O'Reilly logo

CISSP: Certified Information Systems Security Professional Study Guide, 6th Edition by Darril Gibson, Mike Chapple, James M. Stewart

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10

PKI and Cryptographic Applications

THE CISSP EXAM TOPICS COVERED IN THIS CHAPTER INCLUDE:

5. Cryptography
C. Understand encryption concepts
C.3 Asymmetric cryptography
C.4 Hybrid cryptography
C.5 Message digests
C.6 Hashing
D. Understand key management processes
D.1 Creation/distribution
D.2 Storage/destruction
D.3 Recovery
D.4 Key escrow
E. Understand digital signatures
F. Understand non-repudiation
G. Understand methods of cryptanalytic attacks
G.2 Social engineering for key discovery
G.3 Brute force (e.g., rainbow tables, specialized/scalable architecture)
G.4 Cipher-text only
G.5 Known plaintext
G.6 Frequency analysis
G.7 Chosen cipher-text
G.8 Implementation attacks
H. Use cryptography to maintain network security
I. Use cryptography ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required