O'Reilly logo

CISSP Exam Cram™ 2 by Michael Gregg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. System Architecture and Models

Terms you'll need to understand:

  • Buffer overflows

  • Security modes

  • Rings of protection

  • Trusted Computer System Evaluation Criteria (TCSEC)

  • Information Technology System Evaluation Criteria (ITSEC)

  • System vulnerabilities

  • Common Criteria

  • Reference monitor

  • Trusted computing base

  • Open and closed systems

Techniques you'll need to master:

  • Understanding confidentiality models, such as Bell-LaPadula

  • Identifying integrity models, such as Biba and Clark-Wilson

  • Understanding common flaws and security issues associated with system-architecture designs

  • Distinguishing between certification and accreditation

Introduction

The systems architecture and models domain deals with system hardware and the software that interacts with it. This ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required