Description |
1 online resource |
Contents |
Intro; CISSP The Official (ISC)2® CISSP® CBK® Reference; Lead Author and Lead Technical Reviewer; Contributing Authors; Technical Reviewers; Contents at a Glance; Contents; Foreword; Introduction; Security and Risk Management; Asset Security; Security Architecture and Engineering; Communication and Network Security; Identity and Access Management (IAM); Security Assessment and Testing; Security Operations; Software Development Security; Domain 1: Security and Risk Management; Understand and Apply Concepts of Confidentiality, Integrity, and Availability; Information Security |
|
Evaluate and Apply Security Governance PrinciplesAlignment of Security Functions to Business Strategy, Goals, Mission, and Objectives; Vision, Mission, and Strategy; Governance; Due Care; Determine Compliance Requirements; Legal Compliance; Jurisdiction; Legal Tradition; Legal Compliance Expectations; Understand Legal and Regulatory Issues That Pertain to Information Security in a Global Context; Cyber Crimes and Data Breaches; Privacy; Understand, Adhere to, and Promote Professional Ethics; Ethical Decision-Making; Established Standards of Ethical Conduct; (ISC)² Ethical Practices |
|
Develop, Document, and Implement Security Policy, Standards, Procedures, and GuidelinesOrganizational Documents; Policy Development; Policy Review Process; Identify, Analyze, and Prioritize Business Continuity Requirements; Develop and Document Scope and Plan; Risk Assessment; Business Impact Analysis; Develop the Business Continuity Plan; Contribute to and Enforce Personnel Security Policies and Procedures; Key Control Principles; Candidate Screening and Hiring; Onboarding and Termination Processes; Vendor, Consultant, and Contractor Agreements and Controls; Privacy in the Workplace |
|
Understand and Apply Risk Management ConceptsRisk; Risk Management Frameworks; Risk Assessment Methodologies; Understand and Apply Threat Modeling Concepts and Methodologies; Threat Modeling Concepts; Threat Modeling Methodologies; Apply Risk-Based Management Concepts to the Supply Chain; Supply Chain Risks; Supply Chain Risk Management; Establish and Maintain a Security Awareness, Education, and Training Program; Security Awareness Overview; Developing an Awareness Program; Training; Summary; Domain 2: Asset Security; Asset Security Concepts; Data Policy; Data Governance; Data Quality |
|
Data DocumentationData Organization; Identify and Classify Information and Assets; Asset Classification; Determine and Maintain Information and Asset Ownership; Asset Management Lifecycle; Software Asset Management; Protect Privacy; Cross-Border Privacy and Data Flow Protection; Data Owners; Data Controllers; Data Processors; Data Stewards; Data Custodians; Data Remanence; Data Sovereignty; Data Localization or Residency; Government and Law Enforcement Access to Data; Collection Limitation; Understanding Data States; Data Issues with Emerging Technologies; Ensure Appropriate Asset Retention |
Notes |
Online resource; title from PDF title page (EBSCO, viewed April 9, 2019) |
Subject |
Computer networks -- Security measures -- Examinations -- Study guides
|
|
Computers -- Access control -- Examinations -- Study guides
|
|
Administrative agencies -- Information resources management -- Security measures -- United States -- Examinations -- Study guides
|
|
Telecommunications engineers -- Certification -- United States
|
|
BUSINESS & ECONOMICS -- Industrial Management.
|
|
BUSINESS & ECONOMICS -- Management.
|
|
BUSINESS & ECONOMICS -- Management Science.
|
|
BUSINESS & ECONOMICS -- Organizational Behavior.
|
|
Computer networks -- Security measures -- Examinations.
|
|
Telecommunications engineers -- Certification.
|
|
United States.
|
Genre/Form |
examination study guides.
|
|
Study guides.
|
|
Study guides.
|
|
Guides de l'étudiant.
|
Form |
Electronic book
|
Author |
Graff, Mark, contributor
|
|
Henry, Kevin, contributor
|
|
Hoover, Christopher, contributor
|
|
Malisow, Ben, contributor
|
|
Murphy, Sean, contributor
|
|
Oakes, Charles, contributor
|
|
Pajari, George, contributor
|
|
Parker, Jeff T., contributor
|
|
Seidl, David, contributor
|
|
Vasquez, Mike, contributor
|
ISBN |
9781119423300 |
|
1119423309 |
|
9781119423324 |
|
1119423325 |
|
9781119423317 |
|
1119423317 |
|