CISSP Chapter 1 Flashcards - Quizlet
CISSP Chapter 1 Flashcards - Quizlet
What is data sensitivity? Refers to the quality of information, which could cause harm or
damage if disclosed.
What is data concealment? Hiding data to prevent disclosure. Includes cover, obfuscation, and
distraction. This is not the same as encryption.
What is data privacy? Refers to keeping specific data (PII) confidential so as not to expose
people and their information.
How do the 3 points of the CIA triangle Without confidentiality, you have no integrity. Without both, you
depend on each other? cannot guarantee availability.
What companies prioritize CIA points over Military and govt agencies tend to have confidentiality at the top.
other CIA points? Private companies tend to have availability at the top.
What initiates your accountability? Providing your identity. Computers track identities/user accounts, not
subjects.
What does authorization look at? The permissions for the subject, object, and intended activity.
What is the difference between auditing Auditing records actions. Also called monitoring. Leaves proof for
and accounting? prosecution.
Accounting reviews those actions for compliance and violations to
hold users accountable.
What is accountability dependent on? A strong authentication process. The reason is we must link the actions
to a human. If authentication is weak, then we don't really know if the
log on was legitimate.
What is abstraction? Grouping elements together into concepts. This allows us to assign
permissions to groups more easily.
Who is security management a Upper management, not the IT staff. It is a business operations issue.
responsibility of? The InfoSec teams should be autonomous.
What does every organization's security Approval and commitment by senior management. It's up to the policy
plan need? development team to educate management on why it's needed.
What's are strategic, tactical, and Long, medium, and short term plans. 5 years, 1 year, and day to day.
operational plans?
Strategic plans defines the organization's security purpose and aligns
it to the company's goals. Updated yearly.
How can acquisitions and mergers pose Data can be lost, co-mingled, or disclosed. In addition, downtime can
security risks? occur that takes away from availability.
Why is change management important? Changes can introduce loopholes or oversights leading to new
vulnerabilities or damage to CIA triangle.
What is the main goal of change Ensuring changes to not lead to compromised security. Also offers
management? What is its primary purpose? rollback procedures. The primary purpose is to provide
documentation for review and scrutiny by management.
What is a parallel run? Change management test that tests functionality on a new and old
system simultaneously to check if new system supports all required
business functionality.
What is the purpose of data classification? Don't put too much effort into what doesn't need much protection
and vice versa. Leads to efficiency. Can put data in groups for easy
security controlling.
What are the seven steps to implement a Identify the custodian and his responsibilities.
classification scheme?
Specify evaluation criteria.
Classify and label based on criteria.
Sensitive
Public
In a business data classification scheme, Both usually require the same security controls. However, confidential
what's the main difference between data usually has company information while private data is more
confidential and private data? individual information, like medical records.
What are the six general security roles in an Senior manager - signs off of security policies. Ultimately responsible.
organization?
Security Professional - Design and implement security solutions based
on policies.
What are the five principles COBIT has for 1. Meeting stakeholder needs
governance and enterprise management? 2. Covering the enterprise end to end
3. Applying a single, integrated framework
4. Enabling a holistic approach
5. Separating governance from management
What's the difference between due care Due care is using reasonable care to protect the interests of the
and due diligence? Why are these company, while diligence are the activities practicing that care.
important?
Management must perform due care/diligence to disprove
negligence in case of a loss.
Should the different levels of No, the security policies, standards, baselines, guidelines, and
documentation in a company be combined procedures should be kept as separate entities. Not every user needs
into one? Why? to know every single procedure. In addition, this makes it easier to
enact changes.
What are the three overall categories of Advisory - Discusses behavior and activities that are acceptable.
security policies? Defines consequences for violations. Explains senior management's
desire for security and compliance.
Who does a security policy assign roles to? No individual in particular. The policy does not define who is to do
what, but rather what must be done by various roles in the company.
What is threat modeling? Potential threats are identified, categorized, and analyzed.
What is the defensive approach to threat Predicting threats and building into your code the defenses against
modeling? them. Not all threats can be predicted though.
What is the adversarial approach to threat Building, deploying, and then dealing with security issues. It's the
modeling? whole point behind ethical hacking/penetration testing, source code
review, etc.
What might the analysis of a threat entail if As an example, figure out what a hacker may want do to your website.
the threat is a human and not a natural His motives. Just disable it? Steal credit card info? Etc.
event?
What is STRIDE? What does it stand for? A threat modeling guide that helps you categorize threats
Spoofing
Tampering (ruins integrity of info)
Repudiation (deleting evidence, blaming someone else)
Information Disclosure
Denial of Service
Escalation of Privilege
What is architecture diagramming for? Lets you see, at a high level, how data flows between users, servers,
and applications. Useful for mapping out how you want to protect that
data.
Then identify attacks that could happen to each target (all kinds,
physical/social/technical/etc).
Input Points
What is the DREAD system? Used in threat modeling to help you decide on a level of risk.
Damage potential
Reproducibility (can the attackers do it over and over)
Exploitability (how hard is it to perform the attack)
Affected users
Discoverability (how hard is it to discover the weakness)