ISC- S3

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/54

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

55 Terms

1
New cards

1 data breaches, service disruptions, compliance risk

knowt flashcard image
2
New cards

2 cyberattacks and types of cyberattacks chart

knowt flashcard image
3
New cards

3 cyberattacks-network based attacks

knowt flashcard image
4
New cards

4 reverse shell attacks, return-oriented attacks

knowt flashcard image
5
New cards

5 spoofing- address resolution spoofing and dns spoofing

knowt flashcard image
6
New cards

6 application based attacks-structured query language (SQL) injection, cross site scripting (XSS)

knowt flashcard image
7
New cards

7 difference between structured query language (SQL) injection and cross site scripting (XSS)

knowt flashcard image
8
New cards

8 race condition, mobile code (including ovewrite virus, multi-partite virus, parasitic virus, polymorphic virus, resident virus)

knowt flashcard image
9
New cards

9 host based attacks-brute force attack

knowt flashcard image
10
New cards

10 social engineering attacks- spear phising, business email compromise (BEC), pretexting, pharming, vishing

knowt flashcard image
11
New cards

11 physical, on-premises attacks- piggybacking

knowt flashcard image
12
New cards

12 supply chain attacks- embedded software code, foreign sourced attacks, pre-installed malware on hardware, vendor attacks, watering hole attacks

knowt flashcard image
13
New cards

13 stages in a cyber attack

knowt flashcard image
14
New cards

14 PASTA threat model

knowt flashcard image
15
New cards

15 VAST threat model

knowt flashcard image
16
New cards

16 STRIDE threat model

knowt flashcard image
17
New cards

17 COSO framework- operational objectives, reporting objectives, compliance objectives

knowt flashcard image
18
New cards

18 security standards

knowt flashcard image
19
New cards

19 network protection methods- bridges, gateway

knowt flashcard image
20
New cards

20 network protection methods- signal modifiers, switches

knowt flashcard image
21
New cards

21 network security- network segmentation or isolation, service set identifyer (SSID)

knowt flashcard image
22
New cards

22 system hardening- examples are database, endpoint, network and server hardenings

knowt flashcard image
23
New cards

23 NIST password recommendations

knowt flashcard image
24
New cards

24 password managers- hashing, salting, iteration count definitions

knowt flashcard image
25
New cards

25 provisioning

knowt flashcard image
26
New cards

26 common vulnerabilities and exposures dictionary

knowt flashcard image
27
New cards

27 defense in depth- logical access controls

knowt flashcard image
28
New cards

28 process layering and isolation

knowt flashcard image
29
New cards

29 abstraction and concealment

knowt flashcard image
30
New cards

30 hardware segmentation

knowt flashcard image
31
New cards

31 device and software hardening, intrusion prevention systems (IPS)

knowt flashcard image
32
New cards

32 discretionary access control (DAC), mandatory access controls

knowt flashcard image
33
New cards

33 policy based access control (PBAC), risk based access controls

knowt flashcard image
34
New cards

34 access control lists (ACL)- filesystem ACL, networking ACL

knowt flashcard image
35
New cards

35 detective controls- network intrusion detection system (NIDS), network monitoring tools, intrusion detection systems (IDS)

knowt flashcard image
36
New cards

36 difference between security assessments and vulnerability assessments

knowt flashcard image
37
New cards

37 security assessment reports- including the key terms in SARs

knowt flashcard image
38
New cards

38 tokenization, masking definitions and chart

knowt flashcard image
39
New cards

39 symmetric encryption

knowt flashcard image
40
New cards

40 asymmetric encryption

knowt flashcard image
41
New cards

41 private keys and whether it is symmetric or asymmetric encryption

knowt flashcard image
42
New cards

42 cipher techniques- substitution ciphers and transposing ciphers with charts

knowt flashcard image
43
New cards

43 incident response timeline chart

knowt flashcard image
44
New cards

44 method of detection for incident response timeline

knowt flashcard image
45
New cards

45 steps to responding to an incident (there are 7)

knowt flashcard image
46
New cards

46 SANS institute incident response plan

knowt flashcard image
47
New cards

47 NIST IRP

knowt flashcard image
48
New cards

48 international organization for standardization IRP

knowt flashcard image
49
New cards

49 other IRP organizations and frameworks

knowt flashcard image
50
New cards

50 IRPs tailored to specific attacks

knowt flashcard image
51
New cards

51 IRP metrics- mean time to detect (MTTD), mean time to acknowledge (MTTA), mean time to contain (MTTC), mean time to repair (MTTR), mean time between failures (MTBF), system availability or downtime, service level agreement compliance

knowt flashcard image
52
New cards

52 insurable losses related to cyberattack

knowt flashcard image
53
New cards

53 cyber insurance requirements for applicants

knowt flashcard image
54
New cards

Typosquatting

A malicious practice where an attacker registers a domain name that is a misspelling of a legitimate brand's domain to deceive users into visiting the fraudulent site.

55
New cards

NIST Risk Management Framework

knowt flashcard image