CISSP Chapter 1 Flashcards
Confidentiality
concept of the measures used to ensure the protection of the secrecy of data, objects, or resources
Integrity
protecting the reliability and correctness of data
Availability
subjects are granted timely and uninterrupted access to objects
AAA
authentication, authorization, and accounting
Identification
claiming to be an identity when attempting to access a secured area or system
Authentication
is proving that you are that claimed identity
Authorization
n is defining the permissions (i.e., allow/grant and/or deny) of a resource and object access for a specific identity or subject
Auditing
recording a log of the events and activities related to the system and subjects.
Accounting
reviewing log files to check for compliance and violations in order to hold subjects accountable for their actions, especially
violations of organizational security policy
Defense in depth
s layering, is the use of multiple controls in a series. No one
control can protect against all possible threats.
Abstraction
Similar elements are put into groups, classes, or roles that
are assigned security controls, restrictions, or permissions as a collectiv
Data hiding
: preventing data from being discovered or accessed
by a subject by positioning the data in a logical storage compartment that is not accessible
or seen by the subject.
security boundary
ecurity boundary is the line of intersection between any two areas, subnets, or environments that have different security requirements or needs
Security governance
he collection of practices related to supporting, evaluating, defining,
and directing the security efforts of an organization
Third-party governance
he system of external entity oversight that may be mandated by
law, regulation, industry standards, contractual obligation, or licensing requirements
Documentation review
process of reading the exchanged materials and verifying them
against standards and expectations
security policy
Security management planning ensures proper creation, implementation, and enforcement
senior management
The best security plan is useless without one key factor. Without senior management’s approval of and commitment to the security policy, the policy
will not succeed.
Strategic Plan
A strategic plan is a long-term plan that is fairly stable. It defines the
organization’s security purpose. It defines the security function and aligns it to the goals,
mission, and objectives of the organization.
Tactical Plan
The tactical plan is a midterm plan developed to provide more details on
accomplishing the goals set forth in the strategic plan, or can be crafted ad hoc based
on unpredicted events. A
Operational Plan
n An operational plan is a short-term, highly detailed plan based on
the strategic and tactical plans. It is valid or useful only for a short time.