CISSP Essentials training: Domain 4, Security Architecture and Design

In this CISSP Essentials Security School lesson, Domain 4, Security Architecture and Design, Shon Harris investigates the framework and structures that make up typical computer systems. The special video presentation below sketches the evolution of security models and evaluation methods as they have struggled to keep pace with changing technology needs.

SearchSecurity.com Security SchoolAs computers and networks have become more complex, so too have approaches for securing them evolved.

In this CISSP Essentials Security School lesson, Domain 4, Security Architecture and Design, noted CISSP certification exam trainer Shon Harris investigates the framework and structures that make up typical computer systems. The special video presentation below sketches the evolution of security models and evaluation methods as they have struggled to keep pace with changing technology needs.

ABOUT CISSP ESSENTIALS

Discover what you need to know to ace the CISSP exam with this series of CISSP certification training lessons. Each lesson, which contains a video, domain spotlight article and a quiz with sample CISSP exam questions, corresponds to a specific domain in the CISSP exam's "Common Body of Knowledge" -- the essential elements each CISSP-certified practitioner must know.

Before watching the special Domain 4, Security Models and Architectures video, it's recommended that students first read the Domain 4 spotlight article, which provides an overview of the concepts presented in the video. Key spotlight article topics include computer and security architecture, namely the framework and structure of a system and how security can and should be implemented; security modes and models, such as the symbolic representations of policy that map the objectives of the policy makers to a set of rules which computer systems must follow under various system conditions; system evaluation, certification and accreditation, methods used to examination the security relevant parts of a system (e.g. reference monitor, access control and kernel protection mechanisms, etc.) and how certification and accreditation are confirmed; and common threats and vulnerabilities specific to system security architecture.

 

After watching the video, test your comprehension of this material with our Domain 4, Security Architecture and Design quiz. Upon completion, return to the CISSP Essentials Security School table of contents to select your next lesson.

About Shon Harris:Shon Harris
Shon Harris is a CISSP, MCSE and President of Logical Security, a firm specializing in security educational and training tools. Logical Security offers curriculum, virtual labs, instructor slides and tools for lease by training companies, security companies, military organizations, government sectors and corporations.

Shon is also a security consultant, an engineer in the Air Force's Information Warfare unit, an entrepreneur and an author. She has authored two best selling CISSP books, including CISSP All-in-One Exam Guide, and was a contributing author to the book Hacker's Challenge. Shon is currently finishing her newest book, Gray Hat Hacking: The Ethical Hacker's Handbook.

CISSP® is a registered certification mark of the International Information Systems Security Certification Consortium, Inc., also known as ISC(2).

This was first published in June 2014

Dig deeper on CISSP Certification

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close