100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

CISSP Exam Review. 100% Mastery of concepts. Approved.

Beoordeling
-
Verkocht
-
Pagina's
31
Cijfer
A+
Geüpload op
21-02-2023
Geschreven in
2022/2023

CISSP Exam Review. 100% Mastery of concepts. Approved. CIA Triangle - -Cornerstone of infosec. Confidentiality, Integrity, Availability Confidentiality (CIA Triangle) - -prevention of unauthorized disclosure of information; prevention of unauthorized read access to data Integrity (CIA Triangle) - -prevention of unauthorized modification of data; prevention of unauthorized write access to data Availability (CIA Triangle) - -ensures data is available when needed to authorized users Opposing forces to CIA - -DAD: disclosure, alteration, destruction identification - -the process by which a subject professes an identity and accountability is initiated; ex: typing a username, swiping a smart card, waving a proximity device (badging in), speaking a phrase, etc - always a two step process with authenticating authentication - -verification that a person is who they say they are; ex: entering a password or PIN, biometrics, etc - always a two step process with identifying authorization - -verification of a person's access or privileges to applicable data auditing (monitoring) - -recording a log of the events and activities related to the system and subjects accounting (accountability) - -reviewing log files to check for compliance and violations in order to hold subjects accountable for their actions non-repudiation - -a user cannot deny having performed a specific action subject - -an entity that performs active functions to a system; usually a person, but can also be script or program designed to perform actions on data object - -any passive data within the system ISC2 Code of Ethics Canons (4) - -1. protect society, commonwealth, infrastructure 2. act honorably, justly, responsibly, legally 3. provide diligent and competent service 4. advance and protect the profession strictly applied in order; exam questions in which multiple canons could be the answer, choose the highest priority per this order policy - -mandatory high level management directives; components of policy 1. purpose: describes the need for policy 2. scope: what systems, people, facilities, organizations are covered 3. responsibilities: specific duties of involved parties 4. compliance: effectiveness of policy, violations of policy procedure - -low level step by step guide for accomplishing a task standard - -describes the specific use of technology applied to hardware or software; mandatory guideline - -discretionary recommendations (e.g. not mandatory) baseline - -a uniform way of implementing a standard 3 access/security control categories - -1. administrative: implemented by creating org policy, procedure, regulation. user awareness/training also fall here 2. technical: implemented using hardware, software, firmware that restricts logical access to a system 3. physical: locks, fences, walls, etc preventive access control (can be administrative, technical, physical) - -prevents actions from occurring by applying restrictions on what a user can do. example: privilege level detective access control (can be administrative, technical, physical) - -controls that alert during or after a successful attack; alarm systems, or closed circuit tv corrective access control (can be administrative, technical, physical) - -repairing a damaged system; often works hand in hand with detective controls (e.g. antivirus software) recovery access control (can be administrative, technical, physical) - -controls to restore a system after an incident has occurred; deterrent access control (can be administrative, technical, physical) - -deters users from performing actions on a system compensating access control (can be administrative, technical, physical) - -additional control used to compensate for weaknesses in other controls as needed risk formula - -risk = threat x vulnerability x impact market approach (for calculating intangible assets) - -assumes the fair value of an asset reflects the price which comparable assets have been purchased in transactions under similar circumstances income approach (for calculating intangible assets) - -the value of an asset is the present value of the future earning capacity that an asset will generate over the rest of its lifecycle cost approach (for calculating intangible assets) - -estimates the fair value based on cost of replacement exposure factor (EF) - -percentage of value the asset lost due to incident single loss expectancy (SLE) - -asset value (AV) times exposure factor AV x EF = SLE expressed in a dollar value annual rate of occurrence (ARO) - -number of losses suffered per year annualized loss expectancy (ALE) - -yearly cost due to risk SLE x ARO = ALE legally defensible security - -to obtain legal restitution a company must demonstrate a crime was committed, suspect committed that crime, and took reasonable efforts to prevent the crime files are accurate, policy in place, proper authentication, compliance with laws and regulation layering (defense in depth) - -the use of multiple controls in a series (one after another, linearly); no one control can protect against all possible threats; top down approach - -senior management responsible for initiating and defining policies; middle management fleshes out policy into standards, baselines, guidelines, and procedures; end users must comply with all policies strategic plan - -long term plan that is fairly stable; defines the org's security purpose; useful to forecast about 5 years and serves as a planning horizon - long term goals and vision (high level) tactical plan - -midterm plan developed to provide more details on accomplishing goals set forth in the strat plan; generally useful for a year; more granular than strat plan operational plan - -short term, highly detailed plan based on strat and tactical plans; valid only for a short time; very low level and granular; provides direction for many areas and issues change management - -ensure that any change does not lead to reduced or compromised security; also responsible for roll backs; make all changes subject to detailed documentation and auditing data classification - -process of organizing items, objects, subjects, into groups, categories, or collections with similarities; formalize and stratify the process of securing data based on assigned labels of importance and sensitivity government/military classification - -TS > Sec > Confidential > sensitive > unclassified commercial/private section classifications - -confidential/private > sensitive > public senior manager role - -person who is ultimately responsible for the security and protection of an orgs assets; signs off on all activities and policy; overall success and failure rests on this role data owner - -responsible for classifying information for placement and protection within policy/solutions; often delegates actual management of the data to a custodian data custodian - -responsible for implementing the prescribed protection defined by the security policy and senior management; responsible for the day to day tasks of maintaining the data/system COBIT 5 (control framwork) Control Objectives for Information and Related Technology - -principles for governance and management of enterprise IT 1. meeting stakeholder needs 2. covering the enterprise end to end 3. applying a single framework 4. enabling a holistic approach 5. separating governance from management regulatory policy - -required whenever industry or legal standards are applicable to your organization (NERC CIP, FISMA) advisory policy - -discusses behaviors and activities that are acceptable and defines consequences of violations (most fall into this category) informative policy - -provides information about a specific subject; ex: company goals, mission statements STRIDE threat categorization - -Spoofing, tampering, repudiation, information disclosure, denial of service, elevation of privilege spoofing - -goal of gaining access to a target system through the use of a falsified identity; can be used against IP addresses, MAC address, user names, system names, SSIDs, email addresses, etc tampering - -any action resulting in the unauthorized changes or manipulation of data repudiation - -the ability of a user or attacker to deny having performed a specific action or activity (plausible deniability) information disclosure - -distribution of private, confidential, or controlled information to external or unauthorized entities denial of service (DoS) - -attempts to prevent authorized use of a resource. can be accomplished through flaw exploitation, connection overloading, or traffic flooding elevation of privilege - -a limited user account is transformed into an account with greater privileges and access DREAD threat rating system - -damage potential, reproducibility, exploitability, affected users, discoverability security governance - -collection of practices related to supporting, defining, and directing the security efforts of an organization third party governance - -system of oversight that may be mandated by law, regulation, industry standards, contractual obligation, or licensing agreements compliance - -the act of conforming to or adhering to rules, policies, regulations, standards, or requirements documentation review - -the process of reading the exchanged materials and verifying them against standards and expectations business continuity planning (BCP) - -assessing the risks to organizational processes and crafting policies, plans, and procedures to minimize the impact of those risks quantitative decision making - -involves the use of numbers and formulas to reach a decision; often expressed in terms of dollar value qualitative decision making - -non numerical factors such as emotion, investor/customer confidence, workforce stability, etc into account; often results in categories of prioritization (high medium low) Computer Fraud and Abuse Act (1986) - -changed the scope of the CCCA to include all "federal interest" computers; all government and financial systems Computer Abuse Amendments Act (1994) - -amendment to the CFAA to be more encompassing; outlawed malicious code, expanded to any system used for interstate commerce, imprisonment, legal authority for victims Computer Security Act (1997) - -mandated baseline security requirements for all federal systems National Information Infrastructure Protection Act (1996) - -further extends the protections of the CFAA to systems used in international commerce Federal Information Security Management Act (FISMA - 2002) - -requires federal agencies implement an information security program that covers the agency's operations - also requires the inclusion of contractors in their security management programs copyright - -guarantees the creators of original works of authorship protection against unauthorized duplication of their work - 70 years after death Digital Millennium Copyright Act (1998) - -US bringing copyright law into compliance with the WIPO; covered attempts to circumvent copyright protection electronically, limited the liability of the IP trademarks - -words, slogans, logos used to identify a company or its products; protection is automatic (tm), official registration grants the encircled 'R' notation patents - -IP rights of inventors; good for 20 years at which it becomes public domain trade secrets - -IP that is critical to their business and significant damage would result if disclosed espionage act of 1996 - -specifically deals with trade secrets; foreign - 500k and 15 years, domestic - 250k and 10 years Uniform Computer Information Transactions Act - -UCITA - designed for adoption by each state to provide a common framework for the conduct of computer related business transactions personally identifiable information - -any information that can identify an individual protected health information - -any health related information that can be related to a specific person

Meer zien Lees minder
Instelling
Vak











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Vak

Documentinformatie

Geüpload op
21 februari 2023
Aantal pagina's
31
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

CISSP Exam Review. 100% Mastery of
concepts. Approved.

CIA Triangle - ✔✔-Cornerstone of infosec. Confidentiality, Integrity, Availability



Confidentiality (CIA Triangle) - ✔✔-prevention of unauthorized disclosure of information; prevention of
unauthorized read access to data



Integrity (CIA Triangle) - ✔✔-prevention of unauthorized modification of data; prevention of
unauthorized write access to data



Availability (CIA Triangle) - ✔✔-ensures data is available when needed to authorized users



Opposing forces to CIA - ✔✔-DAD: disclosure, alteration, destruction



identification - ✔✔-the process by which a subject professes an identity and accountability is initiated;
ex: typing a username, swiping a smart card, waving a proximity device (badging in), speaking a phrase,
etc - always a two step process with authenticating



authentication - ✔✔-verification that a person is who they say they are; ex: entering a password or PIN,
biometrics, etc - always a two step process with identifying



authorization - ✔✔-verification of a person's access or privileges to applicable data



auditing (monitoring) - ✔✔-recording a log of the events and activities related to the system and
subjects



accounting (accountability) - ✔✔-reviewing log files to check for compliance and violations in order to
hold subjects accountable for their actions

,non-repudiation - ✔✔-a user cannot deny having performed a specific action



subject - ✔✔-an entity that performs active functions to a system; usually a person, but can also be
script or program designed to perform actions on data



object - ✔✔-any passive data within the system



ISC2 Code of Ethics Canons (4) - ✔✔-1. protect society, commonwealth, infrastructure

2. act honorably, justly, responsibly, legally

3. provide diligent and competent service

4. advance and protect the profession



strictly applied in order; exam questions in which multiple canons could be the answer, choose the
highest priority per this order



policy - ✔✔-mandatory high level management directives; components of policy



1. purpose: describes the need for policy

2. scope: what systems, people, facilities, organizations are covered

3. responsibilities: specific duties of involved parties

4. compliance: effectiveness of policy, violations of policy



procedure - ✔✔-low level step by step guide for accomplishing a task



standard - ✔✔-describes the specific use of technology applied to hardware or software; mandatory



guideline - ✔✔-discretionary recommendations (e.g. not mandatory)

,baseline - ✔✔-a uniform way of implementing a standard



3 access/security control categories - ✔✔-1. administrative: implemented by creating org policy,
procedure, regulation. user awareness/training also fall here

2. technical: implemented using hardware, software, firmware that restricts logical access to a system

3. physical: locks, fences, walls, etc



preventive access control

(can be administrative, technical, physical) - ✔✔-prevents actions from occurring by applying restrictions
on what a user can do. example: privilege level



detective access control

(can be administrative, technical, physical) - ✔✔-controls that alert during or after a successful attack;
alarm systems, or closed circuit tv



corrective access control

(can be administrative, technical, physical) - ✔✔-repairing a damaged system; often works hand in hand
with detective controls (e.g. antivirus software)



recovery access control

(can be administrative, technical, physical) - ✔✔-controls to restore a system after an incident has
occurred;



deterrent access control

(can be administrative, technical, physical) - ✔✔-deters users from performing actions on a system



compensating access control

(can be administrative, technical, physical) - ✔✔-additional control used to compensate for weaknesses
in other controls as needed

, risk formula - ✔✔-risk = threat x vulnerability x impact



market approach (for calculating intangible assets) - ✔✔-assumes the fair value of an asset reflects the
price which comparable assets have been purchased in transactions under similar circumstances



income approach (for calculating intangible assets) - ✔✔-the value of an asset is the present value of the
future earning capacity that an asset will generate over the rest of its lifecycle



cost approach (for calculating intangible assets) - ✔✔-estimates the fair value based on cost of
replacement



exposure factor (EF) - ✔✔-percentage of value the asset lost due to incident



single loss expectancy (SLE) - ✔✔-asset value (AV) times exposure factor

AV x EF = SLE

expressed in a dollar value



annual rate of occurrence (ARO) - ✔✔-number of losses suffered per year



annualized loss expectancy (ALE) - ✔✔-yearly cost due to risk

SLE x ARO = ALE



legally defensible security - ✔✔-to obtain legal restitution a company must demonstrate a crime was
committed, suspect committed that crime, and took reasonable efforts to prevent the crime



files are accurate, policy in place, proper authentication, compliance with laws and regulation



layering (defense in depth) - ✔✔-the use of multiple controls in a series (one after another, linearly); no
one control can protect against all possible threats;
$10.49
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
QuickPass Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
410
Lid sinds
3 jaar
Aantal volgers
304
Documenten
6372
Laatst verkocht
3 weken geleden
Get all Documents you need at discount.

All nursing docs available: question banks, summaries, study guide and test banks

3.8

97 beoordelingen

5
52
4
11
3
10
2
10
1
14

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen