Security Architecture and Engineering

This chapter presents the following:

•  System architecture

•  Trusted computing base and security mechanisms

•  Information security software models

•  Assurance evaluation criteria and ratings

•  Certification and accreditation processes

•  Distributed systems security

•  Cryptography components and their relationships

•  Steganography

•  Public key infrastructure (PKI)

•  Site and facility design considerations

•  Physical security risks, threats, and countermeasures

•  Electric power issues and countermeasures

•  Fire prevention, detection, and suppression

As an engineer I’m constantly spotting problems and plotting how to solve them.

—James Dyson

Organizations today are concerned with ...

Get CISSP All-in-One Exam Guide, Eighth Edition, 8th Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.