CISSP: Unit 3: Security Engineering, Questions with accurate answers, 100% Accurate, rated A+
0 view 0 purchase
Course
CISSP
Institution
CISSP
CISSP: Unit 3: Security Engineering, Questions with accurate answers, 100% Accurate, rated A+
Abstraction - -Involves the removal of characteristics from an entity in order to easily represent its essential properties.
Access Control Matrix - -A two-dimensional table that allows for indiv...
rated a abstraction involves the removal of characteristics from an entity in order to easily represent its
Written for
CISSP
All documents for this subject (307)
Seller
Follow
QuickPass
Reviews received
Content preview
CISSP: Unit 3: Security Engineering,
Questions with accurate answers, 100%
Accurate, rated A+
Abstraction - ✔✔-Involves the removal of characteristics from an entity in order to easily represent its
essential properties.
Access Control Matrix - ✔✔-A two-dimensional table that allows for individual subjects and objects to
be related to each other.
Asymmetric Algorithms - ✔✔-One-way functions, that is, a process that is much simpler to go in one
direction (forward) than to go in the other direction (backward or reverse engineering).
Address Space Layout Randomization (ASLR) - ✔✔-Involves randomly arranging the positions of key data
areas of a program, including the base of the executable and the positions of the stack, heap, and
libraries in a process's memory address space.
Aggregation - ✔✔-Combining non-sensitive data from separate sources to create sensitive information.
Algorithm - ✔✔-A mathematical function that is used in the encryption and decryption processes.
Bell-La Padula Model - ✔✔-Explores the rules that would have to be in place if a subject is granted a
certain level of clearance and a particular mode of access.
Brewer-Nash (The Chinese Wall) Model - ✔✔-This model focuses on preventing conflict of interest when
a given subject has access to objects with sensitive information associated with two competing parties.
, Cable Plant Management - ✔✔-The design, documentation, and management of the lowest layer of the
OSI network model - the physical layer.
Certificate Authority (CA) - ✔✔-An entity trusted by one or more users as an authority in a network that
issues, revokes, and manages digital certificates.
Ciphertext or Cryptogram - ✔✔-The altered form of a plaintext message, so as to be unreadable for
anyone except the intended recipients.
Cloud Computing - ✔✔-A model for enabling ubiquitous, convenient, on-demand network access to a
shared pool of configurable computing resources (e.g. networks, servers, storage, applications, and
services) that can be rapidly provisioned and released with minimal management.
Common Criteria - ✔✔-Provides a structured methodology for documenting security requirements,
documenting and validating security capabilities, and promoting international cooperation in the area of
IT security.
Community Cloud Infrastructure - ✔✔-Provisioned for exclusive use by a specific community of
consumers from organizations that have shared concerns.
Confusion - ✔✔-Provided by mixing (changing) the key values used during the repeated rounds of
encryption. When the key is modified for each round, it provides added complexity that the attacker
would encounter.
Control Objects for Information and Related Technology (COBIT) - ✔✔-Provides a set of generally
accepted processes to assist in maximizing the benefits derived using information technology (IT) and
developing appropriate IT governance.
Covert Channels - ✔✔-Communications mechanisms hidden from the access control and standard
monitoring systems of an information system.
Cryptanalysis - ✔✔-The study of techniques for attempting to defeat cryptographic techniques and,
more generally, information security services.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller QuickPass. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.49. You're not tied to anything after your purchase.