Page 483 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 483

explaining basic concepts and terminology used to describe
               information system security concepts and talk about secure

               computing, secure perimeters, security and access monitors, and
               kernel code. We turn to security models to explain how access and
               security controls can be implemented. We also briefly explain how
               system security may be categorized as either open or closed; describe a
               set of standard security techniques used to ensure confidentiality,
               integrity, and availability of data; discuss security controls; and
               introduce a standard suite of secure networking protocols.


               Additional elements of this domain are discussed in various chapters:
               Chapter 6, “Cryptography and Symmetric Key Algorithms,” Chapter 7,
               “PKI and Cryptographic Applications,” Chapter 9, “Security
               Vulnerabilities, Threats, and Countermeasures,” and Chapter 10,
               “Physical Security Requirements.” Please be sure to review all of these
               chapters to have a complete perspective on the topics of this domain.
   478   479   480   481   482   483   484   485   486   487   488