In CISSP, what security objective does encryption primarily support?
Confidentiality (Integrity only if digital signatures or hashing are explicitly stated)
What does hashing primarily provide in CISSP?
Integrity by detecting unauthorized modification, not confidentiality
What is availability concerned with in CISSP?
Ensuring authorized access to systems and data when needed (uptime)
Who owns security governance in CISSP?
The Board of Directors and senior management
What is the primary purpose of security in CISSP?
To enable business objectives, not block them
In CISSP, what should come first: policy or technology?
Policy always comes before standards, procedures, and tools
How does CISSP define the relationship between governance and compliance?
Governance is broader; compliance is only the minimum baseline
What is due care in CISSP?
Implementing reasonable security controls
What is due diligence in CISSP?
Continuous monitoring and maintenance of security controls
What legal risk can arise from lack of due diligence?
Negligence
What is the conceptual CISSP risk formula?
Risk = Threat × Vulnerability × Impact
Who must approve risk acceptance in CISSP?
Senior management
Does risk mitigation eliminate risk in CISSP?
No, it only reduces risk
Which risk response eliminates risk entirely?
Risk avoidance
What is risk appetite in CISSP?
The organization’s overall strategic willingness to accept risk
What is risk tolerance in CISSP?
The acceptable deviation from risk appetite at a tactical level
What is residual risk?
Risk remaining after controls are applied
What is inherent risk?
Risk that exists before any controls are implemented
Who is the data controller in privacy laws?
The entity that determines the purpose and means of processing personal data
Who is the data processor in privacy laws?
The entity that processes data on behalf of the controller
Where does primary accountability for privacy violations lie in CISSP?
With the data controller
In CISSP, what determines accountability: execution or decision-making?
Decision-making authority
What does purpose limitation control?
How personal data is used
What does data minimization control?
How much personal data is collected