Chapter 9 Security Vulnerabilities, Threats, and Countermeasures

THE CISSP EXAM TOPICS COVERED IN THIS CHAPTER INCLUDE:

  • ✓ 3) Security Engineering (Engineering and Management of Security)
    • E. Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
      • E.1 Client-based (e.g., applets, local caches)
      • E.2 Server-based (e.g., data flow control)
      • E.3 Database security (e.g., inference, aggregation, data mining, data analytics, warehousing)
      • E.4 Large-scale parallel data systems
      • E.5 Distributed systems (e.g., cloud computing, grid computing, peer to peer)
      • E.6 Cryptographic systems
      • E.7 Industrial control systems (e.g., SCADA)
    • F. Assess and mitigate vulnerabilities in web-based systems (e.g., XML, OWASP)
    • G. Assess ...

Get CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.