Войти
  • 59537Просмотров
  • 5 лет назадОпубликованоDestination Certification

CISSP Domain 3 Review / Mind Map (3 of 9) | Trusted Computing Base

Review of the major Trusted Computing Base concepts and terms, and how they interrelate, to help you review, guide your studies, and help you pass the CISSP exam. This MindMap review covers: 0:00 Introduction 0:30 Trusted Computing Base (TCB) 1:31 Reference Monitor Concept (RMC) 1:50 Subject 1:54 Mediation 2:51 Object 3:10 Flow Chart RMC 3:37 Security Kernel 3:53 Three Principles of Security Kernel 4:36 Hardware Components 4:44 Central Processing Unit (CPU) 5:11 Storage and its Categories 6:58 Software Components 7:03 System Kernel 7:31 Firmware 7:42 Middleware 7:57 Protection Mechanisms 8:05 Process Isolation 8:25 Memory Segmentation 8:39 Time Division Multiplexing 9:02 Processor States 9:10 Problem State 9:38 Supervisor State 9:52 Operating System Modes 9:59 User Mode 10:18 Kernel Mode 10:31 Ring Protection Model 11:26 Secure Memory Management 11:55 Data Hiding 12:18 Defense in Depth 12:47 Outro Other MindMaps: Domain 1 Security & Risk Management: Domain 2 Asset Classification: Privacy: Domain 3 Models and Frameworks: Evaluation Criteria: Trusted Computing Base: Vulnerabilities in Systems: Cloud: Cryptography: Digital Certificates, Digital Signatures & PKI: Cryptanalysis: Physical Security: Domain 5 Access Control Overview: Single Sing-on & Federated Access: Domain 6 Security Assessment and Testing Overview: Vulnerability Assessment and Penetration Testing: Logging & Monitoring: Domain 7 Investigations: Incident Response: Malware: Patching & Change Management: Recovery Strategies: Business Continuity Management (BCM): Domain 8 Secure Software Development: Databases: CISSP Master Instructor, John Berti: Visuals, narration and CISSP Master Instructor, Rob Witcher: Video editing by Nick: threntinfo@ #CISSPDomain3Review #RobWitcher