! |
|
|
431 | (4) |
|
|
26 A BMB's Identity Is in Christ, Not Islam |
|
|
435 | (2) |
|
|
27 Let Their Voice Be Heard |
|
|
437 | (2) |
|
|
28 A Former Muslim Comments on the Insider Movement |
|
|
439 | (2) |
|
|
29 The Insider Movement and Iranian Muslims |
|
|
441 | (6) |
|
|
30 A Disturbing Field Report |
|
|
447 | (4) |
|
|
31 The Insider Movement and Life in a Local Body of Believers: An Impossible Union from the Start |
|
|
451 | (4) |
|
|
Epilogue: Force Majeure: Ethics and Encounters in an Era of Extreme Contextualization |
|
|
455 | (46) |
|
|
Appendix: Do Muslim Idiom Translations Islamize the Bible? A Glimpse behind the Veil |
|
|
501 | (24) |
|
Index |
|
525 | |