(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide. Mike Chapple
Чтение книги онлайн.

Читать онлайн книгу (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide - Mike Chapple страница 27

СКАЧАТЬ 20 3.5.1 Client-based systems 9 3.5.2 Server-based systems 9 3.5.3 Database systems 20 3.5.4 Cryptographic systems 7 3.5.5 Industrial Control Systems (ICS) 9 3.5.6 Cloud-based systems (e.g., Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS)) 16 3.5.7 Distributed systems 9 3.5.8 Internet of Things (IoT) 9 3.5.9 Microservices 9 3.5.10 Containerization 9 3.5.11 Serverless 9 3.5.12 Embedded systems 9 3.5.13 High-Performance Computing (HPC) systems 9 3.5.14 Edge computing systems 9 3.5.15 Virtualized systems 9 3.6 Select and determine cryptographic solutions 6, 7 3.6.1 Cryptographic life cycle (e.g., keys, algorithm selection) 6, 7 3.6.2 Cryptographic methods (e.g., symmetric, asymmetric, elliptic curves, quantum) 6, 7 3.6.3 Public Key Infrastructure (PKI) 7 3.6.4 Key management practices 7 3.6.5 Digital signatures and digital certificates 7 3.6.6 Non-repudiation 6, 7 3.6.7 Integrity (e.g., hashing) 6, 7 3.7 Understand methods of cryptanalytic attacks 7, 14, 21 3.7.1 Brute force 7 3.7.2 Ciphertext only 7 3.7.3 Known plaintext 7 3.7.4 Frequency analysis 7 3.7.5 Chosen ciphertext 7 3.7.6 Implementation attacks 7 3.7.7 Side-channel 7 СКАЧАТЬ