ISC2 CC Final Notes With Cheat Sheet
ISC2 CC Final Notes With Cheat Sheet
CIA Triad:
- Confidentiality: Prevent unauthorized access (Ex: Using encryption on emails)
- Integrity: Ensure data is accurate and untampered (Ex: File hash checksums)
- Availability: Systems accessible when needed (Ex: Backups, redundant servers)
Key Principles:
- Least Privilege: Users get only what they need (Ex: HR can’t access firewall logs)
- Separation of Duties: Split responsibilities (Ex: One person creates users, another
approves them)
- Need to Know: Limits access based on relevance (Ex: Marketing can’t access payroll data)
Roles:
- Data Owner: Defines classification (e.g., Confidential)
- Custodian: Maintains data (e.g., backup admin)
- User: Uses data responsibly
Control Types:
- Administrative: Policies, training
- Technical: Firewalls, encryption
- Physical: Locks, guards, cameras
Risk:
- Risk = Threat × Vulnerability × Impact
- Example: Unpatched server + ransomware = High Risk
- Frameworks: NIST CSF, ISO 27001
BCP vs DRP:
- BCP: Keeps business running (Ex: Remote work setup during disaster)
- DRP: Restores IT systems (Ex: Recovering data from backup)
BIA:
- Identifies critical functions
- RTO: Recovery Time Objective – how soon to resume operations
- RPO: Recovery Point Objective – acceptable data loss
Testing:
- Tabletop: Discussion-based simulation
- Full-scale: Real simulated incident response
IAAA:
- Identification: Claiming identity
- Authentication: Verifying identity (passwords, biometrics)
- Authorization: Granting permissions
- Accounting: Logging actions
Access Models:
- DAC: Owner grants permissions (Ex: File sharing)
- MAC: Based on sensitivity labels (Ex: Classified documents)
- RBAC: Based on role (Ex: HR = payroll only)
- ABAC: Based on attributes (Ex: Time, location)
MFA:
- At least 2 of: Something you know (password), have (token), are (biometric)
OSI Layers:
1. Application – Email, browser
2. Presentation – Encoding, encryption
3. Session – Maintains communication
4. Transport – TCP/UDP
5. Network – IP, routing
6. Data Link – MAC addresses
7. Physical – Cables, hardware
Protocols:
- SSH, SFTP, HTTPS, IPSec
Common Attacks:
- DDoS – Disrupt availability
- MITM – Intercept communication
- ARP Spoofing – Fakes MAC identity
- Phishing – Tricks users
Network Devices:
- Firewall – Filters traffic
- IDS/IPS – Detects/prevents threats
- VPN – Secure access
- Proxy – Intermediary for requests
Patch Management:
- Closes known vulnerabilities
Backup Types:
- Full: Everything
- Incremental: Since last backup
- Differential: Since last full
Secure Disposal:
- Wipe, degauss, shred
Awareness Training:
- Prevents phishing, teaches best practices
Physical Security:
- Locks, cameras, biometric access
🧠 ISC2 CC Confidence Cheat Sheet – No More A/B Doubts
1. If two answers sound similar: Choose the one focused on control or risk reduction.
Example: Separation of Duties → A (reduce risk), not B (increase efficiency).
3. One answer is usually more complete than the other. Pick based on goal alignment.
7. “Most appropriate” = the one that solves the issue in the best way for a secure
environment.
8. Reverse the question if stuck: “What would be the worst option here?”
Remember: You already know this — trust your instincts, eliminate fluff, and go with the
security-first logic.