ImageVerifierCode 换一换
格式:PDF , 页数:31 ,大小:63.36KB ,
资源ID:10410245      下载积分:10 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.docduoduo.com/d-10410245.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录   微博登录 

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(《CISSP公共知识体系学习指南(中文版)》.pdf)为本站会员(精品资料)主动上传,道客多多仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知道客多多(发送邮件至docduoduo@163.com或直接QQ联系客服),我们立即给予删除!

《CISSP公共知识体系学习指南(中文版)》.pdf

1、 Certified Information System Security Professional CISSP CISSP CBK( ) CISSP CBK ISC 2 TM CISSP CBK CBK CKB Review Seminar CBK CISSP ISC 2 TM CBK CBK CBK CBK ISC 2 TM CBK CBK CBK CBK CBK CBK CISSP 1. 2. 3. 4. 5. 6. 7. 8. BCP DRP 9. 10. 1 (Discretionary Access Control) (Mandatory Access Control) (Lat

2、tice-based Access Control) (Rule-based Access Control) (Role-based Access Control) (Access Control Lists) (Journal Monitoring) (Principle of Least Privilege) (Segregation of Duties and Responsibilities) Bell-LaPadula Biba Clark and Wilson (Non-interference Model) (State Machine Model) (Access Matrix

3、 Model) (Information Flow Model (PINs) ( ) (token) (ticket) ( ) (Single Sign On SSO) / RADIUS TACACS (Decentralized Access Control) (Brute Force) (Denial of Service) (Man-in-the-middle attacks) (Spamming) (Sniffers) Crackers ( ) (Attack Signature Identification) (Intrusion Reactive Response) (Anomal

4、y Identification) (Intrusion Response) (Alarms) (Signals) (Audit Trails) (Violation Reports) (Corrections) (Penetration Testing) 2 (Security Measure) TCP/IP Internet/Intranet/Extranet ISO/OSI ( / / ) ( / / ) IPSec TCP/IP / (Telecommuting) Secure Remote Procedure call (S-RPC) RADIUS/TACACS(Remote Acc

5、ess Dial-In User System/Terminal Access Control Access System) Packet Sniffers Internet/Intranet/Extranet (Gateways) (Proxies) Transmission Control Protocol/Internet Protocol(TCP/IP) IPSEC SKIP SWIPE SSL S/MIME SSL SET PEM Challenge Handshake Authentication Protocol(CHAP) Password Authentication Pro

6、tocol(PAP) (PPP)/ (SLIP) HDLC SDLC ISDN X 25 (Tunneling) (VPN) Packet Sniffers (Network Address Translation) Hash Totals (Record Sequence Checking) (Transmission Logging) (Transmission Error Correction) (Retransmission Controls) E MAIL (Facsimile Security) (Security Boundaries and How to translate s

7、ecurity policy to controls) ARP (worms) (flooding) (eavesdropping) (sniffers) Spamming PBX PBX Fraud and Abuse 3 ( ) (Documentation) CIA (CIA Triad) / (Change Control/Management) ( Change Control ) (Data Classification) (Objective of a Classification Scheme) / / (Worth/Valuation) (Employment Policie

8、s and Practices) / (Background Checks/Security Clearances) (Employment Agreement) (Hiring and Termination Practices) (Separation of Duties and Responsibilities) (Job Rotations) (Probability Determination) (Single Occurrence Loss) (Annual Loss Expectancy (ALE) Calculations) (Countermeasure Selection)

9、 (Countermeasure Evaluation) / / (Risk Reduction/Assignment/Acceptance) IS/IT (other individual) 4 (Applications & Systems Development Security) (agents) (applets) Active-X Java / (Aggregation) (Inference) (Poly-instantiation) (DBMS) / (Primary) (Secondary) (Real) (Virtual) (Random) (V olatile) (Seq

10、uential) (Conceptual Definition) (Functional Requirements Determination) (Protection Specifications Development) (Certification) (Accreditation) / (Process Isolation) (Hardware Segmentation) (Separation of Privilege) (Abstraction) System High (Security Kernel) (Reference Monitors) (Mode of Operation

11、) (Integrity Levels) / (Service Level Agreement) (Jargon) Myths/hoaxes (The concepts of hackers, crackers, phreaks and virus writers) Multi-partite Macintosh Active-X Java (Brute Force or Exhaustive Attack) (Denial of service) pseudo flaw (Alteration of Authorization Code) (Hidden Code) (Browsing) (

12、Inference) Flooding Cramming Time of Check/Time of Use(TOC/TOU) 5 (Use of Cryptography to Achieve) / ( DES RSA SHA MD5 HMAC DSA) ( Kerberos ISAKMP) / (Hash Function) ( MD5 SHA HMAC) One Time Cipher Keys(Pads) Key Escrow / (Secrecy) (Secrecy) (Public Key Infrastructure PKI) (Certificate Authority) (H

13、ierarchical Structure) Hierarchy Chain (System Architecture for Implementing Cryptographic Functions) ( PEM S/MIME,SSL,HTTPS(also known as SHTTP),SET,IPSEC) ( ) ( IPSEC /ISAKMP) COA KPA CTA CPA ACPA CCA (Brute Force) Crack (Replay) MIM (Birthday) 6 (Secure) CC(Common Criteria) ITSEC (TCSEC) IETF IPS

14、EC (Addressing physical and symbolic) (Address space contrasted to memory space) ( ) (OSI ) ( ) ( ) ( ) ( ) (Certification and Accreditation) (Confinement Bounds and Isolation) ( ) IETF (IPSec) ITSEC ( )(Objects and subjects(purpose and relationship) DMZ ( ) (TCB) (Bell-LaPadula,Clark-Wilson,Biba) T

15、CSEC (labels)( ) ( ) (Hook) (superzap/su) ( APIs ) Timing(TOC/TOU) 7 (Operation Security) (media) (Administrative Management) / (Job Requirements/Specifications) (Job Rotations) Mandatory taking of vacation in one week increments / / (Need to Know/Least Privilege) (Privileged Operations Functions) S

16、tandards of Due Care/Due Diligence ( fraud detection, collusion) (Marking) (Handling) (Storage) (Destruction) (Directive Controls) (Preventive Controls) (Detective Controls) (Corrective Controls) (Recovery Controls) (Operations Controls) / / (Vendor Software) (System Utilities) (Directories and Address Tables)

本站链接:文库   一言   我酷   合作


客服QQ:2549714901微博号:道客多多官方知乎号:道客多多

经营许可证编号: 粤ICP备2021046453号世界地图

道客多多©版权所有2020-2025营业执照举报