List of Figures


Chapter 4: Access Control

Figure 4-1: Use CER to compare FAR and FRR.
Figure 4-2: Kerberos: Logon initiation (Step 1).
Figure 4-3: Kerberos: Client/TGS Session Key and TGT generation (Step 2).
Figure 4-4: Kerberos: Logon completion (Step 3).
Figure 4-5: Kerberos: Requesting services (Step 4).
Figure 4-6: Kerberos: Client/ Server Session Key and Service Ticket generation (Step 5).
Figure 4-7: Kerberos: Decrypt Client/ Server Session Key (Step 6).
Figure 4-8: Kerberos: Client/ Server communications (Step 7).

Chapter 5: Telecommunications and Network Security

Figure 5-1: The seven layers of the OSI model.
Figure 5-2: Data encapsulation in the OSI model.
Figure 5-3: An FDDI network example.

Chapter 6: Information Security and Risk Management

Figure 6-1: The C-I-A triad.

Chapter 7: Application Security

Figure 7-1: A typical system develop-ment model takes a project from start to finish.

Chapter 9: Security Architecture and Design

Figure 9-1: The main components of a CPU.

Chapter 13: Physical (Environmental) Security

Figure 13-1: A fire needs these three elements to burn.




CISSP For Dummies
CISSP For Dummies
ISBN: 0470537914
EAN: 2147483647
Year: 2004
Pages: 242

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net