Скачать книгу
20
3.5.1
|
Client-based systems
|
9
|
3.5.2
|
Server-based systems
|
9
|
3.5.3
|
Database systems
|
20
|
3.5.4
|
Cryptographic systems
|
7
|
3.5.5
|
Industrial Control Systems (ICS)
|
9
|
3.5.6
|
Cloud-based systems (e.g., Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS))
|
16
|
3.5.7
|
Distributed systems
|
9
|
3.5.8
|
Internet of Things (IoT)
|
9
|
3.5.9
|
Microservices
|
9
|
3.5.10
|
Containerization
|
9
|
3.5.11
|
Serverless
|
9
|
3.5.12
|
Embedded systems
|
9
|
3.5.13
|
High-Performance Computing (HPC) systems
|
9
|
3.5.14
|
Edge computing systems
|
9
|
3.5.15
|
Virtualized systems
|
9
|
3.6
|
Select and determine cryptographic solutions
|
6, 7
|
3.6.1
|
Cryptographic life cycle (e.g., keys, algorithm selection)
|
6, 7
|
3.6.2
|
Cryptographic methods (e.g., symmetric, asymmetric, elliptic curves, quantum)
|
6, 7
|
3.6.3
|
Public Key Infrastructure (PKI)
|
7
|
3.6.4
|
Key management practices
|
7
|
3.6.5
|
Digital signatures and digital certificates
|
7
|
3.6.6
|
Non-repudiation
|
6, 7
|
3.6.7
|
Integrity (e.g., hashing)
|
6, 7
|
3.7
|
Understand methods of cryptanalytic attacks
|
7, 14, 21
|
3.7.1
|
Brute force
|
7
|
3.7.2
|
Ciphertext only
|
7
|
3.7.3
|
Known plaintext
|
7
|
3.7.4
|
Frequency analysis
|
7
|
3.7.5
|
Chosen ciphertext
|
7
|
3.7.6
|
Implementation attacks
|
7
|
3.7.7
|
Side-channel
|
7
Скачать книгу
|