Page 1453 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1453

Chapter 21

               Malicious Code and Application Attacks


               THE CISSP EXAM TOPICS COVERED IN THIS CHAPTER

               INCLUDE:

                      Domain 3: Security Architecture and Engineering

                        3.5 Assess and mitigate the vulnerabilities of security
                        architectures, designs, and solution elements

                        3.6 Assess and mitigate vulnerabilities in web-based systems

                      Domain 8: Software Development Security

                        8.2 Identify and apply security controls in development
                        environments


                             8.2.1 Security of the software environments
                        8.5 Define and apply secure coding guidelines and standards


                             8.5.1 Security weaknesses and vulnerabilities at the source-
                             code level













                                       In previous chapters, you learned about many
               general security principles and the policy and procedure mechanisms

               that help security practitioners develop adequate protection against
               malicious individuals. This chapter takes an in-depth look at some of
               the specific threats faced on a daily basis by administrators in the field.

               This material is not only critical for the CISSP exam; it’s also some of
               the most basic information a computer security professional must
               understand to effectively practice their trade. We’ll begin this chapter

               by looking at the risks posed by malicious code objects—viruses,
   1448   1449   1450   1451   1452   1453   1454   1455   1456   1457   1458