This class was created by Brainscape user Rob McCauley. Visit their profile to learn more about the creator.

Decks in this class (22)

Introduction
What are the 10 cbk domains
1  cards
Chapter 1: Access Control
In access control what is an object,
In access control what is a subject,
What are the three labels used in...
76  cards
Chapter 2: Access Control Attacks and Monitoring
What is a risk,
What is a threat,
What is a vulnerability
17  cards
Chapter 3: Secure Network Architecture and Securing Network Components
What is osi,
What are the layers of the osi model,
What does the physical layer in t...
182  cards
Chapter 4: Secure Communications and Network Attacks
What are secure communication pro...,
List example secure communication...,
What is skip
74  cards
Chapter 5: Security Governance Concepts, Principles, and Policies
What is the purpose of security m...,
What is the most important key fa...,
What is a strategic plan
34  cards
Chapter 6: Risk and Personnel Management
Define documentation review,
What is ato,
What can often be the consequence...
41  cards
Chapter 7: Software Development Security
Describe local nondistributed com...,
What is a logic bomb,
What is a worm
76  cards
Chapter 8: Malicious Code and Application Attacks
What is a script kiddie,
Describe the zeus trojan horse,
What is a computer virus
42  cards
Chapter 9: Cryptography and Symmetric Key Algorithms
What are the goals of cryptography,
What is the purpose of confidenti...,
What is the purpose of integrity
83  cards
Chapter 19: Physical Security Requirements
What is the purpose of phyiscal s...,
What are the most common physical...,
What is a secure facility plan
77  cards
Chapter 18: Incidents and Ethics
What are the requirements for evi...,
What are the types of evidence,
What is real evidence
20  cards
Chapter 10: PKI and Cryptographic Applications
Describe public key cryptosystems,
Does setting up communications be...,
How does a public key user create...
65  cards
Chapter 11: Principles of Security Models, Design, and Capabilities
In information security what is t...,
What is the trusted computing bas...,
What is the security perimeter of...
54  cards
Chapter 12: Security Architecture Vulnerabilities, Threats, and Countermeasures
What is multitasking,
What is multiprocessing,
What is symmetric multiprocessing
43  cards
Chapter 13: Security Operations
What is the need to know principle,
What is the principle of least pr...,
What is separation of duties and ...
30  cards
Chapter 14: Incident Management
What is an incident,
What is a computer security incident,
How does nist sp 800 61 define a ...
43  cards
Chapter 15: Business Continuity Planning
What is business continuity planning,
What happens if business continui...,
What are the four main steps of b...
29  cards
Chapter 16:Disaster Recovery Planning
What resources should be consuted...,
Why should you purchase insurance,
What clause do you want to make s...
3  cards
TCSEC Levels
What are the tcsec categories,
What is the difference between d ...,
What is the difference between c1...
21  cards
EAL
What is eal,
What are eals defined in,
What is eal 1
9  cards
ISC2 Code of Ethics
What is the first canon,
What is the second canon,
What is the third canon
4  cards

More about
CISSP

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Rob McCauley's CISSP flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CISSP
  • 10 decks
  • 1195 flashcards
  • 255 learners
Decks: 2 Telecommunications And Network Securit, 3 Access Control, 4 Cryptography, And more!
French
  • 121 decks
  • 6695 flashcards
  • 1288 learners
Decks: Expressions 3, Vocab 68, Vocab 66, And more!
CISSP
  • 10 decks
  • 822 flashcards
  • 482 learners
Decks: Access Control, Telecommunications And Network Security, Information Security Governance And Risk, And more!
English Vocabulary in Use Advanced
  • 101 decks
  • 2211 flashcards
  • 731 learners
Decks: Lesson 1, Lesson 2, Lesson 3, And more!
Make Flashcards