O'Reilly logo

CISSP All-in-One Exam Guide, 6th Edition by Shon Harris

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 4Security Architecture and Design

This chapter presents the following:

• System architecture

• Computer hardware architecture

• Operating system architecture

• System security architecture

• Trusted computing base and security mechanisms

• Information security software models

• Assurance evaluation criteria and ratings

• Certification and accreditation processes

Software flaws account for a majority of the compromises organizations around the world experience. The common saying in the security field is that a network has a “hard, crunchy outer shell and a soft, chewy middle,” which sums it up pretty well. The security industry has made amazing strides in its advancement of perimeter security devices and technology (firewalls, intrusion ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required