Page 483 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 483
explaining basic concepts and terminology used to describe
information system security concepts and talk about secure
computing, secure perimeters, security and access monitors, and
kernel code. We turn to security models to explain how access and
security controls can be implemented. We also briefly explain how
system security may be categorized as either open or closed; describe a
set of standard security techniques used to ensure confidentiality,
integrity, and availability of data; discuss security controls; and
introduce a standard suite of secure networking protocols.
Additional elements of this domain are discussed in various chapters:
Chapter 6, “Cryptography and Symmetric Key Algorithms,” Chapter 7,
“PKI and Cryptographic Applications,” Chapter 9, “Security
Vulnerabilities, Threats, and Countermeasures,” and Chapter 10,
“Physical Security Requirements.” Please be sure to review all of these
chapters to have a complete perspective on the topics of this domain.

