O'Reilly logo

CISSP: Certified Information Systems Security Professional Study Guide, 6th Edition by Darril Gibson, Mike Chapple, James M. Stewart

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12

Security Architecture Vulnerabilities, Threats, and Countermeasures

THE CISSP EXAM TOPICS COVERED IN THIS CHAPTER INCLUDE:

6. Security Architecture and Design
D. Understand the vulnerabilities of security architectures
D.1 System (e.g., covert channels, state attacks, emanations)
D.2 Technology and process integration (e.g., single point of failure, service oriented architecture)
E. Understand software and system vulnerabilities and threats
E.1 Web-based (e.g., XML, SAML, OWASP)
E.2 Client-based (e.g., applets)
E.3 Server-based (e.g., data flow control)
E.5 Distributed systems (e.g., cloud computing, grid computing, peer to peer)
F. Understand countermeasure principles (e.g., defense in depth)

In previous chapters of this book, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required