Cissp
A security model provides a way for designers to map abstract statements into a security policy that prescribes the algorithms and data structures necessary to build hardware and software.
Mike Chapple, James M. Stewart, Darril Gibson • Cissp
The modulo function is just as important to cryptography as the logical operations are. Be sure you’re familiar with its functionality and can perform simple modular math.
Mike Chapple, James M. Stewart, Darril Gibson • Cissp
Here are some excellent resources related to security integrated with acquisition: Improving Cybersecurity and Resilience through Acquisition. Final Report of the Department of Defense and General Services Administration, published November 2013 (www.gsa.gov/portal/getMediaData?mediaId=185371) NIST Special Publication 800-64 Revision 2: Security Co
... See moreMike Chapple, James M. Stewart, Darril Gibson • Cissp
Security is aimed at preventing loss or disclosure of data while sustaining authorized access. The possibility that something could happen to damage, destroy, or disclose data or other resources is known as risk. Understanding risk management concepts is not only important for the CISSP exam, it’s also essential to the establishment of a sufficient
... See moreMike Chapple, James M. Stewart, Darril Gibson • Cissp
The state machine model describes a system that is always secure no matter what state it is in. It’s based on the computer science definition of a finite state machine (FSM). An FSM combines an external input with an internal machine state to model all kinds of complex systems, including parsers, decoders, and interpreters.
Mike Chapple, James M. Stewart, Darril Gibson • Cissp
This image is an example of a data flow diagram that shows each major component of a system, the boundaries between security zones, and the potential flow or movement of information and data. By crafting such a diagram for each environment or system, it is possible to more closely examine each point where a compromise could occur.
Mike Chapple, James M. Stewart, Darril Gibson • Cissp
Segregation of duties is similar to a separation of duties and responsibilities policy, but it also combines the principle of least privilege.
Mike Chapple, James M. Stewart, Darril Gibson • Cissp
Trike is used to craft an assessment of an acceptable level of risk for each class of asset that is then used to determine appropriate risk response actions.
Mike Chapple, James M. Stewart, Darril Gibson • Cissp
A strategic plan is a long-term plan that is fairly stable. It defines the organization’s security purpose. It also helps to understand security function and align it to the goals, mission, and objectives of the organization.