Server and database administrators must also be aware of security issues that are particular to the environments they manage. All servers are affected by data flow control while database servers must also be protected against aggregation, inference, and other database-specific attacks. In this video, learn about some of the security issues that particularly affect servers.
- View Offline
- [Narrator] Server and database administrators…must also be aware of security issues…that are particular to the environments that they manage.…All servers are affected by Data Flow Control…while database servers must also be protected…against aggregation, inference…and other database specific attacks.…Data Flow Control manages the transfer of information,…to and from servers.…As you prepare for the CISSP exam…you should familiarize yourself…with two different Data Flow Control concepts.…
First, administrators must take steps to ensure…that data flow does not become high enough in volume…that it overwhelms the available bandwidth…of either the server or the network.…Data Flow Control technology is built in to network devices…and server operating systems.…These components should be configured to limit inbound…and outbound data transmissions…to a rate that both the server and network can support.…Failure to enforce Data Flow Control in this manner,…can lead to a denial-of-service attack.…
Second, system architects should carefully math out…
Members who take all eight courses in the series will be prepared to take and pass the CISSP exam. Find the companion study books at the Sybex test prep site and review the complete CISSP Body of Knowledge at https://www.isc2.org/cissp-domains/default.aspx.
- Understanding security and evaluation models
- Cloud computing and virtualization
- Securing hardware
- Client and server vulnerabilities
- Web security vulnerabilities
- Securing mobile and smart devices
- Understanding encryption
- Key management and public key infrastructure
- Physical security
Skill Level Advanced
Essentials of Cryptography and Network Securitywith Lisa Bock1h 45m Intermediate
CISSP Cert Prep: 2 Asset Securitywith Mike Chapple58m 11s Advanced
1. Security Engineering
2. Cloud Computing and Virtualization
3. Hardware Security
4. Client and Server Vulnerabilities
5. Web Security
6. Mobile Security
7. Smart Device Security
9. Symmetric Cryptography
10. Asymmetric Cryptography
11. Key Management
12. Public Key Infrastructure
13. Cryptanalytic Attacks
14. Physical Security
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.