O'Reilly logo

CISSP: Certified Information Systems Security Professional Study Guide, 6th Edition by Darril Gibson, Mike Chapple, James M. Stewart

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4

Secure Communications and Network Attacks

THE CISSP EXAM TOPICS COVERED IN THIS CHAPTER INCLUDE:

2. Telecommunications and Network Security
C. Establish secure communication channels (e.g., VPN, TLS/SSL, VLAN):
C.1 Voice (e.g., POTS, PBX, VoIP)
C.2 Multimedia collaboration (e.g., remote meeting technology, instant messaging)
C.3 Remote access (e.g., screen scraper, virtual application/desktop, telecommuting)
C.4 Data communications
D. Understand network attacks (e.g., DDoS, spoofing)

Data residing in a static form on a storage device is fairly simple to secure. As long as physical access control is maintained and reasonable logical access controls are implemented, stored files remain confidential, retain their integrity, and are ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required