ISC2 CC (Chap 1,2,3,5)
ISC2 CC (Chap 1,2,3,5)
Module 1
o CIA Triad
▪ Confidentiality - permitting authorized access to information
• Personally Identifiable Information (PII) - any data about an
individual that could be used to identify them
• Protected Health Information (PHI) - information regarding one’s
health status, and classified or sensitive information
▪ Integrity - ensures its completeness, accuracy, internal consistency, and
usefulness for a stated purpose
• Baseline – documented, lowest level of security configuration
allowed by organization
▪ Availability - systems and data are accessible at the time users need them
o Authentication - verifying or proving the user’s identification
▪ 3 types of authentications
• Something you know: Passwords or paraphrases
• Something you have: Tokens, memory cards, smart cards
• Something you are: Biometrics, measurable characteristics
o Non-repudiation - protection against an individual falsely denying having performed
a particular action.
o Privacy - right of an individual to control the distribution of information about
themselves
▪ GDPR (only for EU or person in EU) - Euro
• handling the private data of people in a particular legal jurisdiction
must abide by its privacy requirements.
▪ HIPAA (Health Insurance Portability and Accountability Act) - USA
• Control how privacy of medical information should be maintained
Module 2
o Assets – something that need to protect
o Risk - potential consequences of what's going on in our environment.
o Vulnerability - weakness in an organization’s protection of its valuable assets,
including information.
o Threat - something or someone that aims to exploit a vulnerability to gain
unauthorized access.
▪ Threat actors
• Insider
• Outsider
• Formal entity
• Bots and AI
▪ Threat vector (approach & technique taken by threat actor)
o Likelihood - weighted factor based on a subjective analysis of the probability that a
given threat or set of threats is capable of exploiting a given vulnerability
o Risk Assessment - process of identifying, estimating and prioritizing risks to an
organization’s operations, assets, individuals, other organizations and even the
nation
o Risk Treatment - making decisions about the best actions to take regarding the
identified and prioritized risk
▪ Avoidance - decision to attempt to eliminate the risk entirely.
▪ Acceptance - taking no action to reduce the likelihood of a risk occurring
▪ Mitigation - most common type of risk management and includes taking
actions to prevent or reduce the possibility of a risk event or its impact.
▪ Transfer - practice of passing the risk to another party (typically an insurance
policy)
▪
Module 3
o Security Controls - physical, technical and administrative mechanisms that act as
safeguards or countermeasures prescribed for an information system to protect the
confidentiality, integrity and availability of the system and its information.
o Physical vs Logical
▪ Physical protect against area & assets
▪ Logical protect against system & computer
Module 4
o Governance Elements
▪ Procedures - detailed steps to complete a task that support departmental or
organizational policies.
▪ Policies - put in place by organizational governance, such as executive
management, to provide guidance in all activities to ensure that the
organization supports industry standards and regulations.
▪ Standards - used by governance teams to provide a framework to introduce
policies and procedures in support of regulations.
• ISO, NIST, IETF
▪ Regulations - commonly issued in the form of laws, usually from
government (not to be confused with governance) and typically carry
financial penalties for noncompliance.
• GDPR, HIPAA
o
o Code of Ethics
▪
A chief information security officer (CISO) at a large organization
documented a policy that establishes the acceptable use of cloud
environments for all staff. This is an example of a: (D1, L1.3.1)
A) Management/Administrative control
B) Technical control
C) Physical control
D) Cloud control
A) Yes
B) No
C) Sometimes
D) Never
A) If a user does something, they can't later claim that they didn't do it.
B) Controls to protect the organization's reputation from harm due to inappropriate social media
accounts and personal time.
Which of the following is NOT one of the four typical ways of managing
risk? (D1, L1.2.1)
A) Avoid
B) Accept
C) Mitigate
D) Conflate
A) Avoidance
B) Acceptance
C) Mitigation
D) Transfer
A) Policy
B) Standard
C) Procedure
D) Guideline
A) The law
B) The policy
C) Any procedures the company has created for the particular activities affected by the law
D) Lankesh should be allowed to use personal and professional judgment to make the determination of
Kristal is the security administrator for a large online service provider.
Kristal learns that the company is harvesting personal data of its
customers and sharing the data with local governments where the
company operates, without the knowledge of the users, to allow the
governments to persecute users on the basis of their political and
philosophical beliefs. The published user agreement states that the
company will not share personal user data with any entities without the
users' explicit permission. According to the (ISC) 2 Code of Ethics, to whom
does Kristal ultimately owe a duty in this situation? (D1, L1.5.1)
C) The users
D) (ISC)2
While taking the certification exam for this certification, you notice another
candidate for the certification cheating. What should you do? (D1, L1.5.1)
A) Confidentiality
B) Integrity
C) Availability
D) Plausibility
Chap 2 – Incident Response, Business Continuity, Disaster Recovery
Module 1
o Incident Terms
▪ Breach - The loss of control, compromise, unauthorized disclosure,
unauthorized acquisition, or any similar occurrence
▪ Event - Any observable occurrence in a network or system.
▪ Exploit - A particular attack. It is named this way because these attacks
exploit system vulnerabilities
▪ Incident - An event that actually or potentially jeopardizes the
confidentiality, integrity or availability of an information system or the
information the system processes, stores or transmits.
▪ Intrusion - A security event, or combination of events, that constitutes a
deliberate security incident in which an intruder gains, or attempts to gain,
access to a system or system resource without authorization
▪ Threat - Any circumstance or event with the potential to adversely impact
organizational operations (including mission, functions, image or
reputation), organizational assets, individuals, other organizations or the
nation through an information system via unauthorized access, destruction,
disclosure, modification of information and/or denial of service.
▪ Vulnerability - Weakness in an information system, system security
procedures, internal controls or implementation that could be exploited by a
threat source.
▪ Zero Day - A previously unknown system vulnerability with the potential of
exploitation without risk of detection or prevention because it does not, in
general, fit recognized patterns, signatures or methods.
o Components of Incident Response Plan
▪ Preparation -> Detection and Analysis -> Containment -> Post-Incident
Activity
You are working in your organization's security office. You receive a call
from a user who has tried to log in to the network several times with the
correct credentials, with no success. This is an example of a(n)_______. (D2,
L2.1.1)
A) Emergency
B) Event
C) Policy
D) Disaster
You are working in your organization's security office. You receive a call
from a user who has tried to log in to the network several times with the
correct credentials, with no success. After a brief investigation, you
determine that the user's account has been compromised. This is an
example of a(n)_______. (D2, L2.1.1)
A) Risk management
B) Incident detection
C) Malware
D) Disaster
A) Exploit
B) Intrusion
C) Event
D) Malware
When responding to a security incident, your team determines that the
vulnerability that was exploited was not widely known to the security
community, and that there are no currently known definitions/listings in
common vulnerability databases or collections. This vulnerability and
exploit might be called ______. (D2, L 2.1.1)
A) Malware
B) Critical
C) Fractal
D) Zero-day
True
False
A) Business
B) Technical
C) IT
D) Financial
A) Guard dogs
B) Data backups
C) Contract personnel
D) Anti-malware solutions
A) Checklists
B) Firewalls
C) Motion detectors
D) Non-repudiation
D) Zero-day exploits
A) Routers
B) Laptops
C) Firewalls
D) Backups
Chap 3 – Access Control
Module 1
o Security Control Overview
▪ Subject - entity that requests access to our assets.
▪ Object - anything that a subject attempts to access
▪ Rule - instruction developed to allow or deny access to an object by
comparing the validated identity of the subject to an access control list.
o Defense in Depth
▪ Physical Control (largest)
• Policies, procedures
▪ Technical Control
• programming
▪ Administrative Control
▪ Assets (Smallest)
user provisioning - process of creating & managing user identity on the system
o
o
▪
o Logical Access Controls
▪ Meaning
• are electronic methods that limit someone from getting access to
systems, and sometimes even to tangible assets or areas. Types of
logical access controls include:
• Passwords, Biometrics (implemented on a system, such as a
smartphone or laptop), Badge/token readers connected to a system
▪ Discretionary access control (DAC)
• access control policy that is enforced over all subjects and objects in
an information system.
• allow users to establish or change these permissions on files they
create or otherwise have ownership of
•
• This methodology relies on the discretion of the owner of the access
control object to determine the access control subject’s specific
rights.
▪ Mandatory Access Control (MAC)
• one that is uniformly enforced across all subjects and objects within
the boundary of an information system.
• Mandatory Access Control, it is mandatory for security
administrators to assign access rights or permissions
▪ Role-Based Access Control (RBAC)
• sets up user permissions based on roles. Each role represents users
with similar or identical permissions.
Question 1 1 / 1 point
Which of the following is a subject? (D 3, L3.1.1)
A) A file
B) A fence
C) A filename
D) A user
1 / 1 point
Question 2
Lia works in the security office. During research, Lia learns that a configuration
change could better protect the organization's IT environment. Lia makes a
proposal for this change, but the change cannot be implemented until it is
approved, tested, and then cleared for deployment by the Change Control Board.
This is an example of __________. (D3, L3.1.1)
A) Defense in depth
B) Holistic security
C) Threat intelligence
D) Segregation of duties
1 / 1 point
Question 3
Duncan and Mira both work in the data center at Triffid, Inc. There is a policy in
place that requires both of them to be present in the data center at the same time;
if one of them has to leave for any reason, the other has to step out, too, until they
can both re-enter. This is called ________. (D 3, L3.1.1)
A) Blockade
B) Multifactor authentication
C) Two-person integrity
D) Defense in depth
1 / 1 point
Question 4
Clyde is the security analyst tasked with finding an appropriate physical control to
reduce the possibility that unbadged people will follow badged employees through
the entrance of the organization's facility. Which of the following can address this
risk? (D3, L3.2.1)
A) Fences
B) Dogs
C) Bollards
D) Turnstiles
1 / 1 point
Question 5
Sinka is considering a physical deterrent control to dissuade unauthorized people
from entering the organization's property. Which of the following would serve this
purpose? (D3, L3.2.1)
A) A wall
B) Razor tape
C) A sign
D) A hidden camera
1 / 1 point
Question 6
Which of these combinations of physical security controls share a single point of
failure? (D3, L3.2.1)
1 / 1 point
Question 7
Lakshmi presents a userid and a password to a system in order to log on. Which of
the following characteristics must the userid have? (D3, L3.3.1)
A) Confidential
B) Complex
C) Unique
D) Long
1 / 1 point
Question 8
Lakshmi presents a userid and a password to a system in order to log on. Which of
the following characteristics must the password have? (D3, L3.3.1)
A) Confidential
B) Unique
C) Mathematical
D) Shared
Question 9 1 / 1 point
Derrick logs on to a system in order to read a file. In this example, Derrick is the
______. (D3, L3.3.1)
A) Subject
B) Object
C) Process
D) Predicate
1 / 1 point
Question 10
Which is a physical control that prevents "piggybacking" or "tailgating"; that is, an
unauthorized person following an authorized person into a controlled area? (D3,
L3.2.1)
A) Bollard
B) Turnstile
C) Fence
D) Wall
Chap 5 – Security Operations
Data handling
- Life cycle model
o Create - Creating the knowledge (tacit knowledge)
o Store (store or record, make it explicit)
o Use (using the knowledge, maybe being modified)
o Share (copy or moving from 1 location to another)
o Archive (archiving data when temporarily not needed)
o Destroy (delete data when not needed)
- OSHA (protect wellbeing of worker)
- HIPAA – Healthcare insurance …. (medical record need to be kept for 10 years)
- OSHA – medical record of employee kept for 30 years
- Degaussing – process of eliminate unwanted magnetic field (data) stored on disk
Encryption Overview
- involved cryptography. Transform plaintext to ciphertext
-
Configuration Management Overview
- process used to ensure that the only changes made to a system are those that have
been authorized and validated.
- Identification - Baseline identification of a system and all its components, interfaces
and documentation.
- Baseline - minimum level of protection that can be used as a reference point
- Change Control - update process for requesting changes to a baseline, by means of
making changes to one or more components in that baseline. (update and patches)
- Verification and Audit - validation process, which may involve testing and analysis,
to verify that nothing in the system was broken
-
What is Security Awareness Training?
- Education: help learners improve their understanding of these ideas and their ability
to relate them to their own experiences and apply that learning in useful ways.
- Training: Focuses on building proficiency in a specific set of skills or actions,
sharpening the perception, focus on low-level skills, an entire task or complex
workflows consisting of many tasks.
- Awareness: These are activities that attract and engage the learner’s attention by
acquainting them with aspects of an issue, concern, problem or need.
- Whaling attacks: phishing attack targeted top people in organization
Password Advice
- 10 numbers (5 seconds)
- 8 multiple char (35 days)
- 16 char (152,000 years)
Quiz
Which of the following can be used to map data flows through an organization and
the relevant security controls used at each point along the way? (D5.1, L5.1.1)
A) Encryption
B) Hashing
C) Hard copy
Who is responsible for publishing and signing the organization's policies? (D5.3,
L5.3.1)
B) Human Resources
C) Senior management
A) Asymmetric
B) Symmetric
C) Hashing
D) Covert
A ready visual cue to let anyone in contact with the data know what the
classification is. (D5.1, L5.1.1)
A) Encryption
B) Label
C) Graphics
D) Photos
A) Patches
B) Inventory
C) Baseline
D) Policy
A) Protecting assets
Which entity is most likely to be tasked with monitoring and enforcing security
policy? (D5.3, L5.3.1)
C) Regulators