Page 362 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 362

Chapter 6

               Cryptography and Symmetric Key Algorithms


               THE CISSP EXAM TOPICS COVERED IN THIS CHAPTER

               INCLUDE:

                      Domain 2: Asset Security

                        2.5 Determine data security controls

                             2.5.1 Understand data states

                      Domain 3: Security Architecture and Engineering

                        3.5 Assess and mitigate the vulnerabilities of security
                        architectures, designs, and solution elements

                             3.5.4 Cryptographic systems

                        3.9 Apply cryptography


                             3.9.1 Cryptographic lifecycle (e.g., key management,
                             algorithm selection)

                             3.9.2 Cryptographic methods (e.g., symmetric, asymmetric,
                             elliptic curves)

                             3.9.6 Nonrepudiation

                             3.9.7 Integrity (e.g. hashing)













                                       Cryptography provides confidentiality, integrity,

               authentication, and nonrepudiation for sensitive information while it
               is stored (at rest), traveling across a network (in transit), and existing
               in memory (in use). Cryptography is an extremely important security
               technology that is embedded in many of the controls used to protect
   357   358   359   360   361   362   363   364   365   366   367