Page 546 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 546

Chapter 9

               Security Vulnerabilities, Threats, and

               Countermeasures


               THE CISSP EXAM TOPICS COVERED IN THIS CHAPTER

               INCLUDE:

                      Domain 3: Security Architecture and Engineering

                        3.5 Assess and mitigate the vulnerabilities of security
                        architectures, designs, and solution elements

                             3.5.1 Client-based systems

                             3.5.2 Server-based systems

                             3.5.3 Database systems

                             3.5.5 Industrial control systems (ICS)

                             3.5.6 Cloud-based systems

                             3.5.7 Distributed systems


                             3.5.8 Internet of Things (IoT)

                        3.6 Assess and mitigate vulnerabilities in web-based systems

                        3.7 Assess and mitigate vulnerabilities in mobile systems

                        3.8 Assess and mitigate vulnerabilities in embedded devices













                                       In previous chapters of this book, we’ve covered
               basic security principles and the protective mechanisms put in place to

               prevent violation of them. We’ve also examined some of the specific
               types of attacks used by malicious individuals seeking to circumvent
   541   542   543   544   545   546   547   548   549   550   551