(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide. Mike Chapple
Чтение книги онлайн.

Читать онлайн книгу (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide - Mike Chapple страница 28

СКАЧАТЬ 3.7.8 Fault injection 7 3.7.9 Timing 7 3.7.10 Man-in-the-Middle (MITM) 7 3.7.11 Pass the hash 14 3.7.12 Kerberos exploitation 14 3.7.13 Ransomware 21 3.8 Apply security principles to site and facility design 10 3.9 Design site and facility security controls 10 3.9.1 Wiring closets/intermediate distribution facilities 10 3.9.2 Server rooms/data centers 10 3.9.3 Media storage facilities 10 3.9.4 Evidence storage 10 3.9.5 Restricted and work area security 10 3.9.6 Utilities and Heating, Ventilation, and Air Conditioning (HVAC) 10 3.9.7 Environmental issues 10 3.9.8 Fire prevention, detection, and suppression 10 3.9.9 Power (e.g., redundant, backup) 10 Domain 4 Communication and Network Security 4.1 Assess and implement secure design principles in network architectures 11, 12 4.1.1 Open System Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) models 11 4.1.2 Internet Protocol (IP) networking (e.g., Internet Protocol Security (IPSec), Internet Protocol (IP) v4/6) 11, 12 4.1.3 Secure protocols 11 4.1.4 Implications of multilayer protocols 11 4.1.5 Converged protocols (e.g., Fiber Channel Over Ethernet (FCoE), Internet Small Computer Systems Interface (iSCSI), Voice over Internet Protocol (VoIP)) 11 4.1.6 Micro-segmentation (e.g., Software Defined Networks (SDN), Virtual eXtensible Local Area Network (VXLAN), Encapsulation, Software-Defined Wide Area Network (SD-WAN)) 11 4.1.7 Wireless networks (e.g., LiFi, Wi-Fi, Zigbee, satellite) 11 4.1.8 Cellular networks (e.g., 4G, 5G) 11 4.1.9 Content Distribution Networks (CDN) 11 4.2 Secure network components 11 4.2.1 Operation of hardware (e.g., redundant power, warranty, support) 11 СКАЧАТЬ