By Peter Gregory

CISSP consultant TO protection necessities, moment variation, offers entire, targeted insurance to organize scholars and execs alike for achievement at the qualified details platforms safeguard expert (CISSP) certification examination. The textual content opens with an outline of the present kingdom of knowledge defense, together with suitable laws and criteria, ahead of continuing to discover all ten CISSP domain names in nice element, from safeguard structure and layout to entry keep watch over and cryptography. every one bankruptcy opens with a short assessment of suitable thought and ideas, by means of a robust specialize in real-world functions and studying instruments designed for potent examination instruction, together with key phrases, bankruptcy summaries, learn questions, hands-on workouts, and case initiatives. built via the writer of greater than 30 books on info securitythe moment variation of this depended on textual content has been up-to-date to mirror very important new advancements in know-how and practices, delivering a correct consultant to the complete CISSP universal physique of information.

Show description

Read Online or Download CISSP Guide to Security Essentials PDF

Best network security books

IPSec (2nd Edition)

IPSec, moment variation is the main authoritative, finished, available, and up to date consultant to IPSec expertise. best experts disguise all aspects of IPSec structure, implementation, and deployment; overview very important technical advances given that IPSec used to be first standardized; and current new case stories demonstrating end-to-end IPSec safeguard.

A Survey of Data Leakage Detection and Prevention Solutions

SpringerBriefs current concise summaries of state-of-the-art learn and sensible functions throughout a large spectrum of fields. that includes compact volumes of fifty to a hundred pages (approximately 20,000- 40,000 words), the sequence covers a variety of content material from specialist to educational. Briefs let authors to give their rules and readers to soak up them with minimum time funding.

Unified Communications Forensics. Anatomy of Common UC Attacks

Unified Communications Forensics: Anatomy of universal UC assaults is the 1st publication to give an explanation for the problems and vulnerabilities and show the assaults, forensic artifacts, and countermeasures required to set up a safe (UC) atmosphere. This e-book is written by way of top UC specialists Nicholas provide and Joseph W.

CCSP Self-Study CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide

Community safeguard is a truly advanced enterprise. The Cisco pics Firewall plays a few very particular features as a part of the protection strategy. it is important to to be acquainted with many networking and community defense options ahead of you adopt the CSPFA certification. This ebook is designed for safety execs or networking execs who're drawn to starting the protection certification procedure.

Extra info for CISSP Guide to Security Essentials

Example text

Some levels may require double-locking (stored in a locked desk or cabined in a locked office), for instance. Destruction Classification guidelines need to include information on the proper disposal of classified information. Destruction procedures—steps to ensure that information is discarded in a way that renders it non-retrievable—need to include every type of media and likely context. For example, media destruction procedures should include proper disposal of hardcopy documents. In the workplace there are sure to be shredders or secure document disposal bins, but what about staff members who work primarily in home offices?

Goals While objectives describe desired end-states for an organization, goals specify specific accomplishments that will enable the organization to meet its objectives. Security Support of Mission, Objectives, and Goals Security professionals in an organization ought to be concerned with the reduction of risk through the proper activities and controls that protect assets and activities. We need to be keenly aware of our organizations’ mission, objectives, and goals, so that we can become involved in the key activities that the organization is undertaking.

For instance, a risk analysis on the use of laptop computers may identify theft as one risk. While the organization may mitigate the risk through the use of cable locks, it may transfer part of the risk to an insurance company. Note that risk transfer usually involves a cost (insurance premiums) that should be considered in a quantitative risk analysis. Residual Risk In any particular risk situation, generally only some of the risk can be avoided, reduced, or transferred. There is always some remaining risk, called residual risk.

Download PDF sample

Rated 4.71 of 5 – based on 27 votes