Official (ISC)² SSCP

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/946

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

947 Terms

1
New cards

Access Control Object

A passive entity that typically receives or contains some form of data.

2
New cards

Access Control Subject

An active entity and can be any user, program, or process that requests permission to cause data to flow from an access control object to the access control subject or between access control objects.

3
New cards

Asynchronous Password Token

A one-time password is generated without the use of a clock, either from a one-time pad or cryptographic algorithm.

4
New cards

Authorization

Determines whether a user is permitted to access a particular resource.

5
New cards

Connected Tokens

Must be physically connected to the computer to which the user is authenticating.

6
New cards

Contactless Tokens

Form a logical connection to the client computer but do not require a physical connection.

7
New cards

Disconnected Tokens

Have neither a physical nor logical connection to the client computer.

8
New cards

Entitlement

A set of rules, defined by the resource owner, for managing access to a resource (asset, service, or entity) and for what purpose.

9
New cards

Identity Management

The task of controlling information about users on computers.

10
New cards

Proof of Identity

Verify people's identities before the enterprise issues them accounts and credentials.

11
New cards

Kerberos

A popular network authentication protocol for indirect (third-party) authentication services.

12
New cards

Lightweight Directory Access Protocol (LDAP)

A client/server-based directory query protocol loosely based on X.500, commonly used to manage user information. LDAP is a front end and not used to manage or synchronize data per se as opposed to DNS.

13
New cards

Single Sign-On (SSO)

Designed to provide strong authentication using secret-key cryptography, allowing a single identity to be shared across multiple applications.

14
New cards

Static Password Token

The device contains a password that is physically hidden (not visible to the possessor) but that is transmitted for each authentication.

15
New cards

Synchronous Dynamic Password Token

A timer is used to rotate through various combinations produced by a cryptographic algorithm.

16
New cards

Trust Path

A series of trust relationships that authentication requests must follow between domains

17
New cards

6to4

Transition mechanism for migrating from IPv4 to IPv6. It allows systems to use IPv6 to communicate if their traffic has to transverse an IPv4 network.

18
New cards

Absolute addresses

Hardware addresses used by the CPU.

19
New cards

Abstraction

The capability to suppress unnecessary details so the important, inherent properties can be examined and reviewed.

20
New cards

Accepted ways for handling risk

Accept, transfer, mitigate, avoid.

21
New cards

Access

The flow of information between a subject and an object.

22
New cards

Access control matrix

A table of subjects and objects indicating what actions individual subjects can take upon individual objects.

23
New cards

Access control model

An access control model is a framework that dictates how subjects access objects.

24
New cards

Access controls

Are security features that control how users and systems communicate and interact with other systems and resources.

25
New cards

Accreditation

Formal acceptance of the adequacy of a system's overall security by management.

26
New cards

Active attack

Attack where the attacker does interact with processing or communication activities.

27
New cards

ActiveX

A Microsoft technology composed of a set of OOP technologies and tools based on COM and DCOM. It is a framework for defining reusable software components in a programming language-independent manner

28
New cards

Address bus

Physical connections between processing components and memory segments used to communicate the physical memory addresses being used during processing procedures.

29
New cards

Address resolution protocol (ARP)

A networking protocol used for resolution of network layer IP addresses into link layer MAC addresses.

30
New cards

Address space layout randomization (ASLR)

Memory protection mechanism used by some operating systems. The addresses used by components of a process are randomized so that it is harder for an attacker to exploit specific memory vulnerabilities.

31
New cards

Algebraic attack

Cryptanalysis attack that exploits vulnerabilities within the intrinsic algebraic structure of mathematical functions.

32
New cards

Algorithm

Set of mathematical and logic rules used in cryptographic functions.

33
New cards

Analog signals

Continuously varying electromagnetic wave that represents and transmits data.

34
New cards

Analytic attack

Cryptanalysis attack that exploits vulnerabilities within the algorithm structure.

35
New cards

Annualized loss expectancy (ALE)

Annual expected loss if a specific vulnerability is exploited and how it affects a single asset. SLE × ARO = ALE.

36
New cards

Application programming interface (API)

Software interface that enables process-to-

process interaction. Common way to provide access to standard routines to a set of software programs.

37
New cards

Arithmetic logic unit (ALU)

A component of the computer's processing unit, in which arithmetic and matching operations are performed.

38
New cards

AS/NZS 4360

Australia and New Zealand business risk management assessment approach.

39
New cards

Assemblers

Tools that convert assembly code into the necessary machine-compatible binary language for processing activities to take place.

40
New cards

Assembly language

A low-level programming language that is the mnemonic representation of machine-level instructions.

41
New cards

Assurance evaluation criteria

Check-list and process of examining the security-relevant parts of a system (TCB, reference monitor, security kernel) and assigning the system an assurance rating.

42
New cards

Asymmetric algorithm

Encryption method that uses two different key types, public and private. Also called public key cryptography.

43
New cards

Asymmetric mode multiprocessing

When a computer has two or more CPUs and one CPU is dedicated to a specific program while the other CPUs carry out general processing procedures

44
New cards

Asynchronous communication

Transmission sequencing technology that uses start and stop bits or similar encoding mechanism. Used in environments that transmit a variable amount of data in a periodic fashion.

45
New cards

Asynchronous token generating method

Employs a challenge/response scheme to authenticate the user.

46
New cards

Attack surface

Components available to be used by an attacker against the product itself.

47
New cards

Attenuation

Gradual loss in intensity of any kind of flux through a medium. As an electrical signal travels down a cable, the signal can degrade and distort or corrupt the data it is carrying.

48
New cards

Attribute

A column in a two-dimensional database.

49
New cards

Authentication Header (AH) Protocol

Protocol within the IPSec suite used for integrity and authentication.

50
New cards

Authenticode

A type of code signing, which is the process of digitally signing software components and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was digitally signed. Authenticode is Microsoft's implementation of code signing.

51
New cards

Availability

Reliable and timely access to data and resources is provided to authorized individuals.

52
New cards

Avalanche effect

Algorithm design requirement so that slight changes to the input result in drastic changes to the output.

53
New cards

Base registers

Beginning of address space assigned to a process. Used to ensure a process does not make a request outside its assigned memory boundaries.

54
New cards

Baseband transmission

Uses the full bandwidth for only one communication channel and has a low data transfer rate compared to broadband.

55
New cards

Bastion host

A highly exposed device that will most likely be targeted for attacks, and thus should be hardened.

56
New cards

Behavior blocking

Allowing the suspicious code to execute within the operating system and watches its interactions with the operating system, looking for suspicious activities.

57
New cards

Confidentiality

data is not disclosed to unauthorized users

58
New cards

Integrity

prevents any unauthorized or unwanted modification of data

59
New cards

Availability

ensures that IT systems and data are available when needed

60
New cards

Backups

Copies of data stored in case the original is stolen or becomes corrupt

61
New cards

Redundant disks

Provides fault tolerance by mirroring data on another drive. If the first drive fails, data is not lost since the system can automatically switch over to the other drive.

62
New cards

Redundant servers

Provides fault tolerance by having one or more entire systems available in case the primary one crashes.

63
New cards

Redundant connections

Provides fault tolerance by having redundant internet connections so if one fails, the organization can still has connectivity

64
New cards

Redundant sites

Hot, cold, or warm sites are planned for business continuity incase of emergency. Hot sites are ready at a moment's notice. Cold sites are empty buildings with just electricity and running water. Warm sites are hybrids.

65
New cards

Hashing

These algorithms provide data integrity only

66
New cards

Defense in Depth

A defense that uses multiple types of security devices to protect a network. Also called layered security.

67
New cards

Authenication

Identifies user(s)

68
New cards

Authorization

Defines what the user(s) can access

69
New cards

Accounting

Tracking user(s) activities.

70
New cards

Accountability

Underlying goals of the AAAs of security. The trait of being willing to take responsibility for your actions

71
New cards

Nonrepudiation

A user cannot deny any particular act that he or she did on the IT system

72
New cards

Least Privilege

Providing only the minimum amount of privileges necessary to perform a job or function.

73
New cards

Separation of Duties

Distributing tasks and associated privileges among multiple people, primary objective to prevent fraud and errors

74
New cards

Due Diligence

Necessary level of care and attention that is taken to investigate an action before it is taken. (Look before jumping)

75
New cards

Due Care

The requirement that a professional exercise reasonable ability and judgement in a specific circumstance, the absence of which constitutes negligence. Also called standard of care.

76
New cards

Three Factors of Authentication

Something you... know, have and are

77
New cards

False Reject Rate

The percentage or value associated with the rate at which authentic users are denied or prevented access to authorized areas as a result of a failure in the biometric device.

78
New cards

False Accept Rate

The percentage of identification instances in which unauthorized users are allowed access to systems or areas as a result of a failure in the biometric device.

79
New cards

Crossover Error Rate

The crossover error rate, also called the equal error rate, is the point at which the number of false positives matches the number of false negatives in a bio metric system. Select the system with the lowest crossover error rate within your budget.

80
New cards

Multifactor Authentication

A form of authentication where a user must use two or more factors to prove his or her identity.

81
New cards

Single Sign-on Authentication

Authenticate once to access multiple resources

82
New cards

Centralized Authentication

Credentials for the users are stored on a central server. Any user is able to log on to the network once and then access any computer in the network (as long as the user has permissions). For example, if a computer is part of a Microsoft domain, the central server will be a domain controller and hold accounts for all users in the domain.

83
New cards

Decentralized Authentication

Every computer has a separate database that stores credentials. If a user needed to log on to all four computers in this network, he or she would need to have four separate sets of credentials—one for each system.

84
New cards

Offline Authentication

Allows users who have logged in to the system at one time to still log in even when they are disconnected from a network. In a Windows environment, the system uses cached credentials. (A user will not be able to access network resources while using cached credentials. The user can only access resources on the local system using these offline credentials)

85
New cards

One-Time Passwords

Passwords created to be used only once. Because it's used only once, there's little risk of the password being reused even if an attacker is able to capture it while it is transmitted.

86
New cards

Subject

Accesses a resource (ex: users, computers, applications, networks)

87
New cards

Object

The resource being accessed (ex: data, hardware, applications, networks, facilities)

88
New cards

Logical Access Control

A mechanism that limits access to computer systems and network resources.

89
New cards

Access Control Lists

These lists are used to identify systems and specify which users, protocols, or services are allowed

90
New cards

Security Kernel

Consists of several components including software, firmware, and hardware. They represent represents all the security functionality of the operating system.

91
New cards

Physical Access Control

A mechanism that limits access to physical resources, such as buildings or rooms (ex: lock doors, alarm systems, cipher locks, CCTVs, guards)

92
New cards

Access Control Models

Regulate the admission of users into trusted areas of the organization-both logical access to information systems and physical access to the organization's facilities

93
New cards

Discretionary Access Control (DAC)

The least restrictive access control. Is an access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to a file and what privileges they have.

94
New cards

Non-Discretionary Access Control (Non-DAC)

Access rules are closely managed by the security administrator. Offers stronger security than DAC because it does not rely only on users compliance

95
New cards

Mandatory Access Control (MAC)

The most restrictive access control. Users are assigned a security level or clearance, and when they try to access an object, their clearance level is compared to the objects sensitivity level. If they match the user can access the object, if not, the user is denied access

96
New cards

Bell-LaPadula Model

Security model that deals only with confidentiality. Two rules: simple security property rule, the star property rule

97
New cards

Simple Security Property Rule

No read up. No subject can read information from an object with a security classification higher than that possessed by the subject itself.

98
New cards

The * Property (Star-property) Rule

No write down. Subjects granted access to any security level may not write to any object at a lower security level.

99
New cards

Biba Model

Security model that deals only with integrity.

100
New cards

Simple Integrity Axiom

No read down. Subjects granted access to any security level may not read an object at a lower security level