CISSP Certification Exam GuideThis guide provides detailed coverage of all 10 subject areas tested for the ISC2 exam. There is full CISSP-based coverage of all major security considerations, including public-key infrastructures (PKI), telecommunications security, disaster recovery and physical security. Techn ical discussion sidebars offer depth of understanding not found in other certification books, and practice questions at the end of each chapter help test for comprehension and prepare readers for each subject area of the exam. Easy-to-use map of exam objectives facilitates quick access for exam review, and the book utilizes many drawing and pictures to enhance learning. The accompanying CD features commercial-grade software testing simulations. |
From inside the book
Results 1-3 of 82
Page 279
Shon Harris. CHAPTER Physical Security In this chapter , you will learn about the following items : • · Administrative , technical , and physical controls pertaining to physical security Facility location , construction , and management ...
Shon Harris. CHAPTER Physical Security In this chapter , you will learn about the following items : • · Administrative , technical , and physical controls pertaining to physical security Facility location , construction , and management ...
Page 280
... physical security boundaries and if any one of these does not provide the necessary protection level , then it can be the weak link that causes security breaches . Physical security is accomplished through proper facility construction ...
... physical security boundaries and if any one of these does not provide the necessary protection level , then it can be the weak link that causes security breaches . Physical security is accomplished through proper facility construction ...
Page 292
... Physical security looks more at providing protection for the computers them- selves and the facility they reside in . The magnitude of loss from physical damage depends on the cost of repair or replacement , the cost of replacing data ...
... Physical security looks more at providing protection for the computers them- selves and the facility they reside in . The magnitude of loss from physical damage depends on the cost of repair or replacement , the cost of replacing data ...
Contents
Reasons to Become a CISSP | 2 |
Reasons to Become a CISSP | 3 |
How Do You Become a CISSP? | 8 |
Copyright | |
66 other sections not shown
Other editions - View all
Common terms and phrases
access control activities actually administrator algorithm application attacks audit authentication backup Bell-LaPadula model block cipher buffer overflows cable cipher CISSP communication company's components computer crimes confidential configured connection covert channels cryptography data link data link layer database decrypt detection developed devices different types digital signatures disaster recovery domain e-mail employees enables encryption enforcement ensure environment Ethernet evidence facility FDDI firewall frame relay functionality hackers hardware identified implemented individual integrity interface Internet intruder IP address IPSec issues layer methods monitoring necessary network layer objects one-way function operating system OSI model packet password perform physical private key procedures properly protection protocol public key request responsible risk analysis router security level security mechanisms security policy specific standards switches take place threats tion transmission unauthorized usually vendor vulnerabilities