Скачать книгу
3.7.8
Fault injection
7
3.7.9
Timing
7
3.7.10
Man-in-the-Middle (MITM)
7
3.7.11
Pass the hash
14
3.7.12
Kerberos exploitation
14
3.7.13
Ransomware
21
3.8
Apply security principles to site and facility design
10
3.9
Design site and facility security controls
10
3.9.1
Wiring closets/intermediate distribution facilities
10
3.9.2
Server rooms/data centers
10
3.9.3
Media storage facilities
10
3.9.4
Evidence storage
10
3.9.5
Restricted and work area security
10
3.9.6
Utilities and Heating, Ventilation, and Air Conditioning (HVAC)
10
3.9.7
Environmental issues
10
3.9.8
Fire prevention, detection, and suppression
10
3.9.9
Power (e.g., redundant, backup)
10
Domain 4
Communication and Network Security
4.1
Assess and implement secure design principles in network architectures
11 , 12
4.1.1
Open System Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) models
11
4.1.2
Internet Protocol (IP) networking (e.g., Internet Protocol Security (IPSec), Internet Protocol (IP) v4/6)
11 , 12
4.1.3
Secure protocols
11
4.1.4
Implications of multilayer protocols
11
4.1.5
Converged protocols (e.g., Fiber Channel Over Ethernet (FCoE), Internet Small Computer Systems Interface (iSCSI), Voice over Internet Protocol (VoIP))
11
4.1.6
Micro-segmentation (e.g., Software Defined Networks (SDN), Virtual eXtensible Local Area Network (VXLAN), Encapsulation, Software-Defined Wide Area Network (SD-WAN))
11
4.1.7
Wireless networks (e.g., LiFi, Wi-Fi, Zigbee, satellite)
11
4.1.8
Cellular networks (e.g., 4G, 5G)
11
4.1.9
Content Distribution Networks (CDN)
11
4.2
Secure network components
11
4.2.1
Operation of hardware (e.g., redundant power, warranty, support)
11
Скачать книгу