Page 940 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 940

Understand how email security works. Internet email is based
               on SMTP, POP3, and IMAP. It is inherently insecure. It can be

               secured, but the methods used must be addressed in a security policy.
               Email security solutions include using S/MIME, MOSS, PEM, or PGP.

               Know how fax security works. Fax security is primarily based on
               using encrypted transmissions or encrypted communication lines to
               protect the faxed materials. The primary goal is to prevent
               interception. Activity logs and exception reports can be used to detect

               anomalies in fax activity that could be symptoms of attack.
               Know the threats associated with PBX systems and the

               countermeasures to PBX fraud. Countermeasures to PBX fraud
               and abuse include many of the same precautions you would employ to
               protect a typical computer network: logical or technical controls,
               administrative controls, and physical controls.

               Understand the security issues related to VoIP. VoIP is at risk
               for caller ID spoofing, vishing, SPIT, call manager software/firmware

               attacks, phone hardware attacks, DoS, MitM, spoofing, and switch
               hopping.

               Recognize what a phreaker is. Phreaking is a specific type of
               attack in which various types of technology are used to circumvent the
               telephone system to make free long-distance calls, to alter the function
               of telephone service, to steal specialized services, or even to cause
               service disruptions. Common tools of phreakers include black, red,

               blue, and white boxes.

               Understand voice communications security. Voice
               communications are vulnerable to many attacks, especially as voice
               communications become an important part of network services. You
               can obtain confidentiality by using encrypted communications.
               Countermeasures must be deployed to protect against interception,
               eavesdropping, tapping, and other types of exploitation. Be familiar

               with voice communication topics, such as POTS, PSTN, PBX, and
               VoIP.

               Be able to explain what social engineering is. Social
               engineering is a means by which an unknown person gains the trust of
   935   936   937   938   939   940   941   942   943   944   945