|
Information Security Management |
|
|
1 | (78) |
|
|
3 | (1) |
|
Purposes of Information Security Management |
|
|
3 | (5) |
|
Concepts: Availability, Integrity, Confidentiality |
|
|
3 | (5) |
|
Risk Analysis and Assessment |
|
|
8 | (23) |
|
Information Protection Requirements |
|
|
8 | (7) |
|
Information Protection Environment |
|
|
15 | (5) |
|
Security Technology and Tools |
|
|
20 | (9) |
|
Assurance, Trust, and Confidence Mechanisms |
|
|
29 | (1) |
|
Information Protection and Management Services |
|
|
30 | (1) |
|
Information Classification |
|
|
31 | (15) |
|
Information Protection Requirements |
|
|
31 | (1) |
|
Information Protection Environment |
|
|
32 | (1) |
|
Security Technology and Tools |
|
|
33 | (5) |
|
Assurance, Trust, and Confidence Mechanisms |
|
|
38 | (2) |
|
Information Protection and Management Services |
|
|
40 | (6) |
|
Policies, Procedures, Standards, Baselines, Guidelines |
|
|
46 | (9) |
|
Information Protection Requirements |
|
|
46 | (1) |
|
Information Protection Environment |
|
|
47 | (1) |
|
Security Technology and Tools |
|
|
48 | (6) |
|
Information Protection Requirements |
|
|
54 | (1) |
|
|
55 | (2) |
|
Information Protection Environment |
|
|
56 | (1) |
|
|
57 | (11) |
|
Implementation (Delivery) Options |
|
|
68 | (4) |
|
Security Technology and Tools |
|
|
68 | (1) |
|
Assurance, Trust, and Confidence Mechanisms |
|
|
69 | (1) |
|
Information Protection and Management Services |
|
|
70 | (2) |
|
Common Body of Knowledge (CBK) |
|
|
72 | (3) |
|
|
72 | (1) |
|
|
73 | (2) |
|
Sample Questions for the CISSP Exam |
|
|
75 | (4) |
|
Security Architecture and Models |
|
|
79 | (68) |
|
|
80 | (1) |
|
Information Protection Requirements |
|
|
81 | (1) |
|
|
81 | (1) |
|
Information Protection Environment |
|
|
81 | (33) |
|
|
82 | (15) |
|
|
97 | (4) |
|
|
101 | (2) |
|
|
103 | (11) |
|
Security Technology and Tools |
|
|
114 | (13) |
|
|
125 | (2) |
|
Assurance, Trust, and Confidence Mechanisms |
|
|
127 | (10) |
|
Trusted Computer Security Evaluation Criteria (TCSEC) |
|
|
129 | (2) |
|
The Trusted Network Interpretation (TNI) |
|
|
131 | (1) |
|
Information Technology Security Evaluation Criteria (ITSEC) |
|
|
131 | (3) |
|
|
134 | (2) |
|
Certification and Accreditation |
|
|
136 | (1) |
|
Information Protection and Management Services |
|
|
137 | (2) |
|
|
138 | (1) |
|
Common Body of Knowledge (CBK) |
|
|
139 | (3) |
|
Sample Questions for the CISSP Exam |
|
|
142 | (5) |
|
Access Control Systems and Methodology |
|
|
147 | (78) |
|
|
147 | (1) |
|
Information Protection Requirements |
|
|
148 | (2) |
|
Information Protection Environment |
|
|
150 | (14) |
|
Security Technology and Tools |
|
|
164 | (41) |
|
Centralized Access Control Methodologies |
|
|
184 | (6) |
|
Decentralized/Distributed Access Control Methodologies |
|
|
190 | (9) |
|
|
199 | (6) |
|
Assurance, Trust, and Confidence Mechanisms |
|
|
205 | (9) |
|
|
205 | (2) |
|
|
207 | (7) |
|
Information Protection and Management Services |
|
|
214 | (2) |
|
|
216 | (1) |
|
Common Body of Knowledge (CBK) |
|
|
216 | (3) |
|
Sample Qeustions for the CISSP Exam |
|
|
219 | (6) |
|
Applications and Systems Development |
|
|
225 | (100) |
|
|
225 | (2) |
|
Information Protection Requirements |
|
|
227 | (1) |
|
|
227 | (1) |
|
Information Protection Environment |
|
|
228 | (29) |
|
Open Source Code and Closed Source Code |
|
|
229 | (1) |
|
|
230 | (9) |
|
The Database and Data Warehousing Environment |
|
|
239 | (1) |
|
|
239 | (8) |
|
Database Interface Languages |
|
|
247 | (4) |
|
Security Assertion Markup Language (SAML) |
|
|
251 | (1) |
|
|
251 | (4) |
|
Database Vulnerabilities and Threats |
|
|
255 | (2) |
|
Security Technology and Tools |
|
|
257 | (55) |
|
System Life Cycle and Systems Development |
|
|
257 | (1) |
|
System (Software) Development Methods |
|
|
258 | (7) |
|
Including Security in a Systems Development Method |
|
|
265 | (8) |
|
|
273 | (1) |
|
Assemblers, Compilers, and Interpreters |
|
|
274 | (15) |
|
Programming Language and Security |
|
|
289 | (1) |
|
Software Protection Mechanisms |
|
|
290 | (14) |
|
|
304 | (8) |
|
Assurance, Trust, and Confidence Mechanisms |
|
|
312 | (2) |
|
|
313 | (1) |
|
|
313 | (1) |
|
|
313 | (1) |
|
Evaluation/Certification and Accreditation |
|
|
314 | (1) |
|
Information Protection and Management Services |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
315 | (1) |
|
Common Body of Knowledge (CBK) |
|
|
315 | (3) |
|
Sample Questions for the CISSP Exam |
|
|
318 | (7) |
|
|
325 | (52) |
|
|
325 | (1) |
|
Information Protection Requirements |
|
|
326 | (3) |
|
Information Protection Environment |
|
|
329 | (11) |
|
Security Technology and Tools |
|
|
340 | (17) |
|
Assurance, Trust, and Confidence Mechanisms |
|
|
357 | (6) |
|
Information Protection and Management Services |
|
|
363 | (3) |
|
|
366 | (1) |
|
Common Body of Knowledge (CBK) |
|
|
366 | (6) |
|
Sample Questions for the CISSP Exam |
|
|
372 | (5) |
|
|
377 | (72) |
|
|
377 | (1) |
|
Information Protection Requirements |
|
|
378 | (1) |
|
|
378 | (1) |
|
Information Protection Environment |
|
|
379 | (17) |
|
|
379 | (1) |
|
|
379 | (10) |
|
|
389 | (4) |
|
|
393 | (3) |
|
Security Technology and Tools |
|
|
396 | (30) |
|
Basic Concepts of Cryptography |
|
|
396 | (7) |
|
|
403 | (5) |
|
Symmetric Key Cryptography Algorithms |
|
|
408 | (6) |
|
Asymmetric Key Cryptography Algorithms |
|
|
414 | (9) |
|
Message Integrity Controls |
|
|
423 | (3) |
|
Assurance, Trust, and Confidence Mechanisms |
|
|
426 | (8) |
|
Digital Signatures and Certificate Authorities |
|
|
426 | (5) |
|
Public Key Infrastructure (PKI) |
|
|
431 | (3) |
|
Information Protection and Management Services |
|
|
434 | (7) |
|
|
434 | (1) |
|
|
435 | (1) |
|
|
435 | (1) |
|
|
435 | (1) |
|
|
436 | (1) |
|
|
436 | (1) |
|
|
436 | (1) |
|
|
437 | (1) |
|
|
437 | (1) |
|
|
437 | (2) |
|
Principles of Key Management |
|
|
439 | (2) |
|
|
441 | (1) |
|
Common Body of Knowledge (CBK) |
|
|
441 | (3) |
|
|
441 | (1) |
|
|
442 | (2) |
|
Sample Questions for the CISSP Exam |
|
|
444 | (5) |
|
|
449 | (66) |
|
|
451 | (1) |
|
Information Protection Requirements |
|
|
452 | (2) |
|
|
452 | (2) |
|
Information Protection Environment |
|
|
454 | (10) |
|
Crime Prevention through Environmental Design (CPTED) |
|
|
455 | (9) |
|
Security Technology and Tools |
|
|
464 | (41) |
|
Perimeter and Building Grounds Boundary Protection |
|
|
466 | (15) |
|
|
481 | (8) |
|
Inside the Building Building Floors, Office Suites, Offices |
|
|
489 | (7) |
|
Penetration (Intrusion) Detection Systems |
|
|
496 | (9) |
|
Assurance, Trust, and Confidence Mechanisms |
|
|
505 | (1) |
|
|
505 | (1) |
|
Vulnerability/Penetration Tests |
|
|
505 | (1) |
|
|
505 | (1) |
|
|
505 | (1) |
|
Information Protection and Management Services |
|
|
506 | (1) |
|
|
506 | (1) |
|
|
507 | (1) |
|
Common Body of Knowledge (CBK) |
|
|
507 | (2) |
|
|
508 | (1) |
|
|
508 | (1) |
|
Sample Questions for the CISSP Exam |
|
|
509 | (6) |
|
Telecommunications, Network, and Internet Security |
|
|
515 | (148) |
|
Information Protection Requirements |
|
|
516 | (1) |
|
Information Protection Environment |
|
|
516 | (77) |
|
|
516 | (34) |
|
|
550 | (1) |
|
|
551 | (27) |
|
Network Threats and Attacks |
|
|
578 | (15) |
|
Security Technology and Tools |
|
|
593 | (57) |
|
Content Filtering and Inspection |
|
|
626 | (1) |
|
|
627 | (23) |
|
Assurance, Trust, and Confidence Mechanisms |
|
|
650 | (4) |
|
Information Protection and Management Services |
|
|
654 | (1) |
|
|
655 | (1) |
|
Common Body of Knowledge (CBK) |
|
|
655 | (3) |
|
Sample Questions for the CISSP Exam |
|
|
658 | (5) |
|
Business Continuity Planning |
|
|
663 | (46) |
|
|
663 | (3) |
|
|
666 | (1) |
|
Information Protection Requirements |
|
|
667 | (1) |
|
Information Protection Environment |
|
|
668 | (1) |
|
Security Technology and Tools |
|
|
669 | (29) |
|
Phase I: Project Management and Initiation |
|
|
670 | (2) |
|
Phase II: Business Impact Analysis (BIA) |
|
|
672 | (7) |
|
Phase III: Recovery Strategies |
|
|
679 | (12) |
|
Phase IV: Plan Development and Implementation |
|
|
691 | (7) |
|
Phase V: Testing, Maintenance, Awareness, and Training |
|
|
698 | (1) |
|
Assurance, Trust, and Confidence Mechanisms |
|
|
698 | (3) |
|
Information Protection and Management Services |
|
|
701 | (2) |
|
|
702 | (1) |
|
Common Body of Knowledge (CBK) |
|
|
703 | (2) |
|
Sample Questions for the CISSP Exam |
|
|
705 | (4) |
|
Law, Investigation, and Ethics |
|
|
709 | (64) |
|
|
711 | (21) |
|
Information Protection Requirements |
|
|
711 | (2) |
|
Information Protection Environment |
|
|
713 | (12) |
|
|
725 | (5) |
|
Recommended Course of Action |
|
|
730 | (1) |
|
Security Technology and Tools |
|
|
731 | (1) |
|
Assurance, Trust, and Confidence Mechanisms |
|
|
732 | (1) |
|
Information Protection and Management Services |
|
|
732 | (1) |
|
|
732 | (23) |
|
Information Protection Requirements |
|
|
732 | (1) |
|
Information Protection Environment |
|
|
733 | (1) |
|
Security Technology and Tools |
|
|
734 | (20) |
|
Assurance, Trust, and Confidence Mechanisms |
|
|
754 | (1) |
|
Information Protection and Management Services |
|
|
754 | (1) |
|
|
755 | (12) |
|
Information Protection Requirements |
|
|
755 | (1) |
|
|
756 | (1) |
|
Information Protection Environment |
|
|
757 | (8) |
|
Security Technology and Tools |
|
|
765 | (1) |
|
Assurance, Trust, and Confidence Mechanisms |
|
|
766 | (1) |
|
Information Protection and Management Services |
|
|
766 | (1) |
|
|
766 | (1) |
|
Common Body of Knowledge (CBK) |
|
|
767 | (2) |
|
Sample Question for the CISSP Exam |
|
|
769 | (4) |
Appendix A Glossary |
|
773 | (50) |
Appendix B Annotated Bibliography |
|
823 | (8) |
Appendix C Answers to Sample Test Questions |
|
831 | (44) |
Index |
|
875 | |