1©2010InternationalInformationSystemsSecurityCertificationConsortium,Inc.AllRightsReserved.Duplicationforcommercialpurposesisprohibited.Rev09.7CertifiedInformationSystemsSecurityProfessionalCISSP®CandidateInformationBulletinEffectiveDate1January2009EffectiveDateJanuary1,2009(Rev09.7)Pleasenote:2-CISSPscombinedintoonefileeffectivedatesJanuary1,2009andJanuary1,2012.Pleasereviewappropriateversioninaccordancewithyourexamdate(clickgreybuttononrighttoviewJanuary1,2012version)2©2010InternationalInformationSystemsSecurityCertificationConsortium,Inc.AllRightsReserved.Duplicationforcommercialpurposesisprohibited.Rev09.7CertifiedInformationSystemsSecurityProfessionalCISSP®CandidateInformationBulletinEffectiveDate1January20091)ACCESSCONTROL.................................................................................................................................5Overview.....................................................................................................................................................5KeyAreasofKnowledge..........................................................................................................................52)TELECOMMUNICATIONS&NETWORKSECURITY................................................................................6Overview.....................................................................................................................................................6KeyAreasofKnowledge..........................................................................................................................63)INFORMATIONSECURITYGOVERNANCE&RISKMANAGEMENT....................................................8Overview.....................................................................................................................................................8KeyAreasofKnowledge..........................................................................................................................84)APPLICA...