0% found this document useful (0 votes)
235 views4 pages

ISC2 CC Final Notes With Cheat Sheet

The document provides a comprehensive overview of key concepts in cybersecurity, including the CIA Triad, business continuity planning, access control models, network security protocols, and security operations. It also includes a confidence cheat sheet with strategies for answering exam questions effectively. The notes emphasize the importance of risk management, incident response, and security awareness training.

Uploaded by

discord.luke472
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
235 views4 pages

ISC2 CC Final Notes With Cheat Sheet

The document provides a comprehensive overview of key concepts in cybersecurity, including the CIA Triad, business continuity planning, access control models, network security protocols, and security operations. It also includes a confidence cheat sheet with strategies for answering exam questions effectively. The notes emphasize the importance of risk management, incident response, and security awareness training.

Uploaded by

discord.luke472
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

ISC2 CC Final Revision Notes +

Confidence Cheat Sheet


🧠 ISC2 CC Final Revision Notes (with Examples)

Domain 1: Security Principles

CIA Triad:
- Confidentiality: Prevent unauthorized access (Ex: Using encryption on emails)
- Integrity: Ensure data is accurate and untampered (Ex: File hash checksums)
- Availability: Systems accessible when needed (Ex: Backups, redundant servers)

Key Principles:
- Least Privilege: Users get only what they need (Ex: HR can’t access firewall logs)
- Separation of Duties: Split responsibilities (Ex: One person creates users, another
approves them)
- Need to Know: Limits access based on relevance (Ex: Marketing can’t access payroll data)

Roles:
- Data Owner: Defines classification (e.g., Confidential)
- Custodian: Maintains data (e.g., backup admin)
- User: Uses data responsibly

Control Types:
- Administrative: Policies, training
- Technical: Firewalls, encryption
- Physical: Locks, guards, cameras

Risk:
- Risk = Threat × Vulnerability × Impact
- Example: Unpatched server + ransomware = High Risk
- Frameworks: NIST CSF, ISO 27001

Domain 2: Business Continuity, DR, and Incident Response

BCP vs DRP:
- BCP: Keeps business running (Ex: Remote work setup during disaster)
- DRP: Restores IT systems (Ex: Recovering data from backup)
BIA:
- Identifies critical functions
- RTO: Recovery Time Objective – how soon to resume operations
- RPO: Recovery Point Objective – acceptable data loss

Incident Response Lifecycle:


1. Preparation – Plans and teams ready
2. Detection – Spotting the issue
3. Containment – Isolate the threat
4. Eradication – Remove the cause
5. Recovery – Restore operations
6. Lessons Learned – Improve

Testing:
- Tabletop: Discussion-based simulation
- Full-scale: Real simulated incident response

Domain 3: Access Control Concepts

IAAA:
- Identification: Claiming identity
- Authentication: Verifying identity (passwords, biometrics)
- Authorization: Granting permissions
- Accounting: Logging actions

Access Models:
- DAC: Owner grants permissions (Ex: File sharing)
- MAC: Based on sensitivity labels (Ex: Classified documents)
- RBAC: Based on role (Ex: HR = payroll only)
- ABAC: Based on attributes (Ex: Time, location)

MFA:
- At least 2 of: Something you know (password), have (token), are (biometric)

Domain 4: Network Security

OSI Layers:
1. Application – Email, browser
2. Presentation – Encoding, encryption
3. Session – Maintains communication
4. Transport – TCP/UDP
5. Network – IP, routing
6. Data Link – MAC addresses
7. Physical – Cables, hardware

Protocols:
- SSH, SFTP, HTTPS, IPSec

Common Attacks:
- DDoS – Disrupt availability
- MITM – Intercept communication
- ARP Spoofing – Fakes MAC identity
- Phishing – Tricks users

Network Devices:
- Firewall – Filters traffic
- IDS/IPS – Detects/prevents threats
- VPN – Secure access
- Proxy – Intermediary for requests

Domain 5: Security Operations

SIEM (e.g., Splunk):


- Correlates logs, alerts on anomalies

Patch Management:
- Closes known vulnerabilities

Backup Types:
- Full: Everything
- Incremental: Since last backup
- Differential: Since last full

Secure Disposal:
- Wipe, degauss, shred

Awareness Training:
- Prevents phishing, teaches best practices

Physical Security:
- Locks, cameras, biometric access
🧠 ISC2 CC Confidence Cheat Sheet – No More A/B Doubts

1. If two answers sound similar: Choose the one focused on control or risk reduction.
Example: Separation of Duties → A (reduce risk), not B (increase efficiency).

2. Trust ISC2 logic over real-world exceptions.


Awareness training → Helps reduce human error, not teaching programming.

3. One answer is usually more complete than the other. Pick based on goal alignment.

4. Be cautious of vague or overly permissive answers.


Avoid choices that say “all access,” “no controls,” “all users.”

5. Eliminate wrong answers fast with these red flags:


- "All users have access" → Violates least privilege
- "Improves efficiency" → Not a core security goal
- "No need to classify data" → Breaks data governance principles

6. Focus on what’s being asked – match keywords to correct category:


- Risk → Mitigate, reduce
- Access → Role, policy, control
- Network → Filter, encrypt, segment
- Ops → Monitor, log, patch

7. “Most appropriate” = the one that solves the issue in the best way for a secure
environment.

8. Reverse the question if stuck: “What would be the worst option here?”

Remember: You already know this — trust your instincts, eliminate fluff, and go with the
security-first logic.

You might also like