Page 28 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 28

FIGURE 14.1 Defense in depth with layered security

                        FIGURE 14.2 Role Based Access Control


                        FIGURE 14.3 A representation of the boundaries provided by
                        lattice-based access controls

                        FIGURE 14.4 Wireshark capture

                    Chapter 15

                        FIGURE 15.1 Nmap scan of a web server run from a Linux
                        system

                        FIGURE 15.2 Default Apache server page running on the
                        server scanned in Figure 15.1

                        FIGURE 15.3 Nmap scan of a large network run from a Mac

                        system using the Terminal utility

                        FIGURE 15.4 Network vulnerability scan of the same web
                        server that was port scanned in Figure 15.1

                        FIGURE 15.5 Web application vulnerability scan of the same
                        web server that was port scanned in Figure 15.1 and network
                        vulnerability scanned in Figure 15.2.

                        FIGURE 15.6 Scanning a database-backed application with

                        sqlmap
                        FIGURE 15.7 Penetration testing process


                        FIGURE 15.8 The Metasploit automated system exploitation
                        tool allows attackers to quickly execute common attacks against
                        target systems.

                        FIGURE 15.9 Fagan inspections follow a rigid formal process,
                        with defined entry and exit criteria that must be met before
                        transitioning between stages.

                        FIGURE 15.10 Prefuzzing input file containing a series of 1s


                        FIGURE 15.11 The input file from Figure 15.10 after being run
                        through the zzuf mutation fuzzing tool

                    Chapter 16
   23   24   25   26   27   28   29   30   31   32   33