Chapter 4. Protection of Information Assets
Key concepts you will need to understand:
✓ The processes of design, implementation, and monitoring of security (gap analysis baseline, tool selection)
✓ Encryption techniques (DES, RSA)
✓ Public key infrastructure (PKI) components (certification authorities, registration authorities)
✓ Digital signature techniques
✓ Physical security practices
✓ Techniques to identify, authenticate, and restrict users to authorized functions and data (dynamic passwords, challenge/response, menus, profiles)
✓ Security software (single sign-on, intrusion-detection systems [IDS], automated permission, network address translation)
✓ Security testing and assessment tools (penetration testing, vulnerability scanning)
✓ Network and ...
Get CISA Exam Cram™ 2 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.