Скачать книгу
rel="nofollow" href="#u4e0f7ab7-fb94-5f54-8e09-9f33372e67f2">10
3.9.6
|
Utilities and Heating, Ventilation, and Air Conditioning (HVAC)
|
10
|
3.9.7
|
Environmental issues
|
10
|
3.9.8
|
Fire prevention, detection, and suppression
|
10
|
3.9.9
|
Power (e.g., redundant, backup)
|
10
|
Domain 4
|
Communication and Network Security
|
|
4.1
|
Assess and implement secure design principles in network architectures
|
11, 12
|
4.1.1
|
Open System Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) models
|
11
|
4.1.2
|
Internet Protocol (IP) networking (e.g., Internet Protocol Security (IPSec), Internet Protocol (IP) v4/6)
|
11, 12
|
4.1.3
|
Secure protocols
|
11
|
4.1.4
|
Implications of multilayer protocols
|
11
|
4.1.5
|
Converged protocols (e.g., Fiber Channel Over Ethernet (FCoE), Internet Small Computer Systems Interface (iSCSI), Voice over Internet Protocol (VoIP))
|
11
|
4.1.6
|
Micro-segmentation (e.g., Software Defined Networks (SDN), Virtual eXtensible Local Area Network (VXLAN), Encapsulation, Software-Defined Wide Area Network (SD-WAN))
|
11
|
4.1.7
|
Wireless networks (e.g., LiFi, Wi-Fi, Zigbee, satellite)
|
11
|
4.1.8
|
Cellular networks (e.g., 4G, 5G)
|
11
|
4.1.9
|
Content Distribution Networks (CDN)
|
11
|
4.2
|
Secure network components
|
11
|
4.2.1
|
Operation of hardware (e.g., redundant power, warranty, support)
|
11
|
4.2.2
|
Transmission media
|
11
|
4.2.3
|
Network Access Control (NAC) devices
|
11
|
4.2.4
|
Endpoint security
|
11
|
4.3
|
Implement secure communication channels according to design
|
12
|
4.3.1
|
Voice
|
12
|
4.3.2
|
Multimedia collaboration
|
12
|
4.3.3
|
Remote access
|
12
|
4.3.4
|
Data communications
|
12
|
4.3.5
|
Virtualized networks
|
12
|
4.3.6
|
Third-party connectivity
|
12
|
Domain 5
|
Identity and Access Management (IAM)
|
|
5.1
|
Control physical and logical access to assets
|
13
|
5.1.1
|
Information
|
13
|
5.1.2
Скачать книгу
|