Page 5 - CISSO_Workbookv18
P. 5

Certified Information Systems Security Officer


                  Section 1 – Software Security Concerns ............................................................................................... 619

                  Section 2 – Software Lifecycle Development Processes ....................................................................... 627
                  Section 3 – Web Application Security ................................................................................................... 646

                  Section 4 – PCI-DSS Compliance ........................................................................................................... 659
               Chapter 14 – Database Security ................................................................................................................ 667

                  Section 1 – Database Models & Terminology ....................................................................................... 669
                  Section 2 – Database Security Issues .................................................................................................... 681
                  Section 3 – Artificial Intelligence ........................................................................................................... 689

               Chapter 15 – Malware and Attacks ........................................................................................................... 695
               Chapter 16 – Business Continuity ............................................................................................................. 708

                  Section 1 – Project Initiation ................................................................................................................. 710
                  Section 2 – Business Impact Analysis .................................................................................................... 718
                  Section 3 – Determining Recovery Strategies ....................................................................................... 729

                  Section 4 – Writing the Plan.................................................................................................................. 741
                  Section 5 – Preparing for a Disaster ...................................................................................................... 754

                  Section 1 – Introduction to Business Continuity Management ............................................................ 764
               Chapter 17 – Incident Management, Law and Ethics ............................................................................... 770

                  Section 1 – Incident Management ........................................................................................................ 772
                  Section 2 - Law ...................................................................................................................................... 780

                  Section 3 – Computer Crime ................................................................................................................. 792
                  Section 4 – Evidence Handling .............................................................................................................. 804
                  Section 5 – Privacy Legislation .............................................................................................................. 816

                  Section 6 - Ethics ................................................................................................................................... 823
               Chapter 18 – Physical Security .................................................................................................................. 835

                  Section 1 – Facility Location and Construction ..................................................................................... 837
                  Section 2 – Risks, Threats and Countermeasures ................................................................................. 849

                  Section 3 – Perimeter Protection .......................................................................................................... 860
                  Section 4 – Electrical Power Issues ....................................................................................................... 867

                  Section 5 – Fire Prevention, Detection and Suppression ...................................................................... 877









               Certified Information Systems Security Officer  P a g e  | 5
               ©Mile2 – All Rights Reserved - v18
   1   2   3   4   5   6   7   8   9   10