CISSP Dictionary Flashcards

(34 cards)

1
Q

SCRM

A

Supply chain risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The CIA Triad

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The DAD Triad

A

Disclosure, Alteration, Destruction

aka the opposite of or failure of the CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AAA Services

A

Authentication, Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CTO

A

Chief Technical Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ATO

A

authorization to operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CSO

A

chief security officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIO

A

chief information officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CIRT

A

cyber incident response team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NIST

A

National Institute of Standards and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RMF

A

Risk Management Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CSF

A

Cybersecurity Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CIS

A

Center for Internet Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

COBIT

A

Control Objectives for Information and Related Technologies

A framework for IT governance that provides guidance for developing, implementing, and maintaining IT governance and management practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PCI DSS

A

Payment Card Industry Data Security Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FedRAMP

A

Federal Risk and Authorization Management Program

17
Q

ITIL

A

Information Technology Infrastructure Library

itlibrary.org - originally created by the British government

18
Q

PASTA

A

Process for Attack Simulation and Threat Analysis

19
Q

VAST

A

Visual, Agile, and Simple Threat

A threat modeling concept

20
Q

DREAD

A
  • Damage
  • Reproducibility
  • Exploitability
  • Affected Users
  • Discoverability
21
Q

STRIDE

A
  • Spoofing
  • Tampering
  • Repudiation
  • Information Disclosure
  • Denial of Service
  • Elevation of Privilege

STRIDE is a threat categorization scheme developed by Microsoft
structured framework for identifying and analyzing potential threats to a system or application, based on six key threat categories.

22
Q

Threat modeling
* Defined
* Ultimate Goal

A
  • Security process where potential threats are identified, categorized, and analyzed.
  • The ultimate goal of threat modeling is to prioritize the potential threats against an organization’s valuable assets
23
Q

What are the six primary security roles as defined by ISC2 for CISSP

A

The CISSP exam outlines six primary security roles:
Senior Manager
Security Professional
Data Owner
Data Custodian
User
Auditor

24
Q

ISC2

A

International Information System Security Certification Consortium

25
CISSP
Certified Information Systems Security Professional
26
Password Spraying
A form of brute-force attack where the attacker uses a single common password against multiple accounts.
27
Risk Management is...
is the likelihood of something bad happening and the impact if it did
28
Information Security is...
Risk Management
29
A threat exploits a _______________
Vulnerability
30
5 pillars of information security
Confidentiality Integrity Availability Authenticity Nonrepudiation The CIA Triad + authenticity + nonrepudiation
31
BCP
Business Continuity Planning
32
COOP
Continuity of Operations Plan
33
DRP
Disaster Recovery Plan
34
MTD
Maximum Tolerable Downtime