Page 4 - CISSO_Workbookv18
P. 4
Certified Information Systems Security Officer
Section 5 – Threats to Operations ........................................................................................................ 312
Chapter 7 – Symmetric Cryptography and Hashing .................................................................................. 324
Section 1 – Cryptography Terms ........................................................................................................... 326
Section 2 – Historical Uses of Cryptography ......................................................................................... 338
Section 3 – Cryptography Foundations ................................................................................................. 349
Section 4 – Modern Cryptography ........................................................................................................ 354
Section 6 - Hashing ................................................................................................................................ 378
Chapter 8 – Asymmetric Cryptography and PKI........................................................................................ 388
Section 1 – Asymmetric Cryptography.................................................................................................. 390
Section 2 – Hybrid Crypto and Digital Signatures ................................................................................. 401
Section 3 – Public Key Infrastructure .................................................................................................... 406
Section 4 – Cryptography in Use ........................................................................................................... 414
Section 6 – Attacks on Cryptography .................................................................................................... 431
Chapter 9 – Network Connections ............................................................................................................ 436
Section 1 – Network and Communications Security ............................................................................. 438
Section 2 - Topologies ........................................................................................................................... 445
Section 4 - Cabling ................................................................................................................................. 457
Section 5 – LAN & WAN ........................................................................................................................ 465
Chapter 10 – Network Protocols and Devices .......................................................................................... 480
Section 1 – OSI Model ........................................................................................................................... 482
Section 2 – Network Devices ................................................................................................................ 494
Section 3 – Network Security Sentries .................................................................................................. 502
Section 4 – Ports, Protocols and Services ............................................................................................. 525
Chapter 11 – Telephony, VPNs and Wireless ............................................................................................ 539
Section 1 – Telephony ........................................................................................................................... 542
Section 2 - VPNs .................................................................................................................................... 551
Section 3 - Wireless ............................................................................................................................... 560
Section 4 – Network Based Attacks ...................................................................................................... 575
Chapter 12 – Security Architecture and Attacks ....................................................................................... 586
Section 1 – Security Architecture .......................................................................................................... 588
Section 2 – Architectural Models .......................................................................................................... 599
Section 3 – System Threats ................................................................................................................... 605
Chapter 13 – Software Development Security ......................................................................................... 617
Certified Information Systems Security Officer P a g e | 4
©Mile2 – All Rights Reserved - v18