2 cissp ® Official Study Guide Eighth Edition


Chapter 9  ■ Security Vulnerabilities, Threats, and Countermeasures Know the security issues surrounding memory components



Download 19,3 Mb.
Pdf ko'rish
bet372/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   368   369   370   371   372   373   374   375   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

392
Chapter 9 

Security Vulnerabilities, Threats, and Countermeasures
Know the security issues surrounding memory components.
Some security issues sur-
round memory components: the fact that data may remain on the chip after power is 
removed and the control of access to memory in a multiuser system.
Describe the different characteristics of storage devices used by computers.
Primary 
storage is the same as memory. Secondary storage consists of magnetic, flash, and opti-
cal media that must be first read into primary memory before the CPU can use the data. 
Random access storage devices can be read at any point, whereas sequential access devices 
require scanning through all the data physically stored before the desired location.
Know the security issues surrounding secondary storage devices.
There are three main 
security issues surrounding secondary storage devices: removable media can be used to 
steal data, access controls and encryption must be applied to protect data, and data can 
remain on the media even after file deletion or media formatting.
Understand security risks that input and output devices can pose.
Input/output devices 
can be subject to eavesdropping and tapping, used to smuggle data out of an organization, 
or used to create unauthorized, insecure points of entry into an organization’s systems and 
networks. Be prepared to recognize and mitigate such vulnerabilities.
Know the purpose of firmware.
Firmware is software stored on a ROM chip. At the com-
puter level, it contains the basic instructions needed to start a computer. Firmware is also 
used to provide operating instructions in peripheral devices such as printers.
Be able to describe process isolation, layering, abstraction, data hiding, and hardware 
segmentation.
Process isolation ensures that individual processes can access only their 
own data. Layering creates different realms of security within a process and limits com-
munication between them. Abstraction creates “black-box” interfaces for programmers to 
use without requiring knowledge of an algorithm’s or device’s inner workings. Data hiding 
prevents information from being read from a different security level. Hardware segmenta-
tion enforces process isolation with physical controls.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   368   369   370   371   372   373   374   375   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish