CISSP DOMAIN 1: Security and Risk Management

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/103

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:02 PM on 3/27/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

104 Terms

1
New cards

What are the three core principles of the CIA triad?

Confidentiality, Integrity, Availability

2
New cards

What is Confidentiality?

Ensuring data is only accessible to authorized users

3
New cards

What are common threats to Confidentiality?

Cryptanalysis, Social engineering, Keyloggers, IoT backdoors

4
New cards

What are solutions for protecting Confidentiality?

Encryption, MFA, access control, least privilege, need-to-know

5
New cards

What encryption is commonly used for data at rest?

AES-256

6
New cards

What protocols protect data in motion?

SSL, TLS, IPsec

7
New cards

What is data in use protection?

Clean desk, screen protectors, locking PCs, preventing shoulder surfing

8
New cards

What is Integrity?

Ensuring data has not been altered

9
New cards

What are threats to Integrity?

Data alteration, code injection, cryptanalysis

10
New cards

What are solutions for Integrity?

Hashing, checksums, digital signatures, access control

11
New cards

What hashing algorithms are commonly used?

MD5, SHA-1, SHA-2

12
New cards

What does a digital signature provide?

Integrity and non-repudiation

13
New cards

What is Availability?

Ensuring data is accessible when needed

14
New cards

What are threats to Availability?

DDoS, hardware failure, application errors

15
New cards

What are solutions for Availability?

Redundancy, RAID, patching, IDS/IPS, SLAs

16
New cards

What does IAAA stand for?

Identification, Authentication, Authorization, Accountability

17
New cards

What is Identification?

Claiming an identity (username, ID)

18
New cards

What is Authentication?

Verifying identity

19
New cards

What are the three authentication factors?

Something you know, have, are

20
New cards

What is Authorization?

Determining access permissions

21
New cards

What is Accountability?

Tracking actions to a user (auditing)

22
New cards

What are common access control models?

DAC, MAC, RBAC, ABAC, RuBAC

23
New cards

What is PCI-DSS used for?

Protecting credit card data

24
New cards

What is OCTAVE?

Risk management framework (self-directed)

25
New cards

What is COBIT?

IT governance framework aligning IT with business goals

26
New cards

What is ITIL?

IT service management framework

27
New cards

What is FRAP?

Risk analysis for a specific system via brainstorming

28
New cards

What is ISO 27001?

ISMS implementation standard

29
New cards

What is ISO 27002?

Guidance for security controls

30
New cards

What is ISO 27004?

Metrics for ISMS performance

31
New cards

What is ISO 27005?

Risk management standard

32
New cards

What is ISO 27799?

Protecting PHI

33
New cards

What is Criminal Law?

Law where society is the victim

34
New cards

What is Civil Law?

Law involving individuals or organizations as victims

35
New cards

What is Administrative Law?

Laws created by government agencies

36
New cards

What is Due Diligence?

Researching and identifying risks

37
New cards

What is Due Care?

Acting as a reasonable person would

38
New cards

Who is ultimately liable in security incidents?

Senior leadership

39
New cards

What is Real Evidence?

Physical evidence (USB, hard drive)

40
New cards

What is Direct Evidence?

Firsthand witness testimony

41
New cards

What is Circumstantial Evidence?

Indirect evidence supporting a conclusion

42
New cards

What is Corroborative Evidence?

Supports other evidence

43
New cards

What is Hearsay?

Secondhand information (inadmissible)

44
New cards

What is the Best Evidence Rule?

Use the most accurate/original evidence

45
New cards

What is Secondary Evidence?

Copies/logs when originals unavailable

46
New cards

What ensures evidence integrity?

Hashing and forensic copies

47
New cards

What is Chain of Custody?

Tracking evidence handling

48
New cards

What is Entrapment?

Forcing someone to commit a crime (illegal)

49
New cards

What is Enticement?

Luring someone already intending to commit a crime (legal)

50
New cards

How long does copyright last?

Life + 70 years (or 95 for corporations)

51
New cards

How long do trademarks last?

10 years, renewable indefinitely

52
New cards

How long do patents last?

20 years

53
New cards

What is HIPAA?

Protects health information (PHI)

54
New cards

What is GDPR?

EU privacy law with strict data protections

55
New cards

What is the Patriot Act?

Expands government surveillance powers

56
New cards

What is CFAA?

Computer crime law

57
New cards

What is GLBA?

Protects financial data

58
New cards

What is SOX?

Financial reporting regulation

59
New cards

What is SLA?

Agreement defining service expectations (e.g., uptime)

60
New cards

What is a Strategic Plan?

3–5 year long-term plan

61
New cards

What is a Tactical Plan?

1-year management plan

62
New cards

What is an Operational Plan?

Detailed day-to-day plan

63
New cards

What are Policies?

High-level mandatory rules

64
New cards

What are Standards?

Mandatory technical specifics

65
New cards

What are Guidelines?

Optional recommendations

66
New cards

What are Procedures?

Step-by-step instructions

67
New cards

What are Baselines?

Minimum security standards

68
New cards

What are Administrative Controls?

Policies, procedures, training

69
New cards

What are Technical Controls?

Hardware/software controls

70
New cards

What are Physical Controls?

Locks, guards, fences

71
New cards

What are Preventive Controls?

Stop incidents (firewalls, least privilege)

72
New cards

What are Detective Controls?

Detect incidents (IDS, CCTV)

73
New cards

What are Corrective Controls?

Fix incidents (patches, AV)

74
New cards

What are Recovery Controls?

Restore systems (backups, DR)

75
New cards

What are Compensating Controls?

Alternative controls when others aren’t feasible

76
New cards

What is Risk?

Threat × Vulnerability

77
New cards

What is Total Risk?

Threat × Vulnerability × Asset Value

78
New cards

What is Residual Risk?

Total Risk – Countermeasures

79
New cards

What is a Threat?

Potential harmful event

80
New cards

What is a Vulnerability?

Weakness that can be exploited

81
New cards

What is Quantitative Risk Analysis?

Risk measured in monetary terms

82
New cards

What is Qualitative Risk Analysis?

Risk based on likelihood and impact

83
New cards

What are risk responses?

Mitigation, Transfer, Accept, Avoid

84
New cards

What is NEVER an acceptable risk response?

Rejection

85
New cards

What is a Risk Register?

List of identified risks

86
New cards

What is SLE?

Single Loss Expectancy (AV × Exposure Factor)

87
New cards

What is KPI?

Measures performance toward goals

88
New cards

What is KGI?

Measures if goals were achieved

89
New cards

What is KRI?

Measures risk exposure

90
New cards

What is GRC?

Governance, Risk Management, Compliance

91
New cards

What is Governance?

Aligning IT with business goals

92
New cards

What is Risk Management?

Identifying, assessing, and mitigating risk

93
New cards

What is Compliance?

Meeting laws and regulations

94
New cards

What is NIST 800-53?

Security control framework

95
New cards

What is NIST 800-37?

RMF framework

96
New cards

What are the 7 RMF steps?

Prepare, Categorize, Select, Implement, Assess, Authorize, Monitor

97
New cards

What is Business Continuity Planning?

Ensuring operations continue after disruption

98
New cards

What is Business Impact Analysis?

Identifies critical systems

99
New cards

What is RPO?

Max data loss tolerated

100
New cards

What is RTO?

Time to restore system

Explore top notes

note
Chapter 2 - The Role of Prices
Updated 1134d ago
0.0(0)
note
7.2 Transcription
Updated 1153d ago
0.0(0)
note
Unit 2
Updated 692d ago
0.0(0)
note
Untitled
Updated 1069d ago
0.0(0)
note
Unit One Booklet 4
Updated 514d ago
0.0(0)
note
UO6 and UO7
Updated 1028d ago
0.0(0)
note
Chapter 2 - The Role of Prices
Updated 1134d ago
0.0(0)
note
7.2 Transcription
Updated 1153d ago
0.0(0)
note
Unit 2
Updated 692d ago
0.0(0)
note
Untitled
Updated 1069d ago
0.0(0)
note
Unit One Booklet 4
Updated 514d ago
0.0(0)
note
UO6 and UO7
Updated 1028d ago
0.0(0)

Explore top flashcards

flashcards
periodic table 52 elements
52
Updated 919d ago
0.0(0)
flashcards
War horse ch.1-8
24
Updated 443d ago
0.0(0)
flashcards
Edexcel IGCSE History, USA
124
Updated 802d ago
0.0(0)
flashcards
theology final
100
Updated 299d ago
0.0(0)
flashcards
La Comida vocab, parte 2
33
Updated 213d ago
0.0(0)
flashcards
climate change
55
Updated 1211d ago
0.0(0)
flashcards
periodic table 52 elements
52
Updated 919d ago
0.0(0)
flashcards
War horse ch.1-8
24
Updated 443d ago
0.0(0)
flashcards
Edexcel IGCSE History, USA
124
Updated 802d ago
0.0(0)
flashcards
theology final
100
Updated 299d ago
0.0(0)
flashcards
La Comida vocab, parte 2
33
Updated 213d ago
0.0(0)
flashcards
climate change
55
Updated 1211d ago
0.0(0)