Page 5 - CISSO_Workbookv18
P. 5
Certified Information Systems Security Officer
Section 1 – Software Security Concerns ............................................................................................... 619
Section 2 – Software Lifecycle Development Processes ....................................................................... 627
Section 3 – Web Application Security ................................................................................................... 646
Section 4 – PCI-DSS Compliance ........................................................................................................... 659
Chapter 14 – Database Security ................................................................................................................ 667
Section 1 – Database Models & Terminology ....................................................................................... 669
Section 2 – Database Security Issues .................................................................................................... 681
Section 3 – Artificial Intelligence ........................................................................................................... 689
Chapter 15 – Malware and Attacks ........................................................................................................... 695
Chapter 16 – Business Continuity ............................................................................................................. 708
Section 1 – Project Initiation ................................................................................................................. 710
Section 2 – Business Impact Analysis .................................................................................................... 718
Section 3 – Determining Recovery Strategies ....................................................................................... 729
Section 4 – Writing the Plan.................................................................................................................. 741
Section 5 – Preparing for a Disaster ...................................................................................................... 754
Section 1 – Introduction to Business Continuity Management ............................................................ 764
Chapter 17 – Incident Management, Law and Ethics ............................................................................... 770
Section 1 – Incident Management ........................................................................................................ 772
Section 2 - Law ...................................................................................................................................... 780
Section 3 – Computer Crime ................................................................................................................. 792
Section 4 – Evidence Handling .............................................................................................................. 804
Section 5 – Privacy Legislation .............................................................................................................. 816
Section 6 - Ethics ................................................................................................................................... 823
Chapter 18 – Physical Security .................................................................................................................. 835
Section 1 – Facility Location and Construction ..................................................................................... 837
Section 2 – Risks, Threats and Countermeasures ................................................................................. 849
Section 3 – Perimeter Protection .......................................................................................................... 860
Section 4 – Electrical Power Issues ....................................................................................................... 867
Section 5 – Fire Prevention, Detection and Suppression ...................................................................... 877
Certified Information Systems Security Officer P a g e | 5
©Mile2 – All Rights Reserved - v18