Professional Documents
Culture Documents
Isc2 Acceleratedcissp 2018 3 1 18 Security Architecture and Engineering Key Points
Isc2 Acceleratedcissp 2018 3 1 18 Security Architecture and Engineering Key Points
7. Split Knowledge
8. Work Factor
12. AES
13. Hashing
15. PKI
a. networking
b. e-mail
c. applications
d. wireless
e. web
19. IPSec
a. State Machine
b. Information Flow
c. Noninterference
d. Take-Grant
e. Access Control Matrix
f. Bell-LaPadula
g. Biba
h. Clark-Wilson
i. Goguen-Meseguer
j. Sutherland
k. Graham-Denning
L. Harrison-Ruzzo-Ullman
24. Confinement | Bounds | Isolation - they all have to do with memory access
a. memory protection
b. virtualization
c. Trusted Platform Module (TPM)
a. Dedicated
b. System-High
c. Compartmented
d. Multilevel
42. What are ...? (process isolation | layering | abstraction | data hiding |
hardware segmentation)
43. What is the impact of security policy on ... (design | implementation |
testing | deployment)
45. IoT !
a. buffer overflow
b. backdoors
c. TOC/TOU attacks
d. Unregulated state changes
e. covert channels
52. What are key elements to consider for site selection & secure design?
55. What are the temperature & humidity ranges required for safe operation of
equipment?