Access Control. Telecommunications & Network Security. Information Security & Risk Management. Application Security. Cryptography. Security Architecture & Design. Operations Security. Business Continuity Planning & Disaster Recovery Planning. Legal, Regulations, Compliance & Investigation. Physical Security.
Harold F. Tipton is with HFT Associates in Villa Park, California. Micki Krause Nozaki is with Pacific Life Insurance Company in Newport Beach, California.
DOMAIN 1: ACCESS CONTROL
Access Control AdministrationWhat Business Associates Need to Know
About Protected Health Information Under HIPAA and HITECH; Rebecca
HeroldDOMAIN 2: TELECOMMUNICATIONS AND NETWORK SECURITY
Internet, Intranet, Extranet SecurityE-mail Security; Terence
FernandesDOMAIN 3: INFORMATION SECURITY AND RISK MANAGEMENT
Security Management Concepts and PrinciplesAppreciating
Organizational Behavior and Institutions to Solidify Your
Information Security Program; Robert Pittman
Risk ManagementThe Information Security Auditors Have Arrived, Now
What?; Todd FitzgeraldContinuous Monitoring: Extremely Valuable to
Deploy Within Reason; Foster J. Henderson and Mark A.
PodrackySocial Networking; Sandy BacikInsider Threat Defense; Sandy
BacikRisk Management in Public Key Certificate Applications; Alex
GolodServer Virtualization: Information Security Considerations;
Thomas A. Johnson
Security Management PlanningSecurity Requirements Analysis; Sean M.
PriceCERT Resilience Management Model: An Overview; Bonnie A. Goins
Pilewski and Christopher PilewskiManaging Bluetooth Security; E.
Eugene Schultz, Matthew W. A. Pemble, and Wendy Goucher
Employment Policies and PracticesSlash and Burn: In Times of
Recession, Do Not Let Emotions Drive Business Decisions; Seth
KinnettA "Zero Trust" Model for Security; Ken Shaurette and Thomas
J. SchleppenbachDOMAIN 4: APPLICATION DEVELOPMENT SECURITY
System Development ControlsApplication Whitelisting; Georges
JahchanDesign of Information Security for Large System Development
Projects; James C. MurphyBuilding Application Security Testing into
the Software Development Life Cycle; Sandy Bacik
Malicious CodeTwenty-Five (or Forty) Years of Malware History;
Robert M. SladeDOMAIN 5: CRYPTOGRAPHY
Cryptographic Concepts, Methodologies, and PracticesFormat
Preserving Encryption; Ralph Spencer PooreElliptic Curve
Cryptosystems; Jeff StapletonPirating the Ultimate Killer APP:
Hacking Military Unmanned Aerial Vehicles; Sean P. McbrideDOMAIN 6:
SECURITY ARCHITECTURE AND DESIGN
Principles of Computer and Network Organizations, Architectures,
and DesignsService-Oriented Architecture; Walter B. WilliamsCloud
Security; Terry KomperdaEnterprise Zones of Trust; Sandy
BacikDOMAIN 7: OPERATIONS SECURITY: OPERATIONS CONTROLS
Complex Event Processing for Automated Security Event Analysis; Rob
SheinRecords Management; Sandy BacikDOMAIN 8: BUSINESS CONTINUITY
AND DISASTER RECOVERY PLANNING
Business Continuity PlanningData Backup Strategies: Traditional
Versus Cloud: Carl B. JacksonDOMAIN 9: LEGAL, REGULATIONS,
COMPLIANCE, AND INVESTIGATIONS
Major Categories of Computer CrimeManaging Advanced Persistent
Threats; Eugene Schultz and Cuc Du
Incident HandlingVirtualization Forensics; Paul A. HenryDOMAIN 10:
PHYSICAL (ENVIRONMENTAL) SECURITY
Elements of Physical SecurityTerrorism: An Overview; Frank Bolz,
Kenneth J. Dudonis, and David P. Schulz
Technical ControlsCountermeasure Goals and Strategies; Thomas L.
NormanIndex
![]() |
Ask a Question About this Product More... |
![]() |