Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20
-
Inloggen
-- Inloggen
  • accountoverzicht
  • bestellingen
  • facturen betalen
  • downloadcentrum
  • summaries
  • gegevens
  • nieuwsbrief
  • partnerprogramma
  • financieel
  • inloggen
  • uitloggen

Uw winkelwagen

Naar winkelwagen Verder winkelen
Managementboeken
Alle managementboeken
  • Direct naar
    • Managementboek TOP 100
    • AI-books
    • Leiderschap
    • Auteur in de spotlight
    • Online Magazine
  • Rubrieken
    • Advisering
    • Algemeen management
    • Coaching en trainen
    • Communicatie en media
    • Economie
    • Financieel management
    • Inkoop en logistiek
    • Internet en social media
    • IT-management / ICT
    • Juridisch
    • Leiderschap
    • Marketing
    • Mens en maatschappij
    • Non-profit
    • Ondernemen
    • Organisatiekunde
    • Personal finance
    • Personeelsmanagement
    • Persoonlijke effectiviteit
    • Projectmanagement
    • Psychologie
    • Reclame en verkoop
    • Strategisch management
    • Verandermanagement
    • Werk en loopbaan
Overige boeken
Alle overige boeken
  • Direct naar
    • Bestseller 60
    • Fictie TOP 20
    • Non-fictie TOP 20
    • Spanning TOP 20
    • Jeugd TOP 10
    • Culinair TOP 10
  • Rubrieken
    • Cadeauboeken
    • Computer en informatica
    • Economie
    • Filosofie
    • Flora en fauna
    • Geneeskunde
    • Geschiedenis
    • Gezondheid
    • Informatief / professioneel
    • Jeugd
    • Juridisch
    • Koken en eten
    • Kunst en cultuur
    • Literatuur en romans
    • Mens en maatschappij
    • Naslagwerken
    • Paramedisch
    • Psychologie
    • Reizen
    • Religie
    • Schoolboeken
    • Spiritualiteit
    • Sport, hobby, lifestyle
    • Thrillers en spanning
    • Wetenschap en techniek
    • Woordenboeken en taal
Interactief leren
Alle seminars & trainingen
  • Direct naar
    • Live events
    • Online training
    • AI-Books
  • Online Magazine
    • Previews
    • Recensies
    • Interviews
    • Podcasts
    • Videos
  • Volg ons op
    • Spotify
    • YouTube
    • Instagram
    • Linkedin
Attenderingen
Attenderingen instellen
  • Algemeen
    • Recht op u af
    • Juridische attendering
    • Hiatensignalering juridisch
    • Seriesignalering
    • Herdruksignalering
    • Internationaal
  • Aanbevolen per ministerie
    • Algemene Zaken
    • Binnenlandse Zaken en Koninkrijksrelaties
    • Buitenlandse Zaken
    • Defensie
    • Economische Zaken en Klimaat
    • Financiën
    • Infrastructuur en Waterstaat
    • Justitie en Veiligheid
    • Landbouw, Natuur en Voedselkwaliteit
    • Onderwijs, Cultuur en Wetenschap
    • Nationale Politie
    • Sociale Zaken en Werkgelegenheid
    • Volksgezondheid, Welzijn en Sport
Periodieken
Alle periodieken
  • Algemeen
    • Uw periodieken
    • Verlengen / opzeggen
    • Openstaande claims
    • Bibliografische wijzigingen
    • Abonnementshouders
    • Afleveradressen
    • Referenties
    • Notities
  • Aanbevolen per ministerie
    • Algemene Zaken
    • Binnenlandse Zaken en Koninkrijksrelaties
    • Buitenlandse Zaken
    • Defensie
    • Economische Zaken en Klimaat
    • Financiën
    • Infrastructuur en Waterstaat
    • Justitie en Veiligheid
    • Landbouw, Natuur en Voedselkwaliteit
    • Onderwijs, Cultuur en Wetenschap
    • Nationale Politie
    • Sociale Zaken en Werkgelegenheid
    • Volksgezondheid, Welzijn en Sport
Boekseries
Alle boekseries
  • Algemeen
    • Uw serieabonnementen
    • Geadresseerden
    • Abonnementshouders
    • Afleveradressen
    • Referenties
    • Notities
  • Aanbevolen per ministerie
    • Algemene Zaken
    • Binnenlandse Zaken en Koninkrijksrelaties
    • Buitenlandse Zaken
    • Defensie
    • Economische Zaken en Klimaat
    • Financiën
    • Infrastructuur en Waterstaat
    • Justitie en Veiligheid
    • Landbouw, Natuur en Voedselkwaliteit
    • Onderwijs, Cultuur en Wetenschap
    • Nationale Politie
    • Sociale Zaken en Werkgelegenheid
    • Volksgezondheid, Welzijn en Sport
Nu lezen
Online Magazine
  • Direct naar
    • Recensies
    • Interviews
    • Previews
    • Opinie
    • Actueel
    • Podcasts
    • Videos
  • Lees over
    • Algemeen management
    • Coachen en trainen
    • Leiderschap
    • Marketing
    • Organisatiekunde
    • Strategisch management
    • Verandermanagement
    • meer onderwerpen...
  • Recente artikelen
010-4731397
Klantenservice
Mijn account
Mijn bestellingen
010-4731397
Boeken IT-management / ICT ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple

Mike Chapple, PhD, CISSP, is Teaching Professor of IT, Analytics, and Operations at the University of Notre Dame’s Mendoza College of Business.

Meer over de auteurs
Mike Chapple, James Michael Stewart, Darril Gibson

ISC2 CISSP Certified Information Systems Security Professional Official Study Guide

Paperback Engels 2024 10e druk 9781394254699
Verwachte levertijd ongeveer 8 werkdagen
79,32
In winkelwagen
 
Stel een vraag over dit boek
Samenvatting Specificaties Over de auteur Inhoudsopgave

Samenvatting

CISSP Study Guide - fully updated for the 2024 CISSP Body of Knowledge

ISC2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 10th Edition has been completely updated based on the latest 2024 CISSP Detailed Content Outline. This bestselling Sybex Study Guide covers 100% of the CISSP objectives. You'll prepare smarter and faster with Sybex thanks to expert content, knowledge from our real-world experience, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic Study Essentials and chapter review questions.

The book’s co-authors bring decades of experience as cybersecurity practitioners and educators, integrating real-world expertise with the practical knowledge you'll need to successfully prove your CISSP mastery. Combined, they've taught cybersecurity concepts to millions of students through their books, video courses, and live training programs.

Along with the book, you also get access to Sybex's superior online interactive learning environment that includes:

Over 900 practice test questions with complete answer explanations. This includes all of the questions from the book plus four additional online-only practice exams, each with 125 unique questions. You can use the online-only practice exams as full exam simulations. Our questions will help you identify where you need to study more.
More than 1000 Electronic Flashcards to reinforce your learning and give you last-minute test prep
A searchable glossary in PDF to give you instant access to the key terms you need to know
Audio Review. Author Mike Chapple reads the Study Essentials for each chapter providing you with more than 2 hours of up-to-date audio review for yet another way to reinforce your knowledge as you prepare.

Coverage of all of the CISSP topics in the book means you'll be ready for:
- Security and Risk Management
- Asset Security
- Security Architecture and Engineering
- Communication and Network Security
-Identity and Access Management (IAM)
- Security Assessment and Testing
- Security Operations
- Software Development Security

Specificaties

ISBN13:9781394254699
Trefwoorden:netwerken, Cisco, Certificering CISSP
Taal:Engels
Bindwijze:paperback
Aantal pagina's:1248
Uitgever:Sybex
Druk:10
Verschijningsdatum:13-6-2024
Hoofdrubriek:IT-management / ICT

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!
Schrijf een recensie
Lees ons recensiebeleid
Uw cijfer
?
Log in om te stemmen

Over Mike Chapple

Mike Chapple, PhD, CISSP, is Teaching Professor of IT, Analytics, and Operations at the University of Notre Dame’s Mendoza College of Business. He is a cybersecurity professional and educator with over 25 years of experience. Mike provides cybersecurity certification resources at his website, CertMike.com

Andere boeken door Mike Chapple

Bekijk alle boeken

Over James Michael Stewart

James Michael Stewart, CISSP, CEH, CHFI, ECSA, CND, ECIH, CySA+, PenTest+, CASP+, Security+, Network+, A+, CISM, and CFR, has been writing and training for more than 25 years, with a current focus on security. He has been writing and teaching CISSP materials since 2002. He is the author of and contributor to more than 75 books on security certifications.

Andere boeken door James Michael Stewart

Bekijk alle boeken

Over Darril Gibson

Darril Gibson, CISSP, Security+, CASP, is the CEO of YCDA (short for You Can Do Anything), and he has authored or coauthored more than 40 books. Darril regularly writes, consults, and teaches on a wide variety of technical and security topics and holds several certifications.

Andere boeken door Darril Gibson

Bekijk alle boeken

Inhoudsopgave

Introduction xxxv
Assessment Test lx

Chapter 1 Security Governance Through Principles and Policies 1
Security 101 3
Understand and Apply Security Concepts 4
Confidentiality 5
Integrity 6
Availability 6
DAD, Overprotection, Authenticity, Nonrepudiation,
and AAA Services 7
Protection Mechanisms 11
Security Boundaries 13
Evaluate and Apply Security Governance Principles 14
Third‐Party Governance 15
Documentation Review 16
Manage the Security Function 16
Alignment of Security Function to Business Strategy,
Goals, Mission, and Objectives 17
Organizational Processes 19
Organizational Roles and Responsibilities 21
Security Control Frameworks 22
Due Diligence and Due Care 27
Security Policy, Standards, Procedures, and Guidelines 27
Security Policies 28
Security Standards, Baselines, and Guidelines 28
Security Procedures 29
Threat Modeling 29
Identifying Threats 30
Determining and Diagramming Potential Attacks 32
Performing Reduction Analysis 33
Prioritization and Response 33
Supply Chain Risk Management 35
Summary 38
Study Essentials 39
Written Lab 41
Review Questions 42

Chapter 2 Personnel Security and Risk Management Concepts 49
Personnel Security Policies and Procedures 51
Job Descriptions and Responsibilities 51
Candidate Screening and Hiring 52
Onboarding: Employment Agreements and
Policy‐Driven Requirements 53
Employee Oversight 55
Offboarding, Transfers, and Termination Processes 56
Vendor, Consultant, and Contractor Agreements
and Controls 58
Understand and Apply Risk Management Concepts 60
Risk Terminology and Concepts 61
Asset Valuation 64
Identify Threats and Vulnerabilities 65
Risk Assessment/Analysis 66
Risk Responses 73
Cybersecurity Insurance 75
Cost vs. Benefit of Security Controls 76
Countermeasure Selection and Implementation 80
Applicable Types of Controls 82
Security Control Assessment 84
Monitoring and Measurement 84
Risk Reporting and Documentation 85
Continuous Improvement 86
Legacy Risk 87
Risk Frameworks 87
Social Engineering 90
Social Engineering Principles 92
Eliciting Information 94
Prepending 94
Phishing 95
Spear Phishing 97
Whaling 97
Spam 98
Shoulder Surfing 99
Invoice Scams 99
Hoax 100
Impersonation and Masquerading 100
Tailgating and Piggybacking 100
Dumpster Diving 102
Identity Fraud 102
Typosquatting 103
Influence Campaigns 104
Establish and Maintain a Security Awareness, Education,
and Training Program 106
Awareness 106
Training 107
Education 107
Improvements 108
Effectiveness Evaluation 109
Summary 110
Study Essentials 111
Written Lab 114
Review Questions 115

Chapter 3 Business Continuity Planning 121
Planning for Business Continuity 122
Project Scope and Planning 123
Organizational Review 124
BCP Team Selection 125
Resource Requirements 127
External Dependencies 128
Business Impact Analysis 131
Identifying Priorities 132
Risk Identification 133
Likelihood Assessment 134
Impact Analysis 135
Resource Prioritization 137
Continuity Planning 137
Strategy Development 138
Provisions and Processes 138
Plan Approval and Implementation 140
Plan Approval 140
Plan Implementation 140
Communication, Training and Education 141
BCP Documentation 141
Summary 145
Study Essentials 145
Written Lab 146
Review Questions 147

Chapter 4 Laws, Regulations, and Compliance 151
Categories of Laws 152
Criminal Law 152
Civil Law 154
Administrative Law 154
Laws 155
Computer Crime 155
Intellectual Property (IP) 160
Software Licensing 166
Import/Export 167
Privacy 168
State Privacy Laws 179
Compliance 179
Contracting and Procurement 181
Summary 182
Study Essentials 182
Written Lab 184
Review Questions 185

Chapter 5 Protecting Security of Assets 189
Identifying and Classifying Information and Assets 190
Defining Sensitive Data 190
Defining Data Classifications 192
Defining Asset Classifications 195
Understanding Data States 195
Determining Compliance Requirements 196
Determining Data Security Controls 197
Establishing Information and Asset Handling Requirements 198
Data Maintenance 199
Data Loss Prevention 199
Labeling Sensitive Data and Assets 200
Handling Sensitive Information and Assets 202
Data Collection Limitation 202
Data Location 203
Storing Sensitive Data 203
Data Destruction 204
Ensuring Appropriate Data and Asset Retention 207
Data Protection Methods 208
Digital Rights Management 209
Cloud Access Security Broker 210
Pseudonymization 210
Tokenization 211
Anonymization 212
Understanding Data Roles 214
Data Owners 214
Data Controllers and Processors 215
Data Custodians 216
Users and Subjects 216
Using Security Baselines 216
Comparing Tailoring and Scoping 217
Standards Selection 218
Summary 219
Study Essentials 220
Written Lab 221
Review Questions 222

Chapter 6 Cryptography and Symmetric Key Algorithms 227
Cryptographic Foundations 228
Goals of Cryptography 228
Cryptography Concepts 231
Cryptographic Mathematics 232
Ciphers 239
Modern Cryptography 246
Cryptographic Keys 246
Symmetric Key Algorithms 248
Asymmetric Key Algorithms 250
Hashing Algorithms 253
Symmetric Cryptography 253
Block Cipher Modes of Operation 254
Data Encryption Standard 256
Triple DES 256
International Data Encryption Algorithm 257
Blowfish 258
SKIPJACK 258
Rivest Ciphers 258
Advanced Encryption Standard 259
CAST 260
Comparison of Symmetric Encryption Algorithms 260
Symmetric Key Management 261
Cryptographic Life Cycle 263
Summary 264
Study Essentials 264
Written Lab 266
Review Questions 267

Chapter 7 PKI and Cryptographic Applications 271
Asymmetric Cryptography 272
Public and Private Keys 272
RSA 274
ElGamal 275
Elliptic Curve Cryptography 276
Diffie–Hellman Key Exchange 277
Quantum Cryptography 278
Hash Functions 279
SHA Family 280
MD5 281
RIPEMD 282
Comparison of Hash Function Value Lengths 282
Digital Signatures 283
HMAC 284
Digital Signature Standard 285
Public Key Infrastructure 286
Certificates 286
Certificate Authorities 287
Certificate Life Cycle 288
Certificate Formats 291
Asymmetric Key Management 292
Hybrid Cryptography 293
Applied Cryptography 294
Portable Devices 294
Email 295
Web Applications 298
Steganography and Watermarking 300
Networking 302
Emerging Applications 304
Cryptographic Attacks 306
Summary 309
Study Essentials 310
Written Lab 311
Review Questions 312

Chapter 8 Principles of Security Models, Design,
and Capabilities 317
Secure Design Principles 319
Objects and Subjects 319
Closed and Open Systems 321
Secure Defaults 322
Fail Securely 323
Keep It Simple and Small 325
Zero-Trust 326
Trust but Verify 328
Privacy by Design 328
Secure Access Service Edge (SASE) 329
Techniques for Ensuring CIA 330
Confinement 330
Bounds 330
Isolation 331
Access Controls 331
Trust and Assurance 331
Understand the Fundamental Concepts of Security Models 332
Trusted Computing Base 333
State Machine Model 334
Information Flow Model 335
Noninterference Model 335
Composition Theories 336
Take‐Grant Model 336
Access Control Matrix 337
Bell–LaPadula Model 338
Biba Model 340
Clark–Wilson Model 342
Brewer and Nash Model 343
Select Controls Based on Systems Security Requirements 345
Common Criteria 345
Authorization to Operate 348
Understand Security Capabilities of Information Systems 349
Memory Protection 349
Virtualization 349
Trusted Platform Module (TPM) 349
Interfaces 350
Fault Tolerance 350
Encryption/Decryption 350
Manage the Information System Life Cycle 350
Summary 352
Study Essentials 353
Written Lab 354
Review Questions 355

Chapter 9 Security Vulnerabilities, Threats,
and Countermeasures 359
Shared Responsibility 360
Data Localization and Data Sovereignty 362
Assess and Mitigate the Vulnerabilities of Security
Architectures, Designs, and Solution Elements 363
Hardware 364
Firmware 377
Client‐Based Systems 378
Mobile Code 379
Local Caches 381
Server‐Based Systems 381
Large‐Scale Parallel Data Systems 382
Grid Computing 383
Peer to Peer 384
Industrial Control Systems 384
Distributed Systems 386
High‐Performance Computing (HPC) Systems 387
Real‐Time Operating Systems 388
Internet of Things 389
Edge and Fog Computing 390
Embedded Devices and Cyber‐Physical Systems 391
Static Systems 392
Cyber‐Physical Systems 393
Security Concerns of Embedded and Static Systems 393
Microservices 396
Infrastructure as Code 397
Immutable Architecture 398
Virtualized Systems 399
Virtual Software 401
Virtualized Networking 402
Software‐Defined Everything 402
Virtualization Security Management 404
Containerization 406
Mobile Devices 407
Mobile Device Security Features 408
Mobile Device Deployment Policies 419
Essential Security Protection Mechanisms 424
Process Isolation 425
Hardware Segmentation 425
Root of Trust 426
System Security Policy 426
Common Security Architecture Flaws and Issues 427
Covert Channels 427
Attacks Based on Design or Coding Flaws 428
Rootkits 429
Incremental Attacks 430
Summary 431
Study Essentials 432
Written Lab 436
Review Questions 437

Chapter 10 Physical Security Requirements 443
Apply Security Principles to Site and Facility Design 444
Secure Facility Plan 444
Site Selection 445
Facility Design 446
Implement Site and Facility Security Controls 449
Equipment Failure 450
Wiring Closets 450
Server Rooms/Data Centers 452
Intrusion Detection Systems 454
Cameras 458
Access Abuses 459
Media Storage Facilities 459
Evidence Storage 460
Work Area Security 461
Utility Considerations 462
Fire Prevention, Detection, and Suppression 467
Implement and Manage Physical Security 473
Perimeter Security Controls 474
Internal Security Controls 478
Key Performance Indicators of Physical Security 479
Summary 480
Study Essentials 481
Written Lab 484
Review Questions 485

Chapter 11 Secure Network Architecture and Components 491
OSI Model 493
History of the OSI Model 493
OSI Functionality 494
Encapsulation/Deencapsulation 494
OSI Layers 496
TCP/IP Model 501
Analyzing Network Traffic 502
Common Application Layer Protocols 503
Transport Layer Protocols 504
Domain Name System 506
DNS Poisoning 508
Domain Hijacking 511
Internet Protocol (IP) Networking 512
IPv4 vs. IPv6 513
IP Classes 514
ICMP 516
IGMP 516
ARP Concerns 516
Secure Communication Protocols 517
Implications of Multilayer Protocols 518
Converged Protocols 520
Voice over Internet Protocol (VoIP) 521
Software‐Defined Networking 522
Segmentation 523
Edge Networks 526
Wireless Networks 527
Securing the SSID 528
Wireless Channels 529
Conducting a Site Survey 530
Wireless Security 530
Wi‐Fi Protected Setup (WPS) 533
Wireless MAC Filter 534
Wireless Antenna Management 534
Using Captive Portals 535
General Wi‐Fi Security Procedure 535
Wireless Communications 536
Wireless Attacks 539
Satellite Communications 543
Cellular Networks 544
Content Distribution Networks (CDNs) 544
Secure Network Components 545
Secure Operation of Hardware 546
Common Network Equipment 547
Network Access Control 549
Firewalls 551
Endpoint Security 556
Cabling, Topology, and Transmission Media Technology 559
Transmission Media 560
Transport Architecture 564
Network Topologies 565
Ethernet 568
Sub‐Technologies 568
Summary 572
Study Essentials 573
Written Lab 575
Review Questions 576

Chapter 12 Secure Communications and Network Attacks 581
Protocol Security Mechanisms 582
Authentication Protocols 582
Port Security 585
Quality of Service (QoS) 585
Secure Voice Communications 587
Public Switched Telephone Network 587
Voice over Internet Protocol (VoIP) 587
Vishing and Phreaking 589
PBX Fraud and Abuse 590
Remote Access Security Management 591
Remote Access and Telecommuting Techniques 592
Remote Connection Security 592
Plan a Remote Access Security Policy 593
Network Administrative Functions 594
Multimedia Collaboration 595
Remote Meeting 595
Instant Messaging and Chat 596
Monitoring and Management 597
Load Balancing 597
Virtual IP Addresses 599
Active‐Active vs. Active‐Passive 599
Manage Email Security 600
Email Security Goals 601
Understand Email Security Issues 602
Email Security Solutions 603
Virtual Private Network 606
Tunneling 606
How VPNs Work 607
Always‐On 610
Split Tunnel vs. Full Tunnel 610
Common VPN Protocols 611
Switching and Virtual LANs 613
MAC Flooding Attack 616
MAC Cloning 617
Network Address Translation 617
Private IP Addresses 620
Stateful NAT 621
Automatic Private IP Addressing 621
Third‐Party Connectivity 622
Switching Technologies 624
Circuit Switching 624

xxvi Contents
Packet Switching 625
Virtual Circuits 626
WAN Technologies 626
Fiber‐Optic Links 629
Prevent or Mitigate Network Attacks 630
Eavesdropping 630
Modification Attacks 630
Summary 631
Study Essentials 632
Written Lab 635
Review Questions 636

Chapter 13 Managing Identity and Authentication 641
Controlling Access to Assets 643
Controlling Physical and Logical Access 644
The CIA Triad and Access Controls 644
The AAA Model 645
Identification and Authentication Strategy 645
Comparing Subjects and Objects 646
Registration, Proofing, and Establishment of Identity 647
Authorization and Accounting 648
Authentication Factors Overview 649
Something You Know 651
Something You Have 654
Something You Are 656
Multifactor Authentication (MFA) 659
Passwordless Authentication 660
Device Authentication 661
Service Authentication 661
Mutual Authentication 662
Implementing Identity Management 662
Single Sign‐On 663
SSO and Federated Identities 664
Credential Management Systems 666
Credential Manager Apps 666
Scripted Access 667
Session Management 667
Managing the Identity and Access Provisioning Life Cycle 668
Provisioning and Onboarding 668
Deprovisioning and Offboarding 670
Role Definition and Transition 670
Account Maintenance 671
Account Access Review 671
Summary 672
Study Essentials 672
Written Lab 675
Review Questions 676

Chapter 14 Controlling and Monitoring Access 681
Comparing Access Control Models 682
Comparing Permissions, Rights, and Privileges 682
Understanding Authorization Mechanisms 683
Defining Requirements with a Security Policy 685
Introducing Access Control Models 685
Discretionary Access Control 686
Nondiscretionary Access Controls 687
Implementing Authentication Systems 694
Implementing SSO on the Internet 694
Implementing SSO on Internal Networks 698
Zero‐Trust Access Policy Enforcement 702
Understanding Access Control Attacks 703
Risk Elements 704
Common Access Control Attacks 704
Core Protection Methods 717
Summary 719
Study Essentials 720
Written Lab 721
Review Questions 722

Chapter 15 Security Assessment and Testing 727
Building a Security Assessment and Testing Program 729
Security Testing 729
Security Assessments 731
Security Audits 732
Performing Vulnerability Assessments 735
Describing Vulnerabilities 736
Vulnerability Scans 736
Penetration Testing 747
Compliance Checks 750
Testing Your Software 750
Code Review and Testing 751
Interface Testing 755
Misuse Case Testing 756
Test Coverage Analysis 757
Website Monitoring 757
Training and Exercises 758
Implementing Security Management Processes
and Collecting Security Process Data 759
Log Reviews 759
Account Management 760
Disaster Recovery and Business Continuity 761
Training and Awareness 761
Key Performance and Risk Indicators 762
Summary 762
Exam Essentials 763
Written Lab 764
Review Questions 765

Chapter 16 Managing Security Operations 769
Apply Foundational Security Operations Concepts 771
Need‐to‐Know and Least Privilege 772
Segregation of Duties (SoD) and Responsibilities 773
Two‐Person Control 774
Job Rotation 775
Mandatory Vacations 775
Privileged Account Management 775
Service‐Level Agreements (SLAs) 777
Address Personnel Safety and Security 778
Duress 778
Travel 778
Emergency Management 779
Security Training and Awareness 780
Provision Information and Assets Securely 780
Information and Asset Ownership 781
Asset Management 781
Apply Resource Protection 783
Media Management 783
Media Protection Techniques 783
Managed Services in the Cloud 786
Shared Responsibility with Cloud Service Models 787
Scalability and Elasticity 789
Serverless Architecture 790
Perform Configuration Management (CM) 790
Provisioning 791
Baselining 791
Using Images for Baselining 791
Automation 792
Manage Change 793
Change Management 795
Versioning 796
Configuration Documentation 796
Manage Patches and Reduce Vulnerabilities 797
Systems to Manage 797
Patch Management 797
Vulnerability Management 799
Vulnerability Scans 800
Common Vulnerabilities and Exposures 800
Summary 801
Study Essentials 802
Written Lab 804
Review Questions 805

Chapter 17 Preventing and Responding to Incidents 809
Conducting Incident Management 811
Defining an Incident 811
Incident Management Steps 812
Implementing Detection and Preventive Measures 818
Basic Preventive Measures 819
Understanding Attacks 820
Intrusion Detection and Prevention Systems 828
Specific Preventive Measures 836
Logging and Monitoring 842
Logging Techniques 843
The Role of Monitoring 846
Monitoring and Tuning Techniques 848
Log Management 852
Egress Monitoring 853
Automating Incident Response 854
Understanding SOAR 854
Machine Learning and AI Tools 855
Threat Intelligence 856
The Intersection of SOAR, Machine Learning,
AI, and Threat Feeds 859
Summary 860
Study Essentials 860
Written Lab 863
Review Questions 864

Chapter 18 Disaster Recovery Planning 869
The Nature of Disaster 871
Natural Disasters 872
Human‐Made Disasters 877
Understand System Resilience, High Availability,
and Fault Tolerance 883
Protecting Hard Drives 884
Protecting Servers 885
Protecting Power Sources 886
Trusted Recovery 887
Quality of Service 888
Recovery Strategy 888
Business Unit and Functional Priorities 889
Crisis Management 890
Emergency Communications 891
Workgroup Recovery 891
Alternate Processing Sites 891
Database Recovery 896
Recovery Plan Development 898
Emergency Response 899
Personnel and Communications 900
Assessment 900
Backups and Storage Strategies 901
Software Escrow Arrangements 904
Utilities 905
Logistics and Supplies 905
Recovery vs. Restoration 905
Training, Awareness, and Documentation 906
Testing and Maintenance 907
Read‐Through 908
Tabletop 908
Walk‐Through 908
Simulation Test 908
Parallel Test 909
Full‐Interruption Test 909
Lessons Learned 909
Maintenance 910
Test Communications 911
Summary 911
Study Essentials 912
Written Lab 913
Review Questions 914

Chapter 19 Investigations and Ethics 919
Investigations 920
Investigation Types 920
Evidence 923
Investigation Process 930
Major Categories of Computer Crime 934
Military and Intelligence Attacks 935
Business Attacks 936
Financial Attacks 937
Terrorist Attacks 937
Grudge Attacks 938
Thrill Attacks 939
Hacktivists 940
Ethics 940
Organizational Code of Ethics 940
ISC2 Code of Professional Ethics 941
Ethics and the Internet 943
Summary 944
Study Essentials 945
Written Lab 946
Review Questions 947

Chapter 20 Software Development Security 951
Introducing Systems Development Controls 953
Software Development 953
Systems Development Life Cycle 962
Life Cycle Models 965
Gantt Charts and PERT 975
Change and Configuration Management 976
The DevOps Approach 977
Application Programming Interfaces 979
Software Testing 980
Code Repositories 981
Service‐Level Agreements 982
Third‐Party Software Acquisition 983
Establishing Databases and Data Warehousing 984
Database Management System Architecture 984
Database Transactions 988
Security for Multilevel Databases 990
Open Database Connectivity 993
NoSQL 994
Storage Threats 994
Understanding Knowledge‐Based Systems 995
Expert Systems 996
Machine Learning 997
Neural Networks 997
Summary 998
Study Essentials 998
Written Lab 1000
Review Questions 1001

Chapter 21 Malicious Code and Application Attacks 1005
Malware 1006
Sources of Malicious Code 1007
Viruses 1007
Logic Bombs 1011
Trojan Horses 1012
Worms 1013
Spyware and Adware 1016
Ransomware 1016
Malicious Scripts 1017
Zero‐Day Attacks 1018
Malware Prevention 1018
Platforms Vulnerable to Malware 1019
Anti‐malware Software 1019
Integrity Monitoring 1020
Advanced Threat Protection 1020
Application Attacks 1021
Buffer Overflows 1021
Time of Check to Time of Use 1022
Backdoors 1023
Privilege Escalation and Rootkits 1023
Injection Vulnerabilities 1024
SQL Injection Attacks 1024
Code Injection Attacks 1028
Command Injection Attacks 1029
Exploiting Authorization Vulnerabilities 1030
Insecure Direct Object References 1030
Directory Traversal 1031
File Inclusion 1032
Exploiting Web Application
Vulnerabilities 1033
Cross‐Site Scripting (XSS) 1033
Request Forgery 1036
Session Hijacking 1037
Application Security Controls 1038
Input Validation 1038
Web Application Firewalls 1040
Database Security 1041
Code Security 1042
Secure Coding Practices 1044
Source Code Comments 1044
Error Handling 1045
Hard‐Coded Credentials 1046
Memory Management 1047
Summary 1048
Study Essentials 1048
Written Lab 1049
Review Questions 1050

Appendix A Answers to Review Questions 1055

Index 1133

Aanbevolen live events...

donderdag 02-10-2025

Strategisch veranderen en samenwerken bij maatschappelijke opgaven

Collegereeks

Mensen die dit boek kochten, kochten ook...

  • Certified Information Security Manager CISM Study Guide
    Mike Chapple
    Certified Information Security Manager CISM Study Guide
    € 72,20
  • (ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests
    Mike Chapple
    (ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests
    € 46,57
  • CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle
    Mike Chapple
    CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle
    € 107,80
  • IAPP CIPM Certified Information Privacy Manager St udy Guide
    Mike Chapple
    IAPP CIPM Certified Information Privacy Manager St udy Guide
    € 68,64
  • CompTIA Security+ Study Guide
    Mike Chapple
    CompTIA Security+ Study Guide
    € 61,52
  • CompTIA Security+ Certification Kit: Exam SY0–701
    Mike Chapple
    CompTIA Security+ Certification Kit: Exam SY0–701
    € 82,88

Managementboek Top 100

Bekijk de volledige Managementboek Top 100

Rubrieken

  • advisering
  • algemeen management
  • coaching en trainen
  • communicatie en media
  • economie
  • financieel management
  • inkoop en logistiek
  • internet en social media
  • it-management / ict
  • juridisch
  • leiderschap
  • marketing
  • mens en maatschappij
  • non-profit
  • ondernemen
  • organisatiekunde
  • personal finance
  • personeelsmanagement
  • persoonlijke effectiviteit
  • projectmanagement
  • psychologie
  • reclame en verkoop
  • strategisch management
  • verandermanagement
  • werk en loopbaan
Uw cookie-instellingen
Deze website maakt gebruik van verschillende soorten cookies. Sommige cookies worden geplaatst door diensten van derden die op onze pagina's worden weergegeven. Om deze externe content te kunnen tonen is nodig dat u toestemming geeft voor het zetten van persoonlijke en marketingcookies. U kunt uw toestemming op elk moment wijzigen of intrekken. In onze cookieverklaring vindt u meer informatie.

Functionele cookies
Deze zijn noodzakelijk voor de werking van de website, zonder deze cookies kan de website niet naar behoren werken.

Persoonlijke en marketingcookies
Wij gebruiken cookies voor statistieken om bij te houden en rapportages te krijgen over hoe bezoekers de website gebruiken. Zo kunnen wij onze website verbeteren. Marketingcookies worden gebruikt om bezoekers te volgen wanneer ze verschillende websites bezoeken. Hun doel is advertenties weergeven die zijn toegesneden op en relevant zijn voor de individuele gebruiker.
Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20

Klantenservice

Over ons Contact Voorwaarden Bestellen en retourneren Lezen en luisteren Voor auteurs Recensiebeleid Partnerprogramma

Zakelijk

Zakelijke diensten Partnerprogramma Cadeaubonnen

Altijd op de hoogte

Schrijf u in voor onze nieuwsbrief en blijf up-to-date met relevante interviews en recensies, inspirerende events en de beste acties.
PRETTIG KENNIS MAKEN
Thuiswinkel waarborg Algemene voorwaarden Privacy Cookies Cookie instellingen Service & Contact Over ons
© 2025 Mainpress BV

Populaire producten

    Personen

      Trefwoorden

        ISC2 CISSP Certified Information Systems Security Professional Official Study Guide

        ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
        Mike Chapple , James Michael Stewart , Darril Gibson
        /
        loader
        Recensiebeleid
        Noordhoff terugkoopgarantie

        Noordhoff koopt jouw boek terug, zonder zorgen!

        Heb je jouw boeken niet meer nodig?

        Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff. Geen vragen, geen gedoe en lekker duurzaam.

        Volledige informatie op Noordhoff.nl

        AI-book

        Wat is een AI-book?

        Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
        Meer informatie over AI-books

        ?

        Geef uw beoordeling

        ISC2 CISSP Certified Information Systems Security Professional Official Study Guide

        Verwijder uw beoordeling