SSCP Domain 1

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/68

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

69 Terms

1
New cards

CIA Triad

Confidentiality, Integrity, Availability

2
New cards

Least Privilege

Users should only have the minimum access necessary to perform their duties.

3
New cards

Need to Know

Access to information is granted only if required to perform a specific task.

4
New cards

Separation of Duties

Splitting critical tasks among different people to prevent fraud or error.

5
New cards

Job Rotation

Reduces collusion risk and helps discover fraud.

6
New cards

Mandatory Vacation

To detect irregularities or fraud during employee absence.

7
New cards

Security Through Obscurity

Relying on secrecy as a defense; discouraged because it doesn't provide real security.

8
New cards

Due Care

Taking reasonable steps to protect assets.

9
New cards

Due Diligence

Ongoing process of identifying and managing risks.

10
New cards

Privacy

About data rights and usage.

11
New cards

Security

About protecting data from threats.

12
New cards

Types of Security Controls

Administrative, Physical, and Technical.

13
New cards

Preventive Controls

Controls that stop an incident from occurring.

14
New cards

Detective Controls

Controls that identify and report incidents.

15
New cards

Corrective Controls

Controls that fix issues after an incident.

16
New cards

Compensating Controls

Alternative measures when primary controls can't be used.

17
New cards

Deterrent Control

Discourages potential attackers.

18
New cards

Recovery Control

Restores systems to normal operation after an incident.

19
New cards

Authentication Factors

Something you know, have, are, do, or where you are.

20
New cards

Single Sign-On (SSO)

Authentication process allowing access to multiple systems with one login.

21
New cards

Multifactor Authentication

Using two or more authentication factors.

22
New cards

Biometric Authentication

Uses physical characteristics to verify identity.

23
New cards

Crossover Error Rate (CER)

The point where false acceptance rate equals false rejection rate.

24
New cards

Discretionary Access Control (DAC)

Owner determines access.

25
New cards

Mandatory Access Control (MAC)

Access determined by system classification.

26
New cards

Role-Based Access Control (RBAC)

Access based on job role.

27
New cards

Attribute-Based Access Control (ABAC)

Access based on user attributes.

28
New cards

Types of Security Policies

Organizational, issue-specific, and system-specific.

29
New cards

Acceptable Use Policy (AUP)

Defines how company assets can be used.

30
New cards

Clean Desk Policy

Requires secure handling and storage of sensitive information.

31
New cards

Security Standard

Mandatory implementation of policy.

32
New cards

Security Guideline

Recommended but optional practices.

33
New cards

Procedure

Step-by-step instructions to carry out tasks.

34
New cards

Audit Trail

A chronological record of system activities.

35
New cards

Review Access Logs

To identify unauthorized or unusual access.

36
New cards

Security Baseline

A predefined set of security settings.

37
New cards

Configuration Management

Tracking and controlling changes in software/hardware.

38
New cards

Tools Supporting Monitoring

SIEM, IDS/IPS, log analyzers.

39
New cards

Phases of Incident Response

Preparation, detection, containment, eradication, recovery, lessons learned.

40
New cards

Business Continuity

Ensuring key functions continue during disruption.

41
New cards

Disaster Recovery

Restoring IT operations after an outage.

42
New cards

Backup Strategies

Full, incremental, differential, and offsite backups.

43
New cards

Incident Escalation

Raising the priority level of an incident to the appropriate authority.

44
New cards

Security Awareness Training

Reduces risk by educating users.

45
New cards

Training Content

Phishing, password hygiene, physical security.

46
New cards

Role-Based Training

Training tailored to a user’s specific job role.

47
New cards

Measuring Training Effectiveness

Through tests, metrics, and audits.

48
New cards

Change Management

Structured process for handling system changes.

49
New cards

Rollback Plan

Strategy to undo changes if something goes wrong.

50
New cards

Document System Changes

Ensures accountability and tracking.

51
New cards

Change Request

Purpose, risk, impact, approval, and rollback procedures.

52
New cards

Regulations Affecting Security

HIPAA, GDPR, SOX.

53
New cards

Data Classification

Categorizing data based on sensitivity.

54
New cards

Principle of Retention

Data must be stored only as long as necessary.

55
New cards

Liability

Legal responsibility for actions or failures.

56
New cards

Copyright

Legal protection of intellectual property.

57
New cards

ISC² Code of Ethics

A set of professional principles guiding (ISC)² members in ethical conduct.

58
New cards

Organizational Codes of Ethics

Define expected behavior and integrity standards within a company.

59
New cards

Asset Management Lifecycle

Planning, acquisition/development, inventory, implementation, operation, archival, disposal.

60
New cards

DevSecOps

Integrating security practices early in software development.

61
New cards

Asset Inventory

To track hardware, software, and licenses, ensuring accountability.

62
New cards

Asset Disposal and Destruction Policies

To securely remove sensitive data and hardware.

63
New cards

Physical Security

Data center design, access badges, visitor management, surveillance.

64
New cards

Badging

Issuing identification badges to control personnel access.

65
New cards

Visitor Management

Processes to log, identify, and monitor visitors.

66
New cards

Personal Device Restrictions

To prevent unauthorized devices that could introduce vulnerabilities.

67
New cards

What is a Clean Desk Policy?

A security policy that requires employees to clear their desks of all sensitive or confidential information and securely store papers and devices when not in use, especially at the end of the workday or before leaving their workspace.

68
New cards

Why is a Clean Desk Policy important?

It reduces the risk of unauthorized access, data leaks, or theft by ensuring sensitive information isn’t left unattended or visible.

69
New cards

What is a Clear Screen Policy?

A policy requiring users to lock or log off their computers or devices when they step away from their workstation to prevent unauthorized access.