CISSP For Dummies
Chapter 4: Access Control
- Figure 4-1: Use CER to compare FAR and FRR.
- Figure 4-2: Kerberos: Logon initiation (Step 1).
- Figure 4-3: Kerberos: Client/TGS Session Key and TGT generation (Step 2).
- Figure 4-4: Kerberos: Logon completion (Step 3).
- Figure 4-5: Kerberos: Requesting services (Step 4).
- Figure 4-6: Kerberos: Client/ Server Session Key and Service Ticket generation (Step 5).
- Figure 4-7: Kerberos: Decrypt Client/ Server Session Key (Step 6).
- Figure 4-8: Kerberos: Client/ Server communications (Step 7).
Chapter 5: Telecommunications and Network Security
- Figure 5-1: The seven layers of the OSI model.
- Figure 5-2: Data encapsulation in the OSI model.
- Figure 5-3: An FDDI network example.
Chapter 6: Information Security and Risk Management
- Figure 6-1: The C-I-A triad.
Chapter 7: Application Security
- Figure 7-1: A typical system develop-ment model takes a project from start to finish.
Chapter 9: Security Architecture and Design
- Figure 9-1: The main components of a CPU.
Chapter 13: Physical (Environmental) Security
- Figure 13-1: A fire needs these three elements to burn.
Категории