Documente Academic
Documente Profesional
Documente Cultură
Risk Analysis
Attack by email
Attack by Deception
Hoaxes
Hackers
RBAC (roles)
Natural
ORCON (contest of the originator is required)
Industry
Risk Analysis DRM (Digital - cryptographic)
Neighbours Non-Discretionary Access Control (more DAC than MAC)
UCON (usage controlled / frequency of access)
Business Impact Analysis
Rule-based (Firewalls / VPNs) |
Data stored in electronic Form
evaluates activity
Remote Replication and Off-site journaling
Least Functionality
Selecting Recovery Strategy
ISSAP
Domain 5 - BCP and DR
Backup Strateg ies Least Privilege (no limitations)
01/03 : 11/03
Implementing Recovery Strateg y 7 workday(s) Separation of Duties
Plan Maintenance
Proxy Access Control
Gatekeeper
TACACS
Design Considerations
Domain 1 - Access Architecture
Control Systems
and Methodology
23/01 : 31/01 Distributed | Shared database | Robust | Scalable
7 workday(s) De-centralized Access Control
Design Considerations
Identity Management
Who?What?Where?When?Effec t ?
Accounting
Inherent Rights
Role based
Groups
Task based
Dual Control
Location
Topology
Subnet
Geo consideration
Badges
Magnetic Strips
Granted Rig hts Token based Authentication Tools
Proximity Cards
Common Issues
Performance
Common Issues
Authentication Design Validation
Architecture Effectiveness Assurance
Testing Strategies
Testing Objectives
Testing Paradigms
Repeatability
Methodology
Applications of Cryptography
Message Encryption
Remote Access
Wireless Communication
Storage Encryption
Code Signing
Principles
Symmetric
Block Cipher
Stream Cipher
Methods of Cryptography
Asymmetric
Digital Signatures
Key Types
Key Distribution
Key Management Key Storage
Key Update
Domain 2 - Cryptography
Key Revocation
01/02 : 11/02
7 workday(s)
Key Escrow
Key Distribution
PKI Registration
Certificate Issuance
Public Key Infrastructure Trust Models
Certificate Chains
Certificate Revocation
Cross Certification
NSA-FIPS-14 0
Standards
NIST CAVP
NIST CMVP
Cryp tog rap h ic Comp lian ce
PCI DSS
Roadway Design
Parking
Traffic Monitoring
Open Area Parking
Loading Docks
Infrared Sensors
Microwave
Coaxial Strain-Sensitive Ca b l e
Taut-Wire Systems
CCTV
DVR
Card Types
Domain 3 - Physical Security Badge Equipment
11/02 : 19/02 Access Control Systems
7 workday(s) Biometrics
Access control Head-End
Low Profile
Location Hazard
Threat Assessment
Mobile Devices
Evacuation Drills
Protection Plan Incident Response
Penetration Tests
Design Validation Access Control Violation Monitorin g