CHAPTER 4Security Architecture and Design

This chapter presents the following:

• System architecture

• Computer hardware architecture

• Operating system architecture

• System security architecture

• Trusted computing base and security mechanisms

• Information security software models

• Assurance evaluation criteria and ratings

• Certification and accreditation processes

Software flaws account for a majority of the compromises organizations around the world experience. The common saying in the security field is that a network has a “hard, crunchy outer shell and a soft, chewy middle,” which sums it up pretty well. The security industry has made amazing strides in its advancement of perimeter security devices and technology (firewalls, intrusion ...

Get CISSP All-in-One Exam Guide, 6th Edition, 6th Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.