CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • Foundation Summary


    The "Foundation Summary" section of each chapter lists the most important facts from the chapter. Although this section does not list every fact from the chapter that will be on your CSI exam, a well-prepared CSI candidate should at a minimum know all the details in each "Foundation Summary" section before taking the exam.

    There are two primary reasons for the increasing threat to networks:

    • The ubiquity of the Internet

    • The pervasiveness of easy-to-use operating systems and development environments


    A security policy defines the framework that is used to protect the assets that are connected to a network. The main goal of a security policy is to ensure that system users, staff, and managers are informed of their responsibilities for protecting corporate technology and information assets.

    The two general types of network security policies are

    • Permissive policies

    • Restrictive policies


    To be effective, a security policy must

    • Be enforceable and apply to everyone

    • Be capable of being implemented through system administration procedures and through the publication of acceptable-use guidelines or other appropriate methods

    • Clearly define the areas of responsibility and the roles of users, administrators, and management


    The key trade-offs to consider when establishing the security goals of a security policy include the following:

    • The risks of offering some services versus the overall level of security provided

    • The ease of use of the network versus the desired security level

    • The cost of implementing the desired security versus the potential cost of losing confidential information, privacy, or service


    The two basic elements that are determined during a security risk assessment are the following:

    • Which assets need to be protected. The basic aim for each asset is to ensure the CIA of the asset.

    • What the threats are to those assets.


    Threats can be further defined through three elements:

    • The consequences of the threat if nothing is done

    • How often the threat may occur

    • The measure of the likelihood that the threat will occur


    Risk assessment is a method that enables an organization to quantify the level of risk that is inherent in a system. The first step in risk assessment is to identify assets such as hardware, software, and intellectual property. The second step is to identify the threats to the assets. These threats include unauthorized access to resources and information, unintentional or unauthorized disclosure of information, and DoS.

    A successful security policy can be subdivided into smaller policies, each covering a specific topic related to the overall security of the network. Some of these "subpolicies" include the following:

    • Acceptable-use policy

    • Authentication policy

    • Accountability policy

    • Access policy

    • Privacy policy

    • Violations-reporting policy


    In the Security Wheel concept, network security is treated as a continuous process that is built around the corporate security policy. This process is divided into four phases:

    1. Securing the network.

    2. Monitoring the network.

    3. Testing the security of the network.

    4. Improving the security of the network.


  • / 290