The systems architecture and models domain deals with system hardware and the software that interacts with it. This chapter discusses the standards for securing these systems and protecting confidentiality, integrity, and availability. You are introduced to the trusted computer base and the ways in which systems can be evaluated to assess the level of security.
To pass the CISSP exam, you need to understand system hardware software models, and how models of security can be used to secure systems. Standards such as Common Criteria, Information Technology System Evaluation Criteria (ITSEC), and Trusted Computer System Evaluation Criteria (TCSEC) are covered on the exam.
The CISSP Cram Sheet
A Note from Series Editor Ed Tittel
About the Author
Acknowledgments
We Want to Hear from You!
Introduction
Self-Assessment
The CISSP Certification Exam
Physical Security
Security-Management Practices
Access-Control Systems and Methodology
System Architecture and Models
Telecommunications and Network Security
Applications and Systems-Development Security
Operations Security
Business Continuity Planning
Law, Investigations, and Ethics
Cryptography
Practice Exam 1
Answers to Practice Exam 1
Practice Exam 2
Answers to Practice Exam 2