Chapter 4. Protection of Information Assets

Key concepts you will need to understand:

  • ✓ The processes of design, implementation, and monitoring of security (gap analysis baseline, tool selection)

  • ✓ Encryption techniques (DES, RSA)

  • ✓ Public key infrastructure (PKI) components (certification authorities, registration authorities)

  • ✓ Digital signature techniques

  • ✓ Physical security practices

  • ✓ Techniques to identify, authenticate, and restrict users to authorized functions and data (dynamic passwords, challenge/response, menus, profiles)

  • ✓ Security software (single sign-on, intrusion-detection systems [IDS], automated permission, network address translation)

  • ✓ Security testing and assessment tools (penetration testing, vulnerability scanning)

  • ✓ Network and ...

Get CISA Exam Cram™ 2 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.