CISSP - Wiley 9th Edition - Chapter 1 Flashcards

1
Q

Confidentiality

A

The concept of the measures used to ensure the protection of the secrecy of data, objects, or resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Countermeasures to ensure Confidentiality

A

Encryption
Network traffic padding
Strict access control
Rigorous authentication procedures
Data classification
Personnel training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Intregrity

A

The concept of protecting the reliability and correctness of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attacks that focus on the violation of integrity

A

Viruses
Logic bombs
Unauthorized access
Errors in coding and applications
Malicious modification
Intentional replacement
System backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Availability

A

Authorized subjects are granted timely and uninterrupted access to objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Countermeasures to ensure availability

A

Design intermediary delivery systems properly
Use access controls effectively
Monitor performance and network traffic
Use firewalls and routers to prevent DoS attacks
Implement redundancy for critical systems
Maintain and test backup system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CIA Triad

A

Confidentiality, Integrity, Availability
The primary goals and objectives of a security infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DAD Triad

A

Disclosure, Alteration, Destruction
The failures of security protections of the CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authenticity

A

The security concept that data is authentic or genuine and originates from its alleged source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Non-repudiation

A

Ensures that the subject of an activity or who caused an event cannot deny that the event occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AAA Services

A

Core security mechanism of all security environments
5 elements:
Identification
Authentication
Authorization
Auditing
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identification

A

Claiming to be an identity when attempting to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authentication

A

Proving that you are the claimed identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authorization

A

Defining the permissions of a resource and object access for a specific identity or subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Auditing

A

Recording a log of the events and activities related to the systems and subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Accounting

A

Reviewing log files to check for compliance and violations in order to hold subjects accountable for their actions

17
Q

Defense in Depth

A

Layering, the use of multiple controls in a series. By creating the controls in a series, each attack will be scanned, evaluated, or mitigated by each security control

18
Q

Abstraction

A

Similar elements are placed into groups, classes, or roles that are assigned security controls, restrictions, or permissions as a collective. Abstraction is used for efficiency

19
Q

Data Hiding

A

Preventing data from being discovered or accessed by a subject by positioning the data in a logical storage compartment that is not accessible or seen by the subject.

20
Q

Encryption

A

The science of hiding the meaning or intent of a communication from unintended recipients

21
Q

Security Boundaries

A

The line of intersection between any two areas, subnets, or environments that have different security requirements or needs

22
Q

Security Governance

A

The collection of practices related to supporting, evaluating, defining, and directing the security efforts of an organization.
Ideally performed by the Board of Directors or C level executives.

23
Q

Third-Party Governance

A

The system of external entity oversight that may be mandated by law, regulation, industry standards, contractual obligations, or licensing requirements.

24
Q

Documentation Review

A

The process of reading the exchanged materials and verifying them against standards and expectations.

25
Q

Authorization to Operate

A

Approval to proceed with software, system, or relationship with a third-party vendor

26
Q

Security Function

A

The aspect of operating a business that focuses on the task of evaluating and improving security over time.

27
Q

Security Management Planning

A

Ensures proper creation, implementation, and enforcement of a security policy. This aligns the security functions to the strategy, goals, mission, and objectives of the organization.

28
Q

Business Case

A

A documented argument or stated position in order to define a need to make a decision or take some form of action. Demonstrate a business specific need to alter an existing process or choose an approach to a business task.

29
Q

Top-Down Approach

A

Upper or senior management are responsible for initiating and defining policies for the organization.

30
Q

Strategic Plan

A

A long-term plan that is fairly stable defining the organizations security purpose, the security function and aligns it to the goals, mission, and objectives of the organization

31
Q

Tactical Plan

A

A mid-term plan developed to provide more details on accomplishing goals set forth in the strategic plan or ad-hoc based on based on unpredicted events.

32
Q

Operational Plan

A

A shirt-term, highly detailed plan based on the strategic and tactical plans. They spell out how to accomplish the various goals of the organization.

33
Q
A