Domain 6 Flashcards

1
Q

Artifact

A

A piece of evidence, such as text or a reference to a resource, that is submitted to support a response to a question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Assessment

A

The testing or evaluation of the controls in an information system or an organization to determine the extent to which the controls are implemented correctly, operating as intended and producing the desired outcome with respect to meeting the security or privacy requirements for the system or the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Audit/Auditing

A

The process of reviewing a system for compliance against a standard or baseline. Examples include audits of security controls, configuration baselines and financial records. Can be formal and independent, or informal using internal staff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Chaos Engineering

A

The discipline of experimenting on a software system in production in order to build confidence in the system’s capability to withstand turbulent and unexpected conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Compliance Calendar

A

A calendar that tracks an organization’s audits, assessment, required filings, their due dates and related details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Compliance Tests

A

An evaluation that provides assurance an organization’s controls are being applied in accordance with management policies and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ethical Penetration Testing, Penetration Testing

A

A security testing and assessment method in which testers actively attempt to circumvent or defeat the security features of a system. Ethical penetration testing is constrained, typically by contracts, to stay within specified rules of engagement (RoE).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Examination

A

The process of reviewing, inspecting, observing, studying or analyzing one or more assessment objects (i.e., specifications, mechanisms or activities). The purpose of the examine method is to facilitate assessor understanding, achieve clarification or obtain evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Finding(s)

A

Assessment results produced by the application of an assessment procedure to a security control or control enhancement to achieve an assessment objective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Interview(s)

A

As a systems assessment technique, the process of holding discussions with individuals or groups of individuals within an organization to facilitate assessor understanding, achieve clarification or obtain evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Judgmental Sampling

A

Also called purposive sampling or authoritative sampling, it is a non- probability sampling technique in which the sample members are chosen only on the basis of the researcher’s knowledge and judgment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Misuse Case Testing

A

Testing strategy and technique from the point of view of an actor hostile to the system, using deliberately chosen sets of actions, which could lead to systems integrity failures, malfunctions or other security or safety compromises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Plan of Action and Milestones (POA&M)

A

A document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones for meeting the tasks and scheduled milestone completion dates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rules of Engagement (RoE)

A

A set of rules, constraints, boundaries or conditions that establish limits on what participants in an activity may or may not do. Ethical penetration testing, for example, uses RoE to define the scope of the testing to be done and to establish liability limitations for both the testers and the sponsoring organization or systems owners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Statistical Sampling

A

Statistical sampling is the process of selecting subsets of examples from a population with the objective of estimating properties of the total population.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Substantive Test

A

The testing technique used by an auditor to obtain the audit evidence in order to support auditor opinion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Testing

A

The process of exercising one or more assessment objects (i.e., activities or mechanisms) under specified conditions to compare actual with expected behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Trust Services Criteria (TSC)

A

The criteria used by an auditor when evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability or processing integrity of information and systems, or the confidentiality or privacy of the information processed by the entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Full Backup

A

Copies the entire system to backup media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hackback

A

Actions taken by a victim of hacking to compromise the systems of the alleged attacker.

21
Q

Hardening

A

A reference to the process of applying secure configurations (to reduce the attack surface) and locking down various hardware, communications systems and software, including operating system, web server, application server, application. Hardening is normally performed based on industry guidelines and benchmarks such as those provided by the Center for Internet Security (CIS).

22
Q

Heuristics

A

A method of machine learning, which identifies patterns of acceptable activity so that deviations from the patterns will be identified.

23
Q

Honeypots/ Honeynets

A

Machines that exist on the network, but do not contain sensitive or valuable data; they are meant to distract and occupy malicious attackers or unauthorized intruders, as a means of delaying their attempts to access production data/assets. A number of machines of this kind, linked together a network or subnet, are referred to as a honeynet.

24
Q

Hot Site

A

A fully operational offsite data processing facility equipped with hardware and software, to be used in the event of an information system disruption.

25
Q

Incident

A

An event which actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits.

26
Q

Incident Response

A

The mitigation of violations of security policies and recommended practices.

27
Q

Indicator

A

A technical artifact or observable occurrence that suggests an attack is imminent or is currently underway, or that a compromise may have already occurred.

28
Q

Indicators of Compromise (IoC)

A

A signal that an intrusion, malware or other predefined hostile or hazardous set of events is occurring or has occurred.

29
Q

Information Security Continuous Monitoring (ISCM)

A

Maintaining ongoing awareness of information security, vulnerabilities and threats to support organizational risk management decisions. [Note: The terms “continuous” and “ongoing” in this context mean that security controls and organizational risks are assessed and analyzed at a frequency to systems, networks and cyberspace, by assessing security control implementation and organizational security status in accordance with organizational risk tolerance, and within a reporting structure designed to make real-time, data-driven risk management decisions. sufficient to support risk-based security decisions to adequately protect organization information.] Ongoing monitoring sufficient to ensure and assure effectiveness of security controls related

30
Q

Information Sharing and Analysis Center (ISAC)

A

Any entity or collaboration created or employed by public- or private-sector organizations, for purposes of gathering and analyzing critical cyber and related information in order to better understand security problems and interdependencies related to cyber systems, to ensure their availability, integrity and reliability.

31
Q

Intrusion

A

A security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts to gain, access to a system or system resource without having authorization to do so.

32
Q

Intrusion Detection System (IDS)

A

A security service that monitors and analyzes network or system events for the purpose of finding and providing real time or near real-time warning of, attempts to access system resources in an unauthorized manner.

33
Q

Intrusion Prevention Systems (IPS)

A

A security service that uses available information to determine if an attack is underway; it then sends alerts, but also blocks the attack from reaching its intended target.

34
Q

Log

A

A record of actions and events that have taken place on a computer system.

35
Q

Patch

A

A software component that, when installed, directly modifies files or device settings related to a different software component without changing the version number or release details for the related software component.

36
Q

Patch Management

A

The systematic notification, identification, deployment, installation and verification of operating system and application software code revisions. These revisions are known as patches, hot fixes and service packs.

37
Q

Precursor(s)

A

Signals from events that suggest a possible change of conditions (internal or external to the organization) may alter the current threat landscape. An increase in tensions in the local political or social environment, or complaints or grievances by employees or customers going viral in social media, are examples of precursors.

38
Q

Provisioning

A

Taking a particular configuration baseline, making additional or modified copies of it, then taking steps as necessary to properly place those copies into the environments they should belong in.

39
Q

Ransom Attack

A

Any form of attack, which threatens the destruction, denial or unauthorized public release or remarketing of private information assets. Usually involves encrypting these assets and withholding the decryption key until the ransom is paid by the victim.

40
Q

Ransomware

A

Malware used for the purpose of facilitating a ransom attack.

41
Q

Recovery

A

The process of jointly addressing business resiliency and restoration of critical infrastructure and functionality after a disruption.

42
Q

Regression Testing

A

Testing of a system to ascertain whether recently approved modifications have changed its performance of other approved functions or has introduced other unauthorized behaviors.

43
Q

Remediation

A

Changes to a system’s configuration to immediately limit or reduce the chance of reoccurrence of an incident. This might include updating the sensitivities, thresholds or alarm settings on any number of security controls, or instituting a rapid reset of access controls information such as passwords and security challenge responses.

44
Q

Request for Change (RFC)

A

The documentation of a proposed change in support of change management activities.

45
Q

Root Cause Analysis

A

A principle-based, systems approach for the identification of underlying causes associated with a particular set of risks or incidents.

46
Q

Sandbox

A

A testing environment that is logically, physically or virtually isolated from other environments, and in which applications or systems can be evaluated. Sandboxes can be used as part of development, integration or acceptance testing (so as to not interact with the production environments), as part of malware screening, or as part of a honeynet.

47
Q

Threat Intelligence

A

Threat information that has been aggregated, transformed, analyzed, interpreted or enriched to provide the necessary context for decision-making processes.

48
Q

User and Entity Behavior Analytics (UEBA)

A

Analysis of behaviors and activities of human and nonhuman users, and of the software and hardware entities associated with those users and activities, as a way of detecting inappropriate or unauthorized activity, including fraud detection, malware and insider attacks.

49
Q

Vulnerability Management

A

The activities necessary to identify, assess, prioritize and remediate information system weaknesses.