Author: techfox9

CISSP TOC – Part 3 ..

Thursday, June 19th, 2008 @ 2:08 am

Chapter 9. Law, Investigation, and Ethics 4

Intellectual Property Law 8
Patents 8
Copyrights 9
Trade Secrets 9
Sale and Licensing 9
Privacy Law 10
Government Regulations 11

Criminal Law and Computer Crime 12
Computer Security Incidents 15
Advance Planning 15
Computer Crime Investigation 16

Legal Evidence 19
Credibility or Weight of Evidence 19
Proof of Authenticity 20
Hearsay 20
Best Evidence Rule 20
Chain of Evidence 21
The Fourth Amendment 22
Computer Forensics 22

Computer Ethics 28
Case Study: Cross-Examining the Forensics Expert 30
Case Study: Proving Copyright Infringement 31

Chapter 10. Physical Security 45

Classifying Assets to Simplify Physical Security Discussions 49

Vulnerabilities 51
THEFT AS THE MOST LIKELY PHYSICAL SECURITY ISSUE 52
Selecting, Designing, Constructing, and Maintaining a Secure Site 53
Site Location and Construction 53
Physical Access Controls 54
Active Physical Access Controls 55
Passive Controls 55
Power 57
Power Issues: Spikes, Surges, and Brownouts 57
Minimizing Power Problems 58
Environmental Controls: Air Conditioning, Humidity, and Temperature 59
Water Exposure Problems 60
Fire Prevention and Protection 60
Tape and Media Library Retention Policies 63
Document (Hard-Copy) Libraries 64
Waste Disposal 66
Physical Intrusion Detection 69
Table 10.2. Sensors and Other Detection Mechanisms 69

10.1. The Airports Council International Exercise 75

CISSP, Security


 


Comments are closed.