O'Reilly logo

CISSP® All-in-One Exam Guide by Shon Harris

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 5Security Architecture and Design

This chapter presents the following:

• Computer hardware architecture

• Operating system architectures

• Trusted computing base and security mechanisms

• Protection mechanisms within an operating system

• Various security models

• Assurance evaluation criteria and ratings

• Certification and accreditation processes

• Attack types

Computer and information security covers many areas within an enterprise. Each area has security vulnerabilities and, hopefully, some corresponding countermeasures that raise the security level and provide better protection. Not understanding the different areas and security levels of network devices, operating systems, hardware, protocols, and applications can cause security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required