Introduction |
|
xxv | |
Assessment Test |
|
xlviii | |
Part I Getting Started as an SSCP |
|
1 | (60) |
|
Chapter 1 The Business Case for Decision Assurance and Information Security |
|
|
3 | (30) |
|
Information: The Lifeblood of Business |
|
|
4 | (6) |
|
Data, Information, Knowledge, Wisdom S Information Is Not Information Technology |
|
|
8 | (2) |
|
Policy, Procedure, and Process: How Business Gets Business Done |
|
|
10 | (10) |
|
|
11 | (1) |
|
"What's the Business Case for That?" |
|
|
12 | (1) |
|
Purpose, Intent, Goals, Objectives |
|
|
13 | (1) |
|
Business Logic and Business Processes: Transforming Assets into Opportunity, Wealth, and Success |
|
|
14 | (1) |
|
|
15 | (2) |
|
|
17 | (3) |
|
|
20 | (4) |
|
|
20 | (1) |
|
|
20 | (1) |
|
Managing or Executive Directors and the "C-Suite" |
|
|
21 | (1) |
|
Layers of Function, Structure, Management, and Responsibility |
|
|
21 | (2) |
|
Plans and Budgets, Policies, and Directives |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
24 | (2) |
|
|
26 | (7) |
|
Chapter 2 Information Security Fundamentals |
|
|
33 | (28) |
|
The Common Needs for Privacy, Confidentiality, Integrity, and Availability |
|
|
34 | (13) |
|
|
34 | (4) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
Privacy vs. Security, or Privacy and Security? |
|
|
41 | (2) |
|
CIANA+PS Needs of Individuals |
|
|
43 | (1) |
|
Private Business's Need for CIANA+PS |
|
|
44 | (1) |
|
Government's Need for CIANA+PS |
|
|
45 | (1) |
|
The Modern Military's Need for CIA |
|
|
45 | (1) |
|
Do Societies Need CIANA+PS? |
|
|
46 | (1) |
|
Training and Educating Everybody |
|
|
47 | (1) |
|
SSCPs and Professional Ethics |
|
|
47 | (2) |
|
|
49 | (1) |
|
|
50 | (4) |
|
|
54 | (7) |
Part II Integrated Risk Management and Mitigation |
|
61 | (136) |
|
Chapter 3 Integrated Information Risk Management |
|
|
63 | (64) |
|
|
64 | (11) |
|
|
66 | (3) |
|
Risk: When Surprise Becomes Disruption |
|
|
69 | (2) |
|
Information Security: Delivering Decision Assurance |
|
|
71 | (3) |
|
"Common Sense" and Risk Management |
|
|
74 | (1) |
|
|
75 | (8) |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
79 | (1) |
|
Threat-Based (or Vulnerability-Based) Risk |
|
|
79 | (4) |
|
Getting Integrated and Proactive with Information Defense |
|
|
83 | (6) |
|
Lateral Movement: Mitigate with Integrated C3 |
|
|
86 | (1) |
|
|
87 | (1) |
|
Due Care and Due Diligence: Whose Jobs Are These? |
|
|
87 | (1) |
|
Be Prepared: First, Set Priorities |
|
|
88 | (1) |
|
Risk Management: Concepts and Frameworks |
|
|
89 | (6) |
|
The SSCP and Risk Management |
|
|
92 | (1) |
|
|
93 | (2) |
|
|
95 | (12) |
|
Establish Consensus about Information Risk |
|
|
95 | (1) |
|
Information Risk Impact Assessment |
|
|
96 | (1) |
|
Information Classification and Categorization |
|
|
97 | (2) |
|
|
99 | (6) |
|
The Business Impact Analysis |
|
|
105 | (1) |
|
From Assessments to Information Security Requirements |
|
|
106 | (1) |
|
Four Choices for Limiting or Containing Damage |
|
|
107 | (7) |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
111 | (3) |
|
|
114 | (1) |
|
|
114 | (6) |
|
|
120 | (7) |
|
Chapter 4 Operationalizing Risk Mitigation |
|
|
127 | (70) |
|
From Tactical Planning to Information Security Operations |
|
|
128 | (6) |
|
Operationally Outthinking Your Adversaries |
|
|
130 | (2) |
|
Getting Inside the Other Side's OODA Loop |
|
|
132 | (1) |
|
|
133 | (1) |
|
Operationalizing Risk Mitigation: Step by Step |
|
|
134 | (30) |
|
Step 1: Assess the Existing Architectures |
|
|
135 | (7) |
|
Step 2: Assess Vulnerabilities and Threats |
|
|
142 | (10) |
|
Step 3: Select Risk Treatment and Controls |
|
|
152 | (7) |
|
Step 4: Implement Controls |
|
|
159 | (4) |
|
Step 5: Authorize: Senior Leader Acceptance and Ownership |
|
|
163 | (1) |
|
The Ongoing Job of Keeping Your Baseline Secure |
|
|
164 | (10) |
|
Build and Maintain User Engagement with Risk Controls |
|
|
165 | (1) |
|
Participate in Security Assessments |
|
|
166 | (3) |
|
Manage the Architectures: Asset Management and Change Control |
|
|
169 | (5) |
|
Ongoing, Continuous Monitoring |
|
|
174 | (8) |
|
Exploiting What Monitoring and Event Data Is Telling You |
|
|
177 | (4) |
|
Incident Investigation, Analysis, and Reporting |
|
|
181 | (1) |
|
Reporting to and Engaging with Management |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
183 | (6) |
|
|
189 | (8) |
Part III The Technologies of Information Security |
|
197 | (358) |
|
Chapter 5 Communications and Network Security |
|
|
199 | (86) |
|
Trusting Our Communications in a Converged World |
|
|
200 | (6) |
|
CIANA+PS: Applying Security Needs to Networks |
|
|
203 | (2) |
|
Threat Modeling for Communications Systems |
|
|
205 | (1) |
|
Internet Systems Concepts |
|
|
206 | (12) |
|
Datagrams and Protocol Data Units |
|
|
207 | (1) |
|
|
208 | (1) |
|
Packets and Encapsulation |
|
|
209 | (2) |
|
Addressing, Routing, and Switching |
|
|
211 | (1) |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
213 | (4) |
|
"Best Effort" and Trusting Designs |
|
|
217 | (1) |
|
Two Protocol Stacks, One Internet |
|
|
218 | (22) |
|
Complementary, Not Competing, Frameworks |
|
|
218 | (4) |
|
Layer 1: The Physical Layer |
|
|
222 | (1) |
|
Layer 2: The Data Link Layer |
|
|
223 | (2) |
|
Layer 3: The Network Layer |
|
|
225 | (1) |
|
Layer 4: The Transport Layer |
|
|
226 | (4) |
|
Layer 5: The Session Layer |
|
|
230 | (1) |
|
Layer 6: The Presentation Layer |
|
|
231 | (1) |
|
Layer 7: The Application Layer |
|
|
232 | (1) |
|
Cross-Layer Protocols and Services |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
237 | (1) |
|
Software-Defined Networks |
|
|
238 | (1) |
|
|
239 | (1) |
|
Wireless Network Technologies |
|
|
240 | (3) |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
242 | (1) |
|
IP Addresses, DHCP, and Subnets |
|
|
243 | (5) |
|
DHCP Leases: IPv4 and IPv6 |
|
|
243 | (2) |
|
|
245 | (2) |
|
|
247 | (1) |
|
IPv4 vs. IPv6: Important Differences and Options |
|
|
248 | (3) |
|
|
251 | (11) |
|
CIANA at Layer 1: Physical |
|
|
251 | (3) |
|
CIANA at Layer 2: Data Link |
|
|
254 | (2) |
|
CIANA at Layer 3: Network |
|
|
256 | (1) |
|
CIANA at Layer 4: Transport |
|
|
257 | (1) |
|
CIANA at Layer 5: Session |
|
|
258 | (2) |
|
CIANA at Layer 6: Presentation |
|
|
260 | (1) |
|
CIANA at Layer 7: Application |
|
|
260 | (2) |
|
Securing Networks as Systems |
|
|
262 | (11) |
|
Network Security Devices and Services |
|
|
263 | (1) |
|
Wireless Network Access and Security |
|
|
264 | (1) |
|
|
265 | (2) |
|
Monitoring and Analysis for Network Security |
|
|
267 | (2) |
|
|
269 | (1) |
|
Tools for the SOC and the NOC |
|
|
270 | (1) |
|
Integrating Network and Security Management |
|
|
271 | (2) |
|
|
273 | (1) |
|
|
273 | (7) |
|
|
280 | (5) |
|
Chapter 6 Identity and Access Control |
|
|
285 | (64) |
|
Identity and Access: Two Sides of the Same CIANA+PS Coin |
|
|
286 | (2) |
|
Identity Management Concepts |
|
|
288 | (7) |
|
Identity Provisioning and Management |
|
|
289 | (4) |
|
|
293 | (2) |
|
|
295 | (10) |
|
Subjects and Objects-Everywhere! |
|
|
296 | (1) |
|
Data Classification and Access Control |
|
|
297 | (2) |
|
Bell-LaPadula and Biba Models |
|
|
299 | (3) |
|
|
302 | (1) |
|
|
303 | (1) |
|
|
303 | (1) |
|
|
304 | (1) |
|
Rule-Based Access Control |
|
|
304 | (1) |
|
Risk-Based Access Control |
|
|
304 | (1) |
|
Mandatory vs. Discretionary Access Control |
|
|
305 | (1) |
|
|
305 | (5) |
|
|
307 | (1) |
|
|
308 | (1) |
|
|
309 | (1) |
|
Implementing and Scaling IAM |
|
|
310 | (19) |
|
Choices for Access Control Implementations |
|
|
311 | (2) |
|
|
313 | (1) |
|
|
314 | (1) |
|
Multifactor Authentication |
|
|
315 | (4) |
|
|
319 | (1) |
|
|
320 | (1) |
|
|
321 | (1) |
|
|
322 | (1) |
|
Identity as a Service (IDaaS) |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
323 | (2) |
|
|
325 | (1) |
|
|
326 | (2) |
|
Trust Frameworks and Architectures |
|
|
328 | (1) |
|
User and Entity Behavior Analytics (UEBA) |
|
|
329 | (3) |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
334 | (9) |
|
|
343 | (6) |
|
|
349 | (86) |
|
Cryptography: What and Why |
|
|
350 | (8) |
|
Codes and Ciphers: Defining Our Terms |
|
|
352 | (5) |
|
Cryptography, Cryptology, or...? |
|
|
357 | (1) |
|
Building Blocks of Digital Cryptographic Systems |
|
|
358 | (9) |
|
|
359 | (1) |
|
|
360 | (2) |
|
Hashing as One-Way Cryptography |
|
|
362 | (3) |
|
|
365 | (1) |
|
"The Enemy Knows Your System" |
|
|
366 | (1) |
|
|
367 | (3) |
|
Key Storage and Protection |
|
|
367 | (1) |
|
Key Revocation and Disposal |
|
|
368 | (2) |
|
Modern Cryptography: Beyond the "Secret Decoder Ring" |
|
|
370 | (3) |
|
Symmetric Key Cryptography |
|
|
370 | (1) |
|
Asymmetric Key Cryptography |
|
|
370 | (1) |
|
|
371 | (1) |
|
Design and Use of Cryptosystems |
|
|
371 | (1) |
|
Cryptanalysis, Ethical and Unethical |
|
|
372 | (1) |
|
|
373 | (1) |
|
Cryptographic Engineering |
|
|
373 | (1) |
|
"Why Isn't All of This Stuff Secret?" |
|
|
373 | (2) |
|
Cryptography and CIANA+PS |
|
|
375 | (6) |
|
|
376 | (1) |
|
|
376 | (1) |
|
|
376 | (1) |
|
|
377 | (1) |
|
"But I Didn't Get That Email..." |
|
|
378 | (1) |
|
|
379 | (1) |
|
|
380 | (1) |
|
|
381 | (1) |
|
Public Key Infrastructures |
|
|
381 | (18) |
|
Diffie-Hellman-Merkle Public Key Exchange |
|
|
382 | (3) |
|
RSA Encryption and Key Exchange |
|
|
385 | (1) |
|
|
385 | (1) |
|
Elliptical Curve Cryptography (ECC) |
|
|
386 | (1) |
|
|
387 | (1) |
|
Digital Certificates and Certificate Authorities |
|
|
387 | (1) |
|
Hierarchies (or Webs) of Trust |
|
|
388 | (4) |
|
|
392 | (1) |
|
|
393 | (1) |
|
|
394 | (1) |
|
Symmetric Key Algorithms and PKI |
|
|
395 | (1) |
|
Encapsulation for Security: IPSec, ISAKMP, and Others |
|
|
396 | (3) |
|
Applying Cryptography to Meet Different Needs |
|
|
399 | (6) |
|
Message Integrity Controls |
|
|
399 | (1) |
|
|
400 | (1) |
|
|
400 | (1) |
|
|
401 | (2) |
|
Data Storage, Content Distribution, and Archiving |
|
|
403 | (1) |
|
|
404 | (1) |
|
|
404 | (1) |
|
Managing Cryptographic Assets and Systems |
|
|
405 | (2) |
|
Measures of Merit for Cryptographic Solutions |
|
|
407 | (1) |
|
Attacks and Countermeasures |
|
|
408 | (10) |
|
Social Engineering for Key Discovery |
|
|
409 | (1) |
|
|
410 | (1) |
|
Brute Force and Dictionary Attacks |
|
|
410 | (1) |
|
|
411 | (1) |
|
Numeric (Algorithm or Key) Attacks |
|
|
412 | (1) |
|
Traffic Analysis, "Op Intel," and Social Engineering Attacks |
|
|
413 | (1) |
|
Massively Parallel Systems Attacks |
|
|
414 | (1) |
|
Supply Chain Vulnerabilities |
|
|
414 | (1) |
|
The "Sprinkle a Little Crypto Dust on It" Fallacy |
|
|
415 | (1) |
|
|
416 | (2) |
|
|
418 | (2) |
|
|
420 | (3) |
|
Pervasive and Homomorphic Encryption |
|
|
420 | (1) |
|
Quantum Cryptography and Post-Quantum Cryptography |
|
|
421 | (1) |
|
AI, Machine Learning, and Cryptography |
|
|
422 | (1) |
|
|
423 | (1) |
|
|
424 | (5) |
|
|
429 | (6) |
|
Chapter 8 Hardware and Systems Security |
|
|
435 | (48) |
|
Infrastructure Security Is Baseline Management |
|
|
437 | (5) |
|
It's About Access Control... |
|
|
437 | (2) |
|
It's Also About Supply Chain Security |
|
|
439 | (1) |
|
Do Clouds Have Boundaries? |
|
|
439 | (3) |
|
Securing the Physical Context |
|
|
442 | (2) |
|
|
442 | (1) |
|
|
443 | (1) |
|
OT-Intensive (or Reliant) Contexts |
|
|
444 | (1) |
|
Infrastructures 101 and Threat Modeling |
|
|
444 | (13) |
|
Protecting the Trusted Computing Base |
|
|
447 | (1) |
|
|
447 | (2) |
|
|
449 | (2) |
|
Operating Systems Vulnerabilities |
|
|
451 | (3) |
|
Virtual Machines and Vulnerabilities |
|
|
454 | (1) |
|
Network Operating Systems |
|
|
455 | (2) |
|
|
457 | (5) |
|
|
459 | (1) |
|
|
460 | (2) |
|
Malware: Exploiting the Infrastructure's Vulnerabilities |
|
|
462 | (4) |
|
Countering the Malware Threat |
|
|
465 | (1) |
|
Privacy and Secure Browsing |
|
|
466 | (3) |
|
|
469 | (1) |
|
Updating the Threat Model |
|
|
469 | (1) |
|
Managing Your Systems' Security |
|
|
470 | (1) |
|
|
471 | (1) |
|
|
472 | (6) |
|
|
478 | (5) |
|
Chapter 9 Applications, Data, and Cloud Security |
|
|
483 | (72) |
|
It's a Data-Driven World...At the Endpoint |
|
|
484 | (3) |
|
|
487 | (3) |
|
Applications Lifecycles and Security |
|
|
490 | (8) |
|
The Software Development Lifecycle (SDLC) |
|
|
491 | (3) |
|
Why Is (Most) Software So Insecure? |
|
|
494 | (3) |
|
Hard to Design It Right, Easy to Fix It? |
|
|
497 | (1) |
|
CIANA+PS and Applications Software Requirements |
|
|
498 | (6) |
|
Positive and Negative Models for Software Security |
|
|
502 | (1) |
|
Is Negative Control Dead? Or Dying? |
|
|
503 | (1) |
|
Application Vulnerabilities |
|
|
504 | (3) |
|
Vulnerabilities Across the Lifecycle |
|
|
505 | (1) |
|
Human Failures and Frailties |
|
|
506 | (1) |
|
"Shadow IT:" The Dilemma of the User as Builder |
|
|
507 | (4) |
|
Data and Metadata as Procedural Knowledge |
|
|
509 | (2) |
|
Information Quality and Information Assurance |
|
|
511 | (3) |
|
Information Quality Lifecycle |
|
|
512 | (1) |
|
Preventing (or Limiting) the "Garbage In" Problem |
|
|
513 | (1) |
|
Protecting Data in Motion, in Use, and at Rest |
|
|
514 | (8) |
|
Data Exfiltration I: The Traditional Threat |
|
|
516 | (2) |
|
Detecting Unauthorized Data Acquisition |
|
|
518 | (1) |
|
|
519 | (2) |
|
Detecting and Preventing Malformed Data Attacks |
|
|
521 | (1) |
|
Into the Clouds: Endpoint App and Data Security Considerations |
|
|
522 | (11) |
|
Cloud Deployment Models and Information Security |
|
|
524 | (1) |
|
Cloud Service Models and Information Security |
|
|
525 | (2) |
|
Edge and Fog Security: Virtual Becoming Reality |
|
|
527 | (1) |
|
Clouds, Continuity, and Resiliency |
|
|
528 | (1) |
|
Clouds and Threat Modeling |
|
|
529 | (2) |
|
|
531 | (1) |
|
|
532 | (1) |
|
SLAB, TORs, and Penetration Testing |
|
|
532 | (1) |
|
Data Exfiltration II: Hiding in the Clouds |
|
|
533 | (1) |
|
Legal and Regulatory Issues |
|
|
533 | (2) |
|
Countermeasures: Keeping Your Apps and Data Safe and Secure |
|
|
535 | (1) |
|
|
536 | (1) |
|
|
537 | (11) |
|
|
548 | (7) |
Part IV People Power: What Makes or Breaks Information Security |
|
555 | (134) |
|
Chapter 10 Incident Response and Recovery |
|
|
557 | (50) |
|
Defeating the Kill Chain One Skirmish at a Time |
|
|
558 | (6) |
|
Kill Chains: Reviewing the Basics |
|
|
560 | (2) |
|
|
562 | (2) |
|
Harsh Realities of Real Incidents |
|
|
564 | (2) |
|
|
564 | (2) |
|
Learning from Others' Painful Experiences |
|
|
566 | (1) |
|
Incident Response Framework |
|
|
566 | (5) |
|
Incident Response Team: Roles and Structures |
|
|
568 | (2) |
|
Incident Response Priorities |
|
|
570 | (1) |
|
|
571 | (7) |
|
|
572 | (2) |
|
Put the Preparation Plan in Motion |
|
|
574 | (1) |
|
|
575 | (3) |
|
|
578 | (6) |
|
|
578 | (2) |
|
|
580 | (1) |
|
|
581 | (1) |
|
|
582 | (1) |
|
|
583 | (1) |
|
Containment and Eradication |
|
|
584 | (3) |
|
Evidence Gathering, Preservation, and Use |
|
|
585 | (1) |
|
|
586 | (1) |
|
Recovery: Getting Back to Business |
|
|
587 | (3) |
|
|
588 | (1) |
|
Post-Recovery: Notification and Monitoring |
|
|
589 | (1) |
|
|
590 | (4) |
|
|
591 | (1) |
|
|
592 | (1) |
|
Support Ongoing Forensics Investigations |
|
|
592 | (1) |
|
Information and Evidence Retention |
|
|
593 | (1) |
|
Information Sharing with the Larger IT Security Community |
|
|
594 | (1) |
|
|
594 | (1) |
|
|
595 | (6) |
|
|
601 | (6) |
|
Chapter 11 Business Continuity via Information Security and People Power |
|
|
607 | (40) |
|
|
608 | (1) |
|
Surviving to Operate: Plan for It! |
|
|
609 | (6) |
|
|
610 | (1) |
|
IS Disaster Recovery Plans |
|
|
610 | (1) |
|
Plans, More Plans, and Triage |
|
|
611 | (4) |
|
Timelines for BC/DR Planning and Action |
|
|
615 | (2) |
|
|
617 | (6) |
|
Backups, Archives, and Image Copies |
|
|
618 | (2) |
|
Cryptographic Assets and Recovery |
|
|
620 | (1) |
|
"Golden Images" and Validation |
|
|
621 | (1) |
|
Scan Before Loading: Blocking Historical Zero-Day Attacks |
|
|
622 | (1) |
|
Restart from a Clean Baseline |
|
|
622 | (1) |
|
Cloud-Based "Do-Over" Buttons for Continuity, Security, and Resilience |
|
|
623 | (3) |
|
Restoring a Virtual Organization |
|
|
625 | (1) |
|
|
626 | (7) |
|
Threat Vectors: It Is a Dangerous World Out There |
|
|
628 | (3) |
|
|
631 | (1) |
|
|
632 | (1) |
|
Security Assessment: For BC/DR and Compliance |
|
|
633 | (1) |
|
Converged Communications: Keeping Them Secure During BC/DR Actions |
|
|
634 | (3) |
|
|
635 | (1) |
|
People Power for Secure Communications |
|
|
636 | (1) |
|
|
637 | (1) |
|
|
637 | (4) |
|
|
641 | (6) |
|
Chapter 12 Cross-Domain Challenges |
|
|
647 | (42) |
|
Operationalizing Security Across the Immediate and Longer Term |
|
|
648 | (9) |
|
Continuous Assessment and Continuous Compliance |
|
|
650 | (1) |
|
|
651 | (2) |
|
SOAR: Strategies for Focused Security Effort |
|
|
653 | (2) |
|
A "DevSecOps" Culture: SOAR for Software Development |
|
|
655 | (1) |
|
Just-in-Time Education, Training, and Awareness |
|
|
656 | (1) |
|
Supply Chains, Security, and the SSCP |
|
|
657 | (5) |
|
ICS, IoT, and SCADA: More Than SUNBURST |
|
|
658 | (2) |
|
Extending Physical Security: More Than Just Badges and Locks |
|
|
660 | (1) |
|
All-Source, Proactive Intelligence: The SOC as a Fusion Center |
|
|
661 | (1) |
|
Other Dangers on the Web and Net |
|
|
662 | (4) |
|
Surface, Deep, and Dark Webs |
|
|
662 | (2) |
|
Deep and Dark: Risks and Countermeasures |
|
|
664 | (1) |
|
DNS and Namespace Exploit Risks |
|
|
665 | (1) |
|
|
666 | (6) |
|
Cloud Security: Edgier and Foggier |
|
|
667 | (1) |
|
AI, ML, and Analytics: Explicability and Trustworthiness |
|
|
667 | (2) |
|
Quantum Communications, Computing, and Cryptography |
|
|
669 | (1) |
|
Paradigm Shifts in Information Security? |
|
|
669 | (2) |
|
Perception Management and Information Security |
|
|
671 | (1) |
|
Widespread Lack of Useful Understanding of Core Technologies |
|
|
672 | (1) |
|
|
672 | (5) |
|
You Cannot Legislate Security (But You Can Punish Noncompliance) |
|
|
673 | (1) |
|
It's About Managing Our Security and Our Systems |
|
|
673 | (1) |
|
|
674 | (1) |
|
Maintain Flexibility of Vision |
|
|
675 | (1) |
|
Accountability-It's Personal. Make It So |
|
|
675 | (1) |
|
|
676 | (1) |
|
|
677 | (1) |
|
|
678 | (1) |
|
|
678 | (5) |
|
|
683 | (6) |
Appendix Answers to Review Questions |
|
689 | (38) |
|
Chapter 1: The Business Case for Decision Assurance and Information Security |
|
|
690 | (3) |
|
Chapter 2: Information Security Fundamentals |
|
|
693 | (2) |
|
Chapter 3: Integrated Information Risk Management |
|
|
695 | (3) |
|
Chapter 4: Operationalizing Risk Mitigation |
|
|
698 | (3) |
|
Chapter 5: Communications and Network Security |
|
|
701 | (3) |
|
Chapter 6: Identity and Access Control |
|
|
704 | (3) |
|
|
707 | (2) |
|
Chapter 8: Hardware and Systems Security |
|
|
709 | (3) |
|
Chapter 9: Applications, Data, and Cloud Security |
|
|
712 | (3) |
|
Chapter 10: Incident Response and Recovery |
|
|
715 | (3) |
|
Chapter 11: Business Continuity via Information Security and People Power |
|
|
718 | (4) |
|
Chapter 12: Cross-Domain Challenges |
|
|
722 | (5) |
Index |
|
727 | |