SSCP All Domains

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/67

flashcard set

Earn XP

Description and Tags

Flashcards covering all Domains

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

68 Terms

1
New cards

CIA Triad

Confidentiality, Integrity, Availability

2
New cards

Least Privilege

Users should only have the minimum access necessary to perform their duties.

3
New cards

Need to Know

Access to information is granted only if required to perform a specific task.

4
New cards

Separation of Duties

Splitting critical tasks among different people to prevent fraud or error.

5
New cards

Job Rotation

Reduces collusion risk and helps discover fraud.

6
New cards

Mandatory Vacation

To detect irregularities or fraud during employee absence.

7
New cards

Security Through Obscurity

Relying on secrecy as a defense. It's discouraged because it doesn't provide real security.

8
New cards

Due Care

Taking reasonable steps to protect assets.

9
New cards

Due Diligence

Ongoing process of identifying and managing risks.

10
New cards

Privacy vs. Security

Privacy is about data rights and usage; security is about protecting data from threats.

11
New cards

Types of Security Controls

Administrative, Physical, and Technical

12
New cards

Preventive Controls

Controls that stop an incident from occurring.

13
New cards

Detective Controls

Controls that identify and report incidents.

14
New cards

Corrective Controls

Controls that fix issues after an incident.

15
New cards

Compensating Controls

Alternative measures when primary controls can't be used.

16
New cards

Deterrent Control

Discourages potential attackers.

17
New cards

Recovery Control

Restores systems to normal operation after an incident.

18
New cards

Audit Trail

A chronological record of system activities.

19
New cards

Review Access Logs

To identify unauthorized or unusual access.

20
New cards

Security Baseline

A predefined set of security settings.

21
New cards

Configuration Management

Tracking and controlling changes in software/hardware.

22
New cards

Tools That Support Monitoring

SIEM, IDS/IPS, log analyzers.

23
New cards

Phases of Incident Response

Preparation, detection, containment, eradication, recovery, lessons learned.

24
New cards

Business Continuity

Ensuring key functions continue during disruption.

25
New cards

Disaster Recovery

Restoring IT operations after an outage.

26
New cards

Backup Strategies

Full, incremental, differential, and offsite backups.

27
New cards

Incident Escalation

Raising the priority level of an incident to the appropriate authority.

28
New cards

Change Management

Structured process for handling system changes.

29
New cards

Rollback Plan

Strategy to undo changes if something goes wrong.

30
New cards

Document System Changes

Ensures accountability and tracking.

31
New cards

Discretionary Access Control (DAC)

Access is determined by the resource owner.

32
New cards

Mandatory Access Control (MAC)

Access is determined by system-enforced policies based on classification labels.

33
New cards

Role-Based Access Control (RBAC)

Access is based on a user's role in the organization.

34
New cards

Attribute-Based Access Control (ABAC)

Access decisions are based on user, resource, and environment attributes.

35
New cards

Single Sign-On (SSO)

Authentication process allowing access to multiple systems with one login.

36
New cards

Multi-Factor Authentication (MFA)

Authentication using two or more factors: something you know, have, or are.

37
New cards

Crossover Error Rate (CER) in Biometrics

The point where false acceptance rate equals false rejection rate.

38
New cards

Purpose of a Risk Assessment

To identify, quantify, and prioritize risks to organizational assets.

39
New cards

Qualitative Risk Analysis

Subjective assessment of risks based on probability and impact ratings.

40
New cards

Quantitative Risk Analysis

Numerical evaluation of risks using statistical methods and data.

41
New cards

Threat Intelligence Feed

A source of data about known threats, actors, and vulnerabilities.

42
New cards

Continuous Monitoring

Ongoing observation and analysis of systems and networks to detect changes.

43
New cards

Phases of the Incident Response Lifecycle

Preparation, Detection & Analysis, Containment, Eradication, Recovery, Post- Incident Activity.

44
New cards

Goal of Containment

To limit the spread and impact of a security incident.

45
New cards

Playbook

A predefined set of procedures for responding to specific incident types.

46
New cards

Business Continuity Planning

Ensuring critical business functions remain available during and after a disruption.

47
New cards

RPO and RTO

RPO: Recovery Point Objective (maximum tolerable data loss). RTO: Recovery Time Objective (target time to restore service).

48
New cards

Symmetric Encryption

Encryption where the same key is used for both encryption and decryption.

49
New cards

Asymmetric Encryption

Encryption using a public key for encryption and a private key for decryption.

50
New cards

Hash Function

A one-way mathematical function that produces a fixed-size output from input data.

51
New cards

Digital Signature

A cryptographic value that validates the authenticity and integrity of data.

52
New cards

Public Key Infrastructure (PKI)

A framework for managing digital certificates and public-key encryption.

53
New cards

OSI Model

A seven-layer framework: Physical, Data Link, Network, Transport, Session, Presentation, Application.

54
New cards

Difference Between IDS and IPS

IDS (Intrusion Detection System) detects attacks; IPS (Intrusion Prevention System) blocks them.

55
New cards

DMZ

A network segment that separates an internal network from untrusted external networks.

56
New cards

VLANs

Virtual LANs that segment network traffic logically.

57
New cards

SSL/TLS

Protocols for encrypting data in transit over networks.

58
New cards

TCP/IP Suite

Core protocols for internet and network communications (TCP, UDP, IP).

59
New cards

Secure Coding

Practices aimed at preventing vulnerabilities in software development.

60
New cards

Input Validation

Checking user-supplied data to prevent injection and other attacks.

61
New cards

Buffer Overflow

A condition where a program writes more data to a buffer than it can hold.

62
New cards

Containerization

Using lightweight, isolated environments for running applications.

63
New cards

Endpoint Security

Protecting end-user devices such as PCs, laptops, and mobile devices.

64
New cards

Patch Management

Process of identifying, acquiring, installing, and verifying software updates.

65
New cards

Change Management in Application Security

Ensuring controlled and documented changes to software and systems.

66
New cards

Threat Modeling

Identifying potential threats, vulnerabilities, and mitigating controls during design.

67
New cards

What is the best method for dealing with data remanence on SSDs?

Physical destruction

68
New cards

A list of company-restricted websites would best be handled in the first instance by what type of control?

Administrative