Get Started. It's Free
or sign up with your email address
CISSP by Mind Map: CISSP

1. Identity and Access Management

1.1. Security Principles

1.1.1. Availability

1.1.2. Integrity

1.1.3. Confidentiality

1.2. Identification, Authentication, Authorization, and Accountability

1.2.1. Identification and Authentication Identity management Directories Web access management (WAM)

1.2.2. Authentication Password Management • Password synchronization • Self-service password reset • Assisted password reset Legacy Single Sign-On Account management Provisioning Authoritative System of Record User provisioning Profile Update Biometrics Fingerprint Palm Scan Hand Geometry Retina Scan Iris Scan Signature Dynamics Keystroke Dynamics Voice Print Facial Scan Hand Topography Passwords Password Policies Password Checkers Password Hashing and Encryption Password Aging Limit Logon Attempts Cognitive passwords one-time password (OTP) The token device Synchronous Asynchronous Cryptographic Keys Passphrase Memory Cards Smart Card contact smart card contactless smart card Smart Card Attacks

1.2.3. Authorization Access Criteria Role Groups Physical or logical location Time of day Transaction-type restrictions Default to No Access need-to-know principle Authorization Creep Single Sign-On

1.2.4. Federation Web portal portlets Access Control and Markup Languages XML Service Provisioning Markup Language (SPML) Security Assertion Markup Language (SAML) Extensible Access Control Markup Language (XACML) OpenID OAuth

1.2.5. Identity as a Service

1.2.6. Integrating Identity Services Establishing Connectivity Establishing Trust Incremental Testing

1.3. Access Control Models

1.3.1. Discretionary Access Control

1.3.2. Mandatory Access Control Sensitivity Labels

1.3.3. Role-Based Access Control Core RBAC Hierarchical RBAC Static Separation of Duty (SSD) Relations through RBAC Dynamic Separation of Duties (DSD) Relations through RBAC

1.3.4. Rule-Based Access Control

1.4. Acces Control Techniques and Technologies

1.4.1. Constrained User Interfaces

1.4.2. Access Control Matrix Capability Table Access control lists (ACLs) Content-Dependent Access Control

1.4.3. Content-Dependent Access Control

1.5. Access Control Administration

1.5.1. Centralized Access Control Administration Remote Authentication Dial-In User Service (RADIUS) Terminal Access Controller Access Control System (TACACS) Diameter

1.5.2. Decentralized Access Control Administration

1.6. Access Control Methods

1.6.1. Access Control Layers

1.6.2. Administrative Controls Personnel controls Supervisory Structure Security-Awareness Training Testing

1.6.3. Physical Controls Network segregation Perimeter Security Computer Controls Cabling Control Zone

1.6.4. Technical Controls System Access Network Architecture Network Access Encryption and protocols Auditing

1.7. Accountability

1.7.1. Review of Audit Information

1.7.2. Protecting Audit Data and Log Information

1.7.3. Keystroke Monitoring

1.8. Access Control Practices

1.8.1. Unauthorized Disclosure of Information Object reuse Emanation Security TEMPEST White Noise Control Zone

1.9. Access Control Monitoring

1.9.1. Intrusion Detection Systems network-based IDS (NIDS) Signature-based Anomaly-based host-based IDS (HIDS) Signature-based Anomaly-based Knowledge- or Signature-Based Intrusion Detection State-Based IDSs statistical anomaly–based IDS Protocol Anomaly–Based IDS Traffic Anomaly–Based IDS rule-based IDS IDS Sensors Network Traffic

1.9.2. Intrusion Prevention Systems Honeypot Network Sniffers

1.10. Threats to Access Control

1.10.1. Dictionary Attack Countermeasures

1.10.2. Brute-Force Attacks Countermeasures

1.10.3. Spoofing at Logon

1.10.4. Phishing and Pharming

2. Security Assessment and Testing

2.1. Audit Strategies

2.1.1. Internal Audits

2.1.2. Third-Party Audits Service organizations

2.2. Auditing Technical Controls

2.2.1. Vulnerability Testing Personnel testing Physical testing System and network testing

2.2.2. Penetration Testing

2.2.3. War Dialing

2.2.4. Other Vulnerability Types Kernel flaws Buffer overflows Symbolic links File descriptor attacks Race conditions File and directory permissions

2.2.5. Postmortem

2.2.6. Log Reviews

2.2.7. Synthetic Transactions

2.2.8. Misuse Case Testing

2.2.9. Code Reviews

2.2.10. Interface Testing

2.3. Auditing Administrative Controls

2.3.1. Account Management Adding Accounts Modifying Accounts Suspending Accounts

2.3.2. Backup Verification Types of Data User Data Files Databases Mailbox Data

2.3.3. Disaster Recovery and Business Continuity Testing and Revising the Business Continuity Plan Checklist Test Structured Walk-Through Test Simulation Test Parallel Test Full-Interruption Test Other Types of Training Emergency Response Maintaining the Plan BCP Life Cycle

2.3.4. Security Training and Security Awareness Training Social engineering Pretexting Online Safety Data Protection Culture

2.3.5. Key Performance and Risk Indicators Key Performance Indicators Key Risk Indicators

2.4. Reporting

2.4.1. Technical Reporting

2.4.2. Executive Summaries

2.5. Management Review

2.5.1. Before the Management Review

2.5.2. Reviewing Inputs

2.5.3. Management Actions

3. Security Operations

3.1. The Role of the Operations Department

3.2. Administrative Management

3.2.1. Security and Network Personnel

3.2.2. Accountability

3.2.3. Clipping Levels

3.3. Assurance Levels

3.4. Operational Responsibilities

3.4.1. Unusual or Unexplained Occurrences

3.4.2. Deviations from Standards

3.4.3. Unscheduled Initial Program Loads (aka Rebooting)

3.5. Configuration Management

3.5.1. Trusted Recovery After a System Crash Security Concerns

3.5.2. Input and Output Controls

3.5.3. System Hardening

3.5.4. Remote Access Security

3.6. Physical Security

3.6.1. Facility Access Control Locks Mechanical Locks Device Locks Administrative Responsibilities

3.6.2. Personnel Access Controls

3.6.3. External Boundary Protection Mechanisms Fencing Bollards Lighting Surveillance Devices Visual Recording Devices

3.6.4. Intrusion Detection Systems Electromechanical systems photoelectric system passive infrared (PIR) system acoustical detection system Wave-pattern motion detectors proximity detector

3.6.5. Patrol Force and Guards

3.6.6. Dogs

3.6.7. Auditing Physical Access

3.7. Service Resource Provisioning

3.7.1. Asset Inventory Tracking Hardware Tracking Software

3.7.2. Configuration Management Change Control Process Change Control Documentation

3.7.3. Provisioning Cloud Assets

3.8. Network and Resource Availability

3.8.1. Mean Time Between Failures

3.8.2. Mean Time to Repair

3.8.3. Single Points of Failure Redundant array of independent disks (RAID Direct access storage device (DASD) Massive Array of Inactive Disks Redundant array of independent tapes (RAIT) Storage Area Networks Clustering Grid computing

3.8.4. Backups Hierarchical Storage Management

3.8.5. Contingency Planning

3.9. Preventive Measures

3.9.1. Firewalls

3.9.2. Intrusion Detection and Prevention Systems

3.9.3. Antimalware

3.9.4. Patch Management Unmanaged Patching Centralized Patch Management Reverse Engineering Patches Sandboxing

3.9.5. Honeypots

3.10. The Incident Management Process

3.10.1. Detection

3.10.2. Response

3.10.3. Mitigation

3.10.4. Reporting

3.10.5. Recovery

3.10.6. Remediation

3.11. Disaster Recovery

3.11.1. Business Process Recovery

3.11.2. Facility Recovery Hot site Warm site Cold site Tertiary Sites Redundant Sites

3.11.3. Supply and Technology Recovery Hardware Backups Software Backups

3.11.4. Choosing a Software Backup Facility Documentation Human Resources End-User Environment

3.11.5. Data Backup Alternatives

3.11.6. Electronic Backup Solutions

3.11.7. High Availability

3.12. Insurance

3.13. Recovery and Restoration

3.13.1. Developing Goals for the Plans

3.13.2. Implementing Strategies Investigations

3.14. Investigations

3.14.1. Computer Forensics and Proper Collection of Evidence

3.14.2. Motive, Opportunity, and Means

3.14.3. Computer Criminal Behavior

3.14.4. Incident Investigators

3.14.5. The Forensic Investigation Process

3.14.6. What Is Admissible in Court?

3.14.7. Surveillance, Search, and Seizure

3.14.8. Interviewing Suspects

3.15. Liability and its Ramifications

3.15.1. Liability Scenarios Personal Information Hacker Intrusion

3.15.2. Third-Party Risk

3.15.3. Contractual Agreements

3.15.4. Procurement and Vendor Processes

3.16. Compliance

3.17. Personal safety Concerns

4. Software Development Security

4.1. Building Good Code

4.2. Where do we place Security

4.2.1. Different Environments Demand Different Security

4.2.2. Environment vs. Application

4.2.3. Functionality vs. Security

4.2.4. Implementation and Default Issues

4.3. Software Development Lifecycle

4.3.1. Project Management

4.3.2. Requirements Gathering Phase

4.3.3. Design Phase

4.3.4. Development Phase

4.3.5. Testing/Validation Phase Testing Types

4.3.6. Release/Maintenance Phase

4.4. Secure Software Development Best Practices

4.5. Software Development Models

4.5.1. Build and Fix Model

4.5.2. Waterfall Model

4.5.3. V-Shaped Model (V-Model)

4.5.4. Prototyping Rapid prototyping evolutionary prototypes operational prototypes

4.5.5. Incremental Model

4.5.6. Spiral Model

4.5.7. Rapid Application Development

4.5.8. Agile Models

4.5.9. Scrum

4.5.10. Extreme Programming

4.5.11. Kanban

4.5.12. Other Models Exploratory model Joint Application Development (JAD) Reuse model Cleanroom

4.6. Integrated Product Team

4.6.1. DevOps

4.7. Capability Maturity Model Integration

4.8. Change Control

4.8.1. Software Configuration Management

4.8.2. Security of Code Repositories

4.9. Programming Languages and Consepts

4.9.1. Assemblers, Compilers, Interpreters

4.9.2. Object-Oriented Concepts

4.9.3. Other Software Development Concepts Data modeling Data Structures Cohesion and Coupling

4.9.4. Application Programming Interfaces

4.10. Distributed Computing

4.10.1. Distributed Computing Environment

4.10.2. CORBA and ORBs

4.10.3. COM and DCOM Object Linking and Embedding (OLE)

4.10.4. Java Platform, Enterprise Edition

4.10.5. Service-Oriented Architecture

4.11. Mobile Code

4.11.1. Java Applets

4.11.2. ActiveX Controls

4.12. Web Security

4.12.1. Specific Threats for Web Environments Administrative Interfaces Authentication and Access Control Input Validation Parameter validation Session Management

4.12.2. Web Application Security Principles

4.13. Database Management

4.13.1. Database Management Software

4.13.2. Database Models • Relational • Hierarchical • Network • Object-oriented • Object-relational

4.13.3. Database Programming Interfaces Open Database Connectivity (ODBC) Object Linking and Embedding Database (OLE DB) ActiveX Data Objects (ADO) Java Database Connectivity (JDBC)

4.13.4. Relational Database Components Data Dictionary Primary vs. Foreign Key

4.13.5. Integrity

4.13.6. Database Security Issues Database Views Polyinstantiation Online transaction processing (OLTP)

4.13.7. Data Warehousing and Data Mining

4.14. Malicious Software

4.14.1. Viruses

4.14.2. Worms

4.14.3. Rootkit

4.14.4. Spyware and Adware

4.14.5. Botnets

4.14.6. Logic Bombs

4.14.7. Trojan Horses

4.14.8. Antimalware Software

4.14.9. Spam Detection

4.14.10. Antimalware Programs

4.15. Assessing the security of Acquired software

5. Security and Risk Management

5.1. Fundamental Principles of Security

5.1.1. Availability

5.1.2. Integrity

5.1.3. Confidentiality

5.1.4. Balanced Security

5.2. Security Definitions

5.2.1. threat agent

5.2.2. threat

5.2.3. vulnerability

5.2.4. risk

5.2.5. Asset

5.2.6. exposure

5.2.7. control

5.2.8. Safeguard

5.3. Control Types

5.3.1. Administrative

5.3.2. Technical

5.3.3. Physical

5.3.4. Functionalities Preventive Detective Corrective Deterrent Recovery Compensating

5.3.5. defense-in-depth

5.4. Security Framework

5.4.1. ISO/IEC 27000 Series

5.4.2. Entreprise Architecture Development NIST enterprise architecture framework Zachman Architecture Framework The Open Group Architecture Framework (TOGAF) Military-Oriented Architecture Frameworks Department of Defense Architecture Framework (DoDAF) Ministry of Defence Architecture Framework (MODAF) Enterprise Security Architecture Sherwood Applied Business Security Architecture (SABSA) Strategic Alignment Business Enablement Process Enhancement Security Effectiveness Enterprise vs. System Architectures

5.4.3. Security Controls Development Control Objectives for Information and related Technology (COBIT) NIST SP 800-53 COSO Internal Control—Integrated Framework Process Management Development ITIL (formerly the Information Technology Infrastructure Library) Six Sigma Capability Maturity Model Integration (CMMI)

5.4.4. Functionality vs Security

5.5. The Crux Of Computer Crime Laws

5.5.1. computer-assisted crime

5.5.2. computer-targeted crime

5.5.3. computer is incidental

5.6. Complexities in Cybercrime

5.6.1. Electronic Assets

5.6.2. The Evolution of Attacks advanced persistent threat (APT). Internet Relay Chat (IRC)

5.6.3. International Issues Council of Europe (CoE) Convention on Cybercrime Organisation for Economic Co-operation and Development (OECD) European Union Principles on Privacy Safe Harbor Privacy Principles Import/Export Legal Requirements Wassenaar Arrangement cryptographic import restrictions

5.6.4. Types of Legal Systems Civil (Code) Law System Common Law System Customary Law System Religious Law System Mixed Law System

5.7. Intellectual Property Laws

5.7.1. Trade Secret

5.7.2. Copyright law

5.7.3. Trademark

5.7.4. Patent

5.7.5. Software Piracy

5.8. Privacy

5.8.1. The Increasing Need for Privacy Laws

5.8.2. Laws, Directives, and Regulations Federal Privacy Act of 1974 Federal Information Security Management Act of 2002 Department of Veterans Affairs Information Security Protection Act Health Insurance Portability and Accountability Act (HIPAA) Health Information Technology for Economic and Clinical Health (HITECH) Act USA PATRIOT Act Gramm-Leach-Bliley Act (GLBA) Personal Information Protection and Electronic Documents Act Payment Card Industry Data Security Standard (PCI DSS)

5.8.3. Employee Privacy Issues

5.9. Data Breaches

5.9.1. US Laws Pertaining to data Breaches HIPAA HITECH Act GLBA Economic Espionage Act of 1996 State Laws

5.9.2. Other Nation's Laws Pertaining to Data Breaches European Union Other Countries

5.10. Policies, standards, Baselines, Guidelines, and Procedures

5.10.1. Security Policies

5.10.2. Standards

5.10.3. Baselines

5.10.4. Guidelines

5.10.5. Procedures

5.10.6. Implementations

5.11. Risk Management

5.11.1. Holistic Risk Management

5.11.2. Information Systems Risk Management Policy

5.11.3. The risk management Team

5.11.4. The risk management process

5.12. Threat Modeling

5.12.1. Vulnerabilities Information Data at rest Data in motion Data in use Processes People Social engineering Social networks Passwords

5.12.2. Threats

5.12.3. Attacks

5.12.4. Reduction Analysis

5.13. Risk Assessment and Analysis

5.13.1. Risk Assessment and Analysis Team

5.13.2. The value of Information and Assets

5.13.3. Costs that make up the value

5.13.4. Identifying vulnerabilities and threats

5.13.5. Methodology of Risk Assessment NIST FRAP OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation) AS/NZS 4360 Failure Modes and Effect Analysis (FMEA) CRAMM (Central Computing and Telecommunications Agency Risk Analysis and Management Method)

5.13.6. Risk Analysis Approaches quantitative risk analysis qualitative risk analysis Steps of a Quantitative Risk Analysis single loss expectancy (SLE) annual loss expectancy (ALE). exposure factor (EF)

5.13.7. Qualitative Risk Analysis

5.13.8. Protection Mechanisms Control Selection Functionality and Effectiveness of Countermeasures

5.13.9. Putting It Together

5.13.10. Total risk vs Residual risk Handling Risk

5.13.11. Outsourcing

5.14. Risk Management Framework

5.14.1. Categorize information System

5.14.2. Select Security Controls

5.14.3. Implement Security Controls

5.14.4. Assess Security Controls

5.14.5. Authorize Information System

5.14.6. Monitor Security Controls

5.15. Business Continuity and Disaster Recovery

5.15.1. Standard and Best Practices

5.15.2. Making BCM Part of the Entreprise Security Program

5.15.3. BCP Project Components Scope of the Project BCP Policy Project Management Business Continuity Planning Requirements Business Impact Analysis (BIA) Risk Assessment Risk Assessment Evaluation and Process Assigning Values to Assets Interdependencies

5.16. Personnel Security

5.16.1. Hiring Practices

5.16.2. Termination

5.16.3. Security-Awareness Training

5.16.4. Degree or Certification?

5.17. Security Governance

5.17.1. Metrics

5.18. Ethics

5.18.1. The computer ethics institute

5.18.2. The internet architecture board

5.18.3. Corporate ethics programs

5.19. Summary

6. Asset Security

6.1. Information Life Cycle

6.1.1. Acquisition

6.1.2. Use

6.1.3. Archival

6.1.4. Disposal

6.2. Information Classification

6.2.1. Classifications Levels

6.2.2. Classifications Controls

6.3. Layers of Responsability

6.3.1. Executive Management chief executive officer (CEO) chief financial officer (CFO) chief information officer (CIO) chief privacy officer (CPO) chief security officer (CSO)

6.3.2. Data Owner

6.3.3. Data Custodian

6.3.4. System Owner

6.3.5. Security Administrator

6.3.6. Supervisor

6.3.7. Change Control Analyst

6.3.8. Data Analyst

6.3.9. User

6.3.10. Auditor

6.3.11. Why so many roles

6.4. Retention Policies

6.4.1. Developing a Retention Policy How We Retain How Long We Retain What Data We Retain

6.5. Protecting Privacy

6.5.1. Data Owners

6.5.2. Data Processers

6.5.3. Data Remanence

6.5.4. Limits on Collection

6.6. Protecting Assets

6.6.1. Data Security Controls Data at Rest Data in motion Data in use

6.6.2. Media Controls

6.7. Data Leakage

6.7.1. Data Leak Prevention Data leak prevention (DLP) Data Inventories Data Flows Data Data Protection Strategy DLP Resiliency Network DLP (NDLP) Endpoint DLP (EDLP) Hybrid DLP

6.8. Protecting Other Assets

6.8.1. Protecting Mobile Devices

6.8.2. Paper Records

6.8.3. Safes

6.9. Summary

7. Security Engineering

7.1. System Architecture

7.2. Computer Architecture

7.2.1. The Central Processing Unit arithmetic logic unit (ALU). General registers Special registers (dedicated registers) program counter register program status word (PSW) address bus fetch request data bus

7.2.2. Multiprocessing symmetric mode asymmetric mode

7.2.3. Memory Types Random access memory (RAM) dynamic RAM (DRAM) Static RAM (SRAM) Read-only memory (ROM) Programmable read-only memory (PROM) Erasable programmable read-only memory (EPROM) Flash memory Cache memory Memory Mapping buffer overflow Memory Protection Techniques Memory Leaks

7.3. Operating Systems

7.3.1. Process Management Memory Stacks Thread Management Process Scheduling Process Activity

7.3.2. Memory Management Virtual Memory

7.3.3. Input/Output Device Management Interrupts Programmable I/O Interrupt-Driven I/O I/O Using DMA Premapped I/O Fully Mapped I/O

7.3.4. CPU Architecture Integration

7.3.5. Operation System Architectures

7.3.6. Virtual Machines

7.4. Systems Security Architecture

7.4.1. Security Policy

7.4.2. Security Architecture Requirements trusted computing base (TCB) Security Perimeter Reference Monitor security kernel

7.5. Security Models

7.5.1. Bell-LaPadula Model

7.5.2. Biba Model

7.5.3. Clark-Wilson Model

7.5.4. NonInterference Model

7.5.5. Brewer and Nash Model

7.5.6. Graham-Denning Model

7.5.7. Harrison-Ruzzo-Ullman Model

7.6. Systems Evaluation

7.6.1. Common Criteria

7.6.2. Why put a product though evaluation

7.7. Certification vs. Accreditation

7.7.1. Certification

7.7.2. Accreditation

7.8. Open vs Closed Systems

7.8.1. Open Systems

7.8.2. Closed Systems

7.9. Distributed system security

7.9.1. Cloud Computing

7.9.2. Parallel Computing

7.9.3. Databases

7.9.4. Web Applications

7.9.5. Mobile Devices

7.9.6. Cyber-Physical Systems Embedded Systems Internet of Things Industrial control systems (ICS) Programmable logic controllers (PLCs) distributed control system (DCS) supervisory control and data acquisition (SCADA) ICS Security

7.10. A few Threats to Review

7.10.1. Maintenance Hooks

7.10.2. Time-of-check/Time-of-use Attacks

7.11. Cryptography in Context

7.11.1. The history of cryptography scytale cipher Caesar cipher polyalphabetic substitution cipher for Henry III rotor cipher machine Lucifer, Cryptanalysis

7.12. Cryptography Definitions and Consepts

7.12.1. Kerckhoff's Principle

7.12.2. The strength of the cryptosystem

7.12.3. Services of cryptosystems

7.12.4. One-time Pad

7.12.5. Running and Concealment cipher

7.12.6. Steganography

7.13. Types of Ciphers

7.13.1. Substitution Ciphers

7.13.2. Transposition Cipher

7.14. Methods of Encryption

7.14.1. Certificate Authorities

7.14.2. Symmetric vs Asymmetric Algorithms Symmetric Cryptography Asymmetric Cryptography

7.14.3. Block and Stream cipher Block Ciphers A stream cipher

7.14.4. Hybrid Encryption Methods Asymmetric and Symmetric Algorithms Used Together Session Keys

7.15. Types of Symmetrics Systems

7.15.1. Data Encryption Standard Electronic Code Book (ECB) Cipher Block Chaining (CBC) Cipher Feedback (CFB) Output Feedback (OFB) Counter (CTR)


7.15.3. Advanced Encryption Standard

7.15.4. Inrternational Data Encryption Algorithm

7.15.5. Blowfish

7.15.6. RC4

7.15.7. RC5

7.15.8. RC6

7.16. Types of Asymmetric Systems

7.16.1. Diffie-Hellman Algorithm

7.16.2. RSA Diving into Numbers one-way function

7.16.3. El Gamal

7.16.4. Elliptic Curve Cryptosystems

7.16.5. Knapsack

7.16.6. Zero Knowledge Proof

7.17. Message Integrity

7.17.1. The One-Way Hash HMAC Cipher Block Chaining Message Authentication Code (CBC-MAC)

7.17.2. Various Hashing Algorithm

7.17.3. MD4

7.17.4. MD5

7.17.5. SHA

7.17.6. Attacks against One-way Hash Functions

7.17.7. Digital Signature

7.17.8. Digital Signature standard

7.18. Public Key Infrastructure

7.18.1. Certificates

7.18.2. The Registration Authority

7.18.3. PKI Steps

7.19. Key management

7.19.1. Key Management Principles

7.19.2. Rules for Keys and Key Management

7.20. Trusted Platform Module

7.20.1. TPM Uses

7.21. Attacks on Cryptography

7.21.1. Ciphertext-Only Attacks

7.21.2. Know-Plaintext Attacks

7.21.3. Chosen-Plaintext Attacks

7.21.4. Chosen-Ciphertext Attacks

7.21.5. Differential Cryptanalysis

7.21.6. Linear Cryptanalysis

7.21.7. Side-channel Attacks

7.21.8. Replay Attacks

7.21.9. Algebraic Attacks

7.21.10. Analytic Attacks

7.21.11. Statistical Attacks

7.21.12. Social Engineering Attacks

7.21.13. Meet-in-the Middle Attacks

7.22. Site and Facility Security

7.23. The Site Planning Process

7.23.1. Crime Prevention Through Environmental Design Natural access control Natural Surveillance Natural Territorial Reinforcement

7.23.2. Designing a Physical Security Program Facility Construction Internal Compartments Computer and Equipment Rooms

7.24. Protecting Assets

7.24.1. Protecting Mobile Devices

7.24.2. Using Safes

7.25. Internal Support Systems

7.25.1. Electric Power

7.25.2. Environmental Issues

7.25.3. Fire Prevention, Detection, and Suppression

8. Communication and Network Security

8.1. Telecommunications

8.2. Open Systems Interconnexion Reference Model

8.2.1. Protocol

8.2.2. Application Layer .

8.2.3. Presentation Layer .

8.2.4. Session Layer

8.2.5. Transport Layer

8.2.6. Network Layer

8.2.7. Data Link Layer

8.2.8. Physical Layer

8.2.9. Functions and Protocols in the OSI Model Application Presentation Session Transport Network Data Link Physical

8.2.10. Tying the Layers Together

8.2.11. Multilayer Protocols Distributed Network Protocol 3 (DNP3) Controller Area Network bus (CAN bus)

8.3. TCP IP MOdel

8.3.1. TCP TCP Handshake

8.3.2. IP Addressing

8.3.3. IPv6

8.3.4. Layer 2 Security Standards 802.1AE IEEE 802.1AR standard

8.3.5. Converged Protocols

8.4. Types Of Transmission

8.4.1. Analog and Digital

8.4.2. Asynchronous and Synchronous

8.4.3. Broadband and Baseband

8.5. Cabling

8.5.1. Coaxial Cable

8.5.2. Twisted-Pair Cable

8.5.3. Fiber-Optic Cable

8.5.4. Cabling Problems Noise Attenuation Crosstalk Fire Rating of Cables

8.6. Network Foundations

8.6.1. Network Topology ring topology bus topology star topology mesh topology

8.6.2. Media Access Technologies local area network (LAN) Token Passing CSMA Collision Domains Polling Ethernet Token Ring Fiber Distributed Data Interface (FDDI) technology

8.6.3. Transmission Methods

8.6.4. Network Protocols and Services Address Resolution Protocol Dynamic Host Configuration Protocol Internet Control Message Protocol (ICMP) Attacks Using ICMP Simple Network Management Protocol (SNMP)

8.6.5. Domain Name Service Internet DNS and Domains DNS threats Domain Name Registration Issues

8.6.6. E-mail Services Post Office Protocol (POP) Internet Message Access Protocol (IMAP) E-mail Authorization E-mail Relaying E-mail Threats

8.6.7. Network Address Translation

8.6.8. Routing Protocols Dynamic vs. Static Distance-Vector vs. Link-State Interior Routing Protocols Exterior Routing Protocols Routing Protocol Attacks

8.7. Networking devices

8.7.1. Repeaters

8.7.2. Bridges

8.7.3. Routers

8.7.4. Switches Layer 3 and 4 Switches VLANs

8.7.5. Gateways

8.7.6. PBXs

8.7.7. Firewalls Packet filtering stateful firewall proxy firewall Dynamic Packet-Filtering Firewalls kernel proxy firewall next-generation firewall (NGFW) Firewall Architecture Dual-Homed Firewall screened host screened-subnet architecture Virtualized Firewalls The “Shoulds” of Firewalls

8.7.8. Proxy Servers

8.7.9. Honeypot

8.7.10. Unified Threat Management

8.7.11. Content Distribution Networks

8.7.12. Software Defined Networking Control and Forwarding Planes Approaches to SDN

8.8. Intranets and Extranets

8.9. Metropolitan Area Networks

8.9.1. Metro Ethernet

8.10. Wide Area Network

8.10.1. Telecommunications Evolution

8.10.2. Dedicated Links T-carriers E-carriers Optical Carrier

8.10.3. WAN Technologies channel service unit/data service unit (CSU/DSU) Switching Frame Relay Virtual Circuits X.25 Asynchronous Transfer Mode (ATM) Quality of Service (QoS) Synchronous Data Link Control (SDLC) High-level Data Link Control (HDLC) Point-to-Point Protocol (PPP) High-Speed Serial Interface (HSSI) Multiservice access technologies H.323 Gateways Digging Deeper into SIP IP Telephony Issues

8.11. Remote Connectivity

8.11.1. Dial-up Connections

8.11.2. ISDN

8.11.3. DSL

8.11.4. Cable Modems

8.11.5. VPN Point-To-Point Tunneling Protocol Layer 2 Tunneling Protocol (L2TP) Internet Protocol Security IPSec Transport Layer Security (TLS),

8.11.6. Authentication Protocols

8.12. Wireless Network

8.12.1. Wireless Communications Techniques Spread spectrum Frequency Hopping Spread Spectrum Frequency hopping spread spectrum (FHSS) Direct sequence spread spectrum (DSSS) orthogonal frequency-division multiplexing (OFDM).

8.12.2. WLAN Components

8.12.3. Evolution of WLAN Security IEEE Standard 802.11 IEEE Standard 802.11i IEEE Standard 802.1X

8.12.4. Wireless Standards 802.11b 802.11a 802.11e 802.11f 802.11g 802.11h 802.11j 802.11n 802.11ac 802.16 802.15.4 Bluetooth Wireless

8.12.5. Best Practices for Securing WLANs

8.12.6. Satellites

8.12.7. Mobile Wireless Communication

8.13. Network Encryption

8.13.1. Link Encryption vs. End-to-End Encryption

8.13.2. E-mail Encryption Standards Multipurpose Internet Mail Extensions (MIME) Pretty Good Privacy (PGP)

8.13.3. Internet Security Start with the Basics HTTP HTTP Secure HTTP Secure (HTTPS) Secure Sockets Layer Secure Sockets Layer (SSL) Transport Layer Security SSL Cookies Secure Shell Secure Shell (SSH)

8.14. Network Attacks

8.14.1. Denial of Service Malformed Packets Flooding distributed denial-of-service (DDoS) Ransomware

8.14.2. Sniffing

8.14.3. DNS Hijacking

8.14.4. Drive-by Download