(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide. Mike Chapple
Чтение книги онлайн.

Читать онлайн книгу (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide - Mike Chapple страница 29

СКАЧАТЬ 4.2.2 Transmission media 11 4.2.3 Network Access Control (NAC) devices 11 4.2.4 Endpoint security 11 4.3 Implement secure communication channels according to design 12 4.3.1 Voice 12 4.3.2 Multimedia collaboration 12 4.3.3 Remote access 12 4.3.4 Data communications 12 4.3.5 Virtualized networks 12 4.3.6 Third-party connectivity 12 Domain 5 Identity and Access Management (IAM) 5.1 Control physical and logical access to assets 13 5.1.1 Information 13 5.1.2 Systems 13 5.1.3 Devices 13 5.1.4 Facilities 13 5.1.5 Applications 13 5.2 Manage identification and authentication of people, devices, and services 13 5.2.1 Identity Management (IdM) implementation 13 5.2.2 Single/multi-factor authentication (MFA) 13 5.2.3 Accountability 13 5.2.4 Session management 13 5.2.5 Registration, proofing, and establishment of identity 13 5.2.6 Federated Identity Management (FIM) 13 5.2.7 Credential management systems 13 5.2.8 Single Sign On (SSO) 13 5.2.9 Just-In-Time (JIT) 13 5.3 Federated identity with a third-party service 13 5.3.1 On-premise 13 5.3.2 Cloud 13 5.3.3 Hybrid 13 5.4 Implement and manage authorization mechanisms 14 5.4.1 Role Based Access Control (RBAC) 14 СКАЧАТЬ