2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet844/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   840   841   842   843   844   845   846   847   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

909
Security Applications
Knowledge-based analytic techniques have great applications in the field of computer secu-
rity. One of the major advantages offered by these systems is their capability to rapidly 
make consistent decisions. One of the major problems in computer security is the inability 
of system administrators to consistently and thoroughly analyze massive amounts of log 
and audit trail data to look for anomalies. It seems like a match made in heaven!
Summary
Data is the most valuable resource many organizations possess. Therefore, it’s critical that 
information security practitioners understand the necessity of safeguarding the data itself 
and the systems and applications that assist in the processing of that data. Protections 
against malicious code, database vulnerabilities, and system/application development flaws 
must be implemented in every technology-aware organization.
Malicious code objects pose a threat to the computing resources of organizations. These 
threats include viruses, logic bombs, Trojan horses, and worms.
By this point, you no doubt recognize the importance of placing adequate access con-
trols and audit trails on these valuable information resources. Database security is a rap-
idly growing field; if databases play a major role in your security duties, take the time to 
sit down with database administrators, courses, and textbooks and learn the underlying 
theory. It’s a valuable investment.
Finally, various controls can be put into place during the system and application develop-
ment process to ensure that the end product of these processes is compatible with operation 
in a secure environment. Such controls include process isolation, hardware segmentation, 
abstraction, and contractual arrangements such as service-level agreements (SLAs). Security 
should always be introduced in the early planning phases of any development project and 
continually monitored throughout the design, development, deployment, and maintenance 
phases of production.
Exam Essentials

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   840   841   842   843   844   845   846   847   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish