CISSP in 21 days /
About This BookDay-by-day plan to study and assimilate core concepts from CISSP CBKRevise and take a mock test at the end of every four chaptersA systematic study and revision of myriad concepts to help you crack the CISSP examinationWho This Book Is For If you are a networking professional aspiring...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham :
Packt Publishing,
2016.
|
Edición: | Second edition. |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Day 1
- Security and Risk Management
- Security, Compliance, and Policies; Overview of security, compliance, and policies; Asset; Asset protection; Confidentiality, Integrity, and Availability (CIA); Confidentiality; Integrity; Availability; Security governance; Strategy, goals, mission, and objectives; Organizational processes; Security roles and responsibilities; Control frameworks; Management controls; Administrative controls; Technical controls.
- Due diligence and due careCompliance; Legislative and regulatory compliance; Privacy requirements in compliance; Licensing and intellectual property; Legal and regulatory issues; Computer crimes; Fraud; Theft; Malware/malicious code; Cyber crime; Importing and exporting controls; Transborder data flow; Data breaches; Professional ethics; Codes of ethics; (ISC)sup /2/sup code of professional ethics; Security policies, standards, procedures, and guidelines; Personnel security policies; Employment candidate screening; Employment agreement and policies; Employment termination processes.
- Vendor, consultant, and contractor controlsCompliance and privacy; Summary; Sample questions; Chapter 2: Day 2
- Security and Risk Management
- Risk Management, Business Continuity, and Security Education; Overview of risk management, business continuity, and security education; Risk management; Threats, vulnerabilities, and attacks; Threat risk modeling; Threat and vulnerability analysis; Attack analysis; Risk analysis; Quantitative risk analysis; Qualitative risk analysis; Risk treatment; Business continuity management; The Business Continuity Planning (BCP) process; BCP best practices.
- Security risk considerations in acquisitions, strategy, and practiceInformation security education, training, and awareness; Summary; Sample questions; Chapter 3: Day 3
- Asset Security
- Information and Asset Classification; Overview of asset security
- information and asset classification; Asset classification and control; Classification types in government; The United States information classification; Classification types in corporations; Data privacy; Data owners; Data processors; Data remanence; Data collection limitations; Data retention; Data in media; Data in hardware.
- Data with personnelSummary; Sample questions; Chapter 4: Day 4
- Asset Security
- Data Security Controls and Handling; Overview of asset security
- data security controls and handling; Data security controls; Data security requirements; Payment Card Industry Data Security Standard (PCI DSS); Sarbanes-Oxley Act (SOX); Gramm-Leach-Bliley Act (GLBA); EU Data Protection Act (DPA); Data Loss Prevention (DLP); [Data in motion]; Data in motion; Data at rest; Data in use; Data Loss Prevention strategies; DLP controls; Cryptographic methods to secure data; Encryption; Hashing; Digital signatures.