ISC2 CC

5.0(1)
studied byStudied by 21 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/53

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

54 Terms

1
New cards
Define confidentiality
Permitting authorised users access to info and protecting info from improper disclosure.
2
New cards
Define Integrity
Assurance that data has not been altered in an unauthorised manner.
3
New cards
Define availability
Assuring that systems and data are accessible when users need him
4
New cards
What are the 3 common methods of authorisation?
-Something you know
-Something you have
-Something you are
5
New cards
Define Non-repudiation
Ensures that a person or party cannot deny sending a message. Digitally signs the message which proves the origin of the message
6
New cards
What does HIPAA do?
protects confidentiality of a patients medical information
7
New cards
What does GDPR do?
Gives anyone within the EU control over what personal info companies can compile and retain about them.
8
New cards
Define vulnerability
Gap or weakness in an orgs protection of its valuable assets.
9
New cards
Define threats
Something/Someone that aims to exploit a vulnerability to gain unauthorised access
10
New cards
Define risk avoidance
To avoid doing something in order to eliminate the chance of risk
11
New cards
Define risk acceptance
Taking no action to reduce the likelihood of a risk occurring.
12
New cards
Define risk mitigation
Most common. Taking actions to prevent or reduce the possibility of a risk event.

Includes remediation, security controls, tighter policies and procedures.
13
New cards
Define risk transfer
Practice of passing the risk to another party, usually an insurance company.
14
New cards
Define qualitative data
data that consists of non-numerical categories

high, medium, low
15
New cards
Define quantitative data
numerical data
16
New cards
Define risk tolerance
The level of risk a company is willing to assume.
17
New cards
physical controls examples
Badge reader, stop sign, door lock, walls, fences, guards
18
New cards
Admin controls examples
AUP, emergency operation procedures, employee training
19
New cards
Technical control examples
Access control list
20
New cards
Define Regulations
Issued in the form of laws, usually carry a fine.

HIPAA, GDPR
21
New cards
Define standards
Used by governance to provide a framework to introduce policies and procedures in support of regs.
22
New cards
Define policies
guidelines used in making consistent decisions
23
New cards
Define procedures
Step by step detailed guide to complete a task
24
New cards
Define a breach
The loss of control, someone has accessed PII without authorisation.
25
New cards
Define an event
An occurence in a network or a system
26
New cards
Define an incident
An event that jeopardises the CIA of a system.
27
New cards
Incident response steps:
Preparation
Identification
Containment
Eradication
Recovery
Lessons Learned
28
New cards
What will the incident response team consist of?
-Senior management
-Info security professionals
-Legal reps
-Public affairs
-Engineering reps
29
New cards
How often should you test your BCP?
Routinely
30
New cards
In terms of access control, define a subject?
A user, process, procedure, client, program
31
New cards
In terms of access control, define an object?
Building, computer, file, a database, printer

Basically, anything that provides a service to a user.
32
New cards
How does separation of duties work?
Ensures that a task is completed by multiple people.

Example: If Bob orders stock, Tod receives it.
33
New cards
Give examples of physical access controls:
Turnstiles, man traps, system controlled door locks, biometrics, cameras, logs, guards, alarms
34
New cards
Give examples of logical access controls:
MAC, DAC, RBAC
35
New cards
What is the upper layer of the OSI model responsible for?
Managing the integrity of a connection and controlling the session as well as establishing, maintaining and terminating comms between 2 computers.
36
New cards
What does layer 6 deal with?
Image files
37
New cards
What does layer 5 deal with?
Logical ports
38
New cards
What does layer 4 deal with?
TCP/UDP
39
New cards
What does layer 3 deal with?
Routers and sending packets
40
New cards
What does layer 2 deal with?
Switches, bridges, WAPS
41
New cards
What is a fragment attack?
Attacker fragments traffic in such a way that a system is unable to put data packets back together.
42
New cards
What are the 'Well known' ports?
0-1023
43
New cards
What are the 'Registered ports'
1024-49151
44
New cards
What are the dynamic ports?
49152-65535
45
New cards
Explain a side channel threat?
Passive, non invasive attack that observes the operation of a device using methods such as power monitoring.
46
New cards
3 threats directly linked with malware?
Ransomware, trojan, virus
47
New cards
HVAC optimum range?
64 to 81 F (18-27 C)
48
New cards
What does SaaS provide?
Provides access to software apps such as email of office products.

software, operating system, and the network
49
New cards
What does PaaS provide?
Provides an environment for users to build software.

the operating system and the network
50
New cards
Role Based Access Control
where the employee's job responsibilities dictate exactly which kinds of access the employee has.
51
New cards
DLP(Data Loss Prevention)
A tool that inspects outbound traffic to reduce potential threats.
52
New cards
asymmetric encryption
each party needs their own key pair (a public key and a private key) to engage in confidential communication, shows proof of origin
53
New cards
Hashing
to provide an integrity check
54
New cards
Symmetric encryption
offers confidentiality of data with the least amount of processing overhead, which makes it the preferred means of protecting streaming data.