
CISSP备考资料
文章平均质量分 68
debugeeker
曾在华为,商汤,腾讯呆过。个人公众号debugeeker
展开
-
CISSP考试指南笔记:8.15 快速提示
Security should be addressed in each phase of system development. It should not be addressed only at the end of development because of the added cost, time, and effort and the lack of functionality. The attack surface is the collection of possible e..原创 2021-04-16 22:59:28 · 426 阅读 · 0 评论 -
CISSP考试指南笔记:8.14 评估外部获取软件的安全性
In many cases, our approach to mitigating the risks of acquired software will begin with an assessment of the vendor.A key element in assessing the security of acquired software is, rather obviously, its performance on an internal assessment.剩余内容请关注本人公原创 2021-04-16 22:58:11 · 159 阅读 · 0 评论 -
CISSP考试指南笔记:8.13 恶意软件
Adhering to the usual rules of not opening an e-mail attachment or clicking on a link that comes from an unknown source is one of the best ways to combat malicious code.VirusesAvirusis a small application, or string of code, that infects software. Th..原创 2021-04-16 22:56:22 · 216 阅读 · 0 评论 -
CISSP考试指南笔记:8.12 数据库管理
Database Management SoftwareAdatabaseis a collection of data stored in a meaningful way that enables multiple users and applications to access, view, and modify that data as needed.Adatabase management system (DBMS)is a suite of programs used to ma...原创 2021-04-16 22:53:58 · 284 阅读 · 0 评论 -
CISSP考试指南笔记:8.11 web安全
Specific Threats for Web EnvironmentsAdministrative InterfacesUsing a web-based administrative interface is, in most opinions, a bad idea.A bad habit that’s found even in high-security environments is hard-coding authentication credentials into the l原创 2021-04-16 22:52:39 · 188 阅读 · 0 评论 -
CISSP考试指南笔记:8.10 移动代码
Code that can be transmitted across a network, to be executed by a system or device on the other end, is calledmobile code.Java AppletsJava is an object-oriented, platform-independent programming language. It is employed as a full-fledged programming .原创 2021-04-16 22:51:12 · 179 阅读 · 0 评论 -
CISSP考试指南笔记:8.9 分布式计算
A distributed object computing model needs toregisterthe client and server components, which means to find out here they live on the network, what their names or IDs are, and what type of functionality the different components carry out.Distributed Com..原创 2021-03-30 00:19:32 · 129 阅读 · 0 评论 -
CISSP考试指南笔记:8.8 编程语言和概念
Machine languageis in a format that the computer’s processor can understand and work with directly.Anassembly languageis considered a low-level programming language and is the symbolic representation of machine-level instructions.Third-generation pr...原创 2021-03-30 00:18:45 · 230 阅读 · 0 评论 -
CISSP考试指南笔记:8.7 安全编码
Secure codingis the process of developing software that is free from defects, particularly those that could be exploited by an adversary to cause us harm or loss.Source Code VulnerabilitiesTheOpen Web Application Security Project (OWASP)is an organi...原创 2021-03-30 00:19:52 · 178 阅读 · 0 评论 -
CISSP考试指南笔记:8.6 开发环境的安全
there are three major elements we should stress when it comes to security of development environments: the development platforms, the code repositories, and the software configurations.Security of Development Platformsthe first step in ensuring the sec原创 2021-03-30 00:16:43 · 209 阅读 · 0 评论 -
CISSP考试指南笔记:8.5 变更控制
Change managementis a systematic approach to deliberately regulating the changing nature of projects, including software development projects.Change ControlChange controlis the process of controlling the specific changes that take place during the li..原创 2021-03-30 00:15:18 · 332 阅读 · 0 评论 -
CISSP考试指南笔记:8.4 能力成熟度模型
Capability Maturity Model Integration (CMMI)is a comprehensive, integrated set of guidelines for developing products and software.CMMI describes procedures, principles, and practices that underlie software development process maturity.The five maturit.原创 2021-03-30 00:15:51 · 339 阅读 · 0 评论 -
CISSP考试指南笔记:8.3 软件开发模型
Waterfall MethodologyThe Waterfall methodology uses a linear-sequential life-cycle approach,Each phase must be completed in its entirety before the next phase can begin. At the end of each phase, a review takes place to make sure the project is on the co原创 2021-03-30 00:13:29 · 161 阅读 · 0 评论 -
CISSP考试指南笔记:8.2 软件开发生命周期
There have been several software development life cycle (SDLC) models developed over the years, the crux of each model deals with the following phases: Requirements gathering Design Development Testing Operations and maintenance Pr原创 2021-03-30 00:12:40 · 235 阅读 · 0 评论 -
CISSP考试指南笔记:8.1 创建好的代码
Quality can be defined as fitness for purpose.Code reviews and interface testing, are key elements in ensuring software quality.Software controls come in various flavors and have many different goals. They can control input, encryption, logic process..原创 2021-03-30 00:11:53 · 186 阅读 · 0 评论 -
CISSP考试指南笔记:7.14 快速提示
Facilities that house systems that process sensitive information should have physical access controls to limit access to authorized personnel only. Clipping levels should be implemented to establish a baseline of user activity and acceptable errors...原创 2021-03-17 00:28:12 · 237 阅读 · 0 评论 -
CISSP考试指南笔记:7.13 个人安全问题
The single most valuable asset for an organization, and the one that involves the highest moral and ethical standards, is its people.Emergency ManagementA common tool for ensuring the safety of personnel during emergencies is the occupant emergency pla原创 2021-03-14 16:21:41 · 216 阅读 · 0 评论 -
CISSP考试指南笔记:7.12 实施灾难恢复
Recovering from a disaster begins way before the event occurs. It starts by anticipating threats and developing goals that support the business’s continuity of operations.A goal must contain certain key information, such as the following: Responsibili原创 2021-03-14 16:20:53 · 217 阅读 · 0 评论 -
CISSP考试指南笔记:7.11 保险
The BCP team should work with management to understand what the current coverage is, the various insurance options, and the limits of each option. The goal here is to make sure the insurance coverage fills in the gap of what the current preventive counterm原创 2021-03-12 23:40:47 · 167 阅读 · 0 评论 -
CISSP考试指南笔记:7.10 义务及其后果
In the context of security,due caremeans that a company did all it could have reasonably done, under the circumstances, to prevent security breaches, and also took reasonable steps to ensure that if a security breach did take place, proper controls or co..原创 2021-03-12 00:24:12 · 186 阅读 · 0 评论 -
CISSP考试指南笔记:7.9 灾难恢复
Therecovery time objective (RTO)is the maximum time period within which a business process must be restored to a designated service level after a disaster to avoid unacceptable consequences associated with a break in business continuity.Thework recove...原创 2021-03-12 00:23:27 · 269 阅读 · 0 评论 -
CISSP考试指南笔记:7.8 调查
When a potential computer crime takes place, it is critical that the investigation steps are carried out properly to ensure that the evidence will be admissible to the court if things go that far and that it can stand up under the cross-examination and scr原创 2021-03-12 00:22:38 · 156 阅读 · 0 评论 -
CISSP考试指南笔记:7.7 事故管理流程
There are many incident management models, but all share some basic characteristics. They all require that we identify the event, analyze it to determine the appropriate counteractions, correct the problem(s), and, finally, keep the event from happening ag原创 2021-03-12 00:21:58 · 350 阅读 · 0 评论 -
CISSP考试指南笔记:7.6 预防和检测
The steps of this generalized process are described here: Understand the risk. Use the right controls. Use the controls correctly. Manage your configuration. Assess your operation. Continuous MonitoringNIST Special Publication 80原创 2021-03-07 23:13:35 · 282 阅读 · 0 评论 -
CISSP考试指南笔记:7.5 网络和资源可用性
Another key component of security operations is planning for and dealing with the inevitable failures of the component parts of our information systems.The network needs to be properly maintained to make sure the network and its resources will always be原创 2021-03-07 01:08:50 · 122 阅读 · 0 评论 -
CISSP考试指南笔记:7.4 安全资源配置
provisioning is the set of all activities required to provide one or more new information services to a user or group of users.At the heart of provisioning is the imperative to provide these services in a secure manner.Asset Inventorythe most essenti原创 2021-03-06 00:09:54 · 196 阅读 · 0 评论 -
CISSP考试指南笔记:7.3 物理安全
As any other defensive technique, physical security should be implemented by using a layered approach.It is also important to have a diversity of controls.This defense model should work in two main modes: one mode during normal facility operations and原创 2021-03-06 00:07:52 · 185 阅读 · 0 评论 -
CISSP考试指南笔记:7.2 行政管理
Administrative management is a very important piece of operational security. One aspect of administrative management is dealing with personnel issues. This includes separation of duties and job rotation. The objective of separation of duties is to ensure t原创 2021-03-06 00:06:50 · 169 阅读 · 0 评论 -
CISSP考试指南笔记:7.1 运营部门的角色
The continual effort to make sure the correct policies, procedures, standards, and guidelines are in place and being followed is an important piece of the due care and due diligence efforts that companies need to perform.Security operations is all abou.原创 2021-03-06 00:06:04 · 176 阅读 · 0 评论 -
CISSP考试指南笔记:6.6 快速提示
An audit is a systematic assessment of the security controls of an information system. Setting a clear set of goals is probably the most important step of planning a security audit. Internal audits benefit from the auditors’ familiarity with th..原创 2021-03-06 00:05:23 · 332 阅读 · 0 评论 -
CISSP考试指南笔记:6.5 管理评审
A management review is a formal meeting of senior organizational leaders to determine whether the management systems are effectively accomplishing their goals.While management reviews have been around for a very long time, the modern use of the term is p原创 2021-03-06 00:04:34 · 265 阅读 · 0 评论 -
CISSP考试指南笔记:6.4 报告
Analyzing ResultsOnly after analyzing the results can you provide insights and recommendations that will be valuable to senior decision-makers.First you gather all your data, organize it, and study it carefully.The second step in your analysis is to原创 2021-03-06 00:03:19 · 175 阅读 · 0 评论 -
CISSP考试指南笔记:6.3 审计管理控制
Account ManagementA preferred technique of attackers is to become “normal” privileged users of the systems they compromise as soon as possible. They can accomplish this in at least three ways: compromise an existing privileged account, create a new privi原创 2021-03-06 00:02:25 · 216 阅读 · 0 评论 -
CISSP考试指南笔记:6.2 审计技术控制
Atechnical controlis a security control implemented through the use of an IT asset.Vulnerability TestingVulnerability testing requires staff and/or consultants with a deep security background and the highest level of trustworthiness.The goals of th..原创 2021-03-06 00:01:15 · 254 阅读 · 0 评论 -
CISSP考试指南笔记:6.1 评估、测试和审计策略
Atestis a procedure that records some set of properties or behaviors in a system being tested and compares them against predetermined standards.Anassessmentis a series of planned tests that are somehow related to each other.Anauditis a systematic...原创 2021-03-06 00:00:17 · 183 阅读 · 0 评论 -
CISSP考试指南笔记:5.12 快速提示
Access is a flow of information between a subject and an object. A subject is an active entity that requests access to an object, which is a passive entity. A subject can be a user, program, or process. Some security mechanisms that provid..原创 2021-03-05 23:53:05 · 304 阅读 · 0 评论 -
CISSP考试指南笔记:5.11 针对访问控制的攻击
Dictionary AttackCrack program hashes the dictionary words and compares the resulting message digest with the system password file that also stores its passwords in a one-way hashed format. If the hashed values match, it means a password has just been un原创 2021-02-23 16:04:29 · 482 阅读 · 0 评论 -
CISSP考试指南笔记:5.10 访问控制监控
Intrusion Detection SystemsIntrusion detection systems (IDSs)are different from traditional firewall products because they are designed to detect a security breach. Intrusion detection is the process of detecting an unauthorized use of, or attack upon,..原创 2021-02-23 16:03:40 · 394 阅读 · 0 评论 -
CISSP考试指南笔记:5.9 访问控制实践
The following is a list of tasks that must be done on a regular basis to ensure security stays at a satisfactory level: Deny access to systems to undefined users or anonymous accounts. Limit and monitor the usage of administrator and other powerful原创 2021-02-23 16:02:39 · 476 阅读 · 1 评论 -
CISSP考试指南笔记:5.8 物理/逻辑访问的控制
Access Control LayersAdministrative controls: Policy and procedures Personnel controls Supervisory structure Security-awareness training Testing Physical controls: Network segregation Perimeter security Computer cont原创 2021-02-23 16:01:47 · 482 阅读 · 0 评论