O'Reilly logo

CISSP: Certified Information Systems Security Professional Study Guide, 6th Edition by Darril Gibson, Mike Chapple, James M. Stewart

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2

Access Control Attacks and Monitoring

THE CISSP EXAM TOPICS COVERED IN THIS CHAPTER INCLUDE:

1. Access Control
A. Control access by applying the following concepts/methodology/techniques:
A.7 Logging and monitoring
B. Understand access control attacks
B.1 Threat modeling
B.2 Asset valuation
B.3 Vulnerability analysis
B.4 Access aggregation
C. Assess effectiveness of access controls
C.1 User entitlement
C.2 Access review & audit

Chapter 1, “Access Control,” presented several important topics related to the Access Control domain of the Common Body of Knowledge (CBK) for the CISSP certification exam. This chapter builds on those topics and includes key information on logging and monitoring, access control attacks, and assessing the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required