You are on page 1of 572

CISSP

Administrative Controls

CISSP Training Seminar – March 2015


Procedures implemented to define the
roles, responsibilities, policies, and
administrative functions needed to
manage the control environment.

Security and Risk Management Domain


CISSP

Annualized Rate of Occurrence (ARO)

CISSP Training Seminar – March 2015


An estimate of how often a threat will be
successful in exploiting a vulnerability
over the period of a year.

Security and Risk Management Domain


CISSP

Arms Export Control Act of 1976

CISSP Training Seminar – March 2015


Authorizes the President to designate
those items that shall be considered as
defense articles and defense services
and control their import and the export.

Security and Risk Management Domain


CISSP

Availability

CISSP Training Seminar – March 2015


The principle that ensures that
information is available and accessible to
users when needed.

Security and Risk Management Domain


CISSP

Breach

CISSP Training Seminar – March 2015


An incident that results in the disclosure
or potential exposure of data.

Security and Risk Management Domain


CISSP

Compensating Controls

CISSP Training Seminar – March 2015


Controls that substitute for the loss of
primary controls and mitigate risk down
to an acceptable level.

Security and Risk Management Domain


CISSP

Compliance

CISSP Training Seminar – March 2015


Actions that ensure behavior that
complies with established rules.

Security and Risk Management Domain


CISSP

Confidentiality

CISSP Training Seminar – March 2015


Supports the principle of “least privilege”
by providing that only authorized
individuals, processes, or systems should
have access to information on a need-to-
know basis.

Security and Risk Management Domain


CISSP

Copyright

CISSP Training Seminar – March 2015


Covers the expression of ideas rather
than the ideas themselves; it usually
protects artistic property such as writing,
recordings, databases, and computer
programs.

Security and Risk Management Domain


CISSP

Corrective: Controls

CISSP Training Seminar – March 2015


Controls implemented to remedy
circumstance, mitigate damage, or
restore controls.

Security and Risk Management Domain


CISSP

Data Disclosure

CISSP Training Seminar – March 2015


A breach for which it was confirmed that
data was actually disclosed (not just
exposed) to an unauthorized party.

Security and Risk Management Domain


CISSP

Detective Controls

CISSP Training Seminar – March 2015


Controls designed to signal a warning
when a security control has been
breached.

Security and Risk Management Domain


CISSP

Deterrent Controls

CISSP Training Seminar – March 2015


Controls designed to discourage people
from violating security directives.

Security and Risk Management Domain


CISSP

Directive Controls

CISSP Training Seminar – March 2015


Controls designed to specify acceptable
rules of behavior within an organization.

Security and Risk Management Domain


CISSP

Due Care

CISSP Training Seminar – March 2015


The care a “reasonable person” would
exercise under given circumstances.

Security and Risk Management Domain


CISSP

Due Diligence

CISSP Training Seminar – March 2015


Is similar to due care with the exception
that it is a pre-emptive measure made to
avoid harm to other persons or their
property.

Security and Risk Management Domain


CISSP

Enterprise Risk Management

CISSP Training Seminar – March 2015


A process designed to identify potential
events that may affect the entity,
manage risk so it is within its risk
appetite, and provide reasonable
assurance regarding the achievement of
entity objectives.

Security and Risk Management Domain


CISSP

Export Administration Act of 1979

CISSP Training Seminar – March 2015


Authorized the President to regulate
exports of civilian goods and
technologies that have military
applications.

Security and Risk Management Domain


CISSP

Governance

CISSP Training Seminar – March 2015


Ensures the business focuses on core
activities, clarifies who in the
organization has the authority to make
decisions, determines accountability for
actions and responsibility for outcomes,
and addresses how expected
performance will be evaluated.

Security and Risk Management Domain


CISSP

Incident

CISSP Training Seminar – March 2015


A security event that compromises the
confidentiality, integrity, or availability of
an information asset.

Security and Risk Management Domain


CISSP

Integrity

CISSP Training Seminar – March 2015


Comes in two forms; making sure that
information is processed correctly and
not modified by unauthorized persons,
and protecting information as it transits
a network.

Security and Risk Management Domain


CISSP

Information Security Officer

CISSP Training Seminar – March 2015


Accountable for ensuring the protection
of all of the business information assets
from intentional and unintentional loss,
disclosure, alteration, destruction, and
unavailability.

Security and Risk Management Domain


CISSP

Least Privilege

CISSP Training Seminar – March 2015


Granting users only the accesses that are
required to perform their job functions.

Security and Risk Management Domain


CISSP

Logical (Technical) Controls

CISSP Training Seminar – March 2015


Electronic hardware and software
solutions implemented to control access
to information and information
networks.

Security and Risk Management Domain


CISSP

Patent

CISSP Training Seminar – March 2015


Protects novel, useful, and nonobvious
inventions.

Security and Risk Management Domain


CISSP

Physical Controls

CISSP Training Seminar – March 2015


Controls to protect the organization’s
people and physical environment, such
as locks, fire management, gates, and
guards; physical controls may be called
“operational controls” in some contexts.

Security and Risk Management Domain


CISSP

Preventive Controls

CISSP Training Seminar – March 2015


Controls implemented to prevent a
security incident or information breach.

Security and Risk Management Domain


CISSP

Recovery Controls

CISSP Training Seminar – March 2015


Controls implemented to restore
conditions to normal after a security
incident.

Security and Risk Management Domain


CISSP

Recovery Time Objective (RTO)

CISSP Training Seminar – March 2015


How quickly you need to have that
application’s information available after
downtime has occurred.

Security and Risk Management Domain


CISSP

Recovery Point Objective (RPO)

CISSP Training Seminar – March 2015


The point in time to which data must be
restored in order to successfully resume
processing.

Security and Risk Management Domain


CISSP

Risk

CISSP Training Seminar – March 2015


1. A combination of the probability of an
event and its consequence (ISO 27000)

2. An expectation of loss expressed as


the probability that a particular threat
will exploit a particular vulnerability with
a particular harmful result.(RFC 2828)

Security and Risk Management Domain


CISSP

Risk Acceptance

CISSP Training Seminar – March 2015


The practice of accepting certain risk(s),
typically based on a business decision
that may also weigh the cost versus the
benefit of dealing with the risk in
another way.

Security and Risk Management Domain


CISSP

Risk Avoidance

CISSP Training Seminar – March 2015


The practice of coming up with
alternatives so that the risk in question is
not realized.

Security and Risk Management Domain


CISSP

Risk Mitigation

CISSP Training Seminar – March 2015


The practice of the elimination of or the
significant decrease in the level of risk
presented.

Security and Risk Management Domain


CISSP

Risk Transfer

CISSP Training Seminar – March 2015


The practice of passing on the risk in
question to another entity, such as an
insurance company.

Security and Risk Management Domain


CISSP

Risk Management

CISSP Training Seminar – March 2015


A systematic process for identifying,
analyzing, evaluating, remedying, and
monitoring risk.

Security and Risk Management Domain


CISSP

Single Loss Expectancy (SLE)

CISSP Training Seminar – March 2015


Defined as the difference between the
original value and the remaining value of
an asset after a single exploit.

Security and Risk Management Domain


CISSP

Single Points of Failure (SPOF)

CISSP Training Seminar – March 2015


Any single input to a process that, if
missing, would cause the process or
several processes to be unable to
function.

Security and Risk Management Domain


CISSP

Trademark

CISSP Training Seminar – March 2015


Any word, name, symbol, color, sound,
product shape, device, or combination of
these that is used to identify goods and
distinguish them from those made or
sold by others.

Security and Risk Management Domain


CISSP

Trade Secret

CISSP Training Seminar – March 2015


Proprietary business or technical
information, processes, designs,
practices, etc., that are confidential and
critical to the business.

Security and Risk Management Domain


CISSP

Vulnerability Assessment

CISSP Training Seminar – March 2015


Determines the potential impact of
disruptive events on the organization’s
business processes.

Security and Risk Management Domain


CISSP

Wassenaar Arrangement

CISSP Training Seminar – March 2015


Established to contribute to regional and
international security and stability by
promoting transparency and greater
responsibility in transfers of
conventional arms and dual-use goods
and technologies, thus preventing
destabilizing accumulations.

Security and Risk Management Domain


CISSP

Categorization

CISSP Training Seminar – March 2015


The process of determining the impact of
the loss of confidentiality, integrity, or
availability of the information to an
organization.

Asset Security Domain


CISSP

Clearing

CISSP Training Seminar – March 2015


The removal of sensitive data from
storage devices in such a way that there
is assurance that the data may not be
reconstructed using normal system
functions or software file/data recovery
utilities.

Asset Security Domain


CISSP

Curie Temperature

CISSP Training Seminar – March 2015


The critical point where a material’s
intrinsic magnetic alignment changes
direction.

Asset Security Domain


CISSP

Data Classification

CISSP Training Seminar – March 2015


Entails analyzing the data that the
organization retains, determining its
importance and value, and then
assigning it to a category.

Asset Security Domain


CISSP

Data Custodians

CISSP Training Seminar – March 2015


Ensure important datasets are
developed, maintained, and accessible
within their defined specifications.

Asset Security Domain


CISSP

Data Modeling

CISSP Training Seminar – March 2015


The methodology that identifies the path
to meet user requirements.

Asset Security Domain


CISSP

Data Remanence

CISSP Training Seminar – March 2015


The residual physical representation of
data that has been in some way erased.

Asset Security Domain


CISSP

Data Standards

CISSP Training Seminar – March 2015


Objects, features, or items that are
collected, automated, or affected by
activities or the functions of
organizations.

Asset Security Domain


CISSP

Federal Information Processing


Standards (FIPS)

CISSP Training Seminar – March 2015


The official series of publications relating
to standards and guidelines adopted.

Asset Security Domain


CISSP

File Encryption Software

CISSP Training Seminar – March 2015


Allows greater flexibility in applying
encryption to specific file(s).

Asset Security Domain


CISSP

Framework Core

CISSP Training Seminar – March 2015


A set of cybersecurity activities, desired
outcomes, and applicable references
that are common across critical
infrastructure sectors.

Asset Security Domain


CISSP

Framework Implementation Tiers

CISSP Training Seminar – March 2015


Provide context on how an organization
views cybersecurity risk and the
processes in place to manage that risk.

Asset Security Domain


CISSP

Framework Profile

CISSP Training Seminar – March 2015


Represents the outcomes based on
business needs that an organization has
selected from the Framework Categories
and Subcategories.

Asset Security Domain


CISSP

IT Asset Management (ITAM)

CISSP Training Seminar – March 2015


ITAM is a much broader discipline,
adding several dimensions of
management and involving a much
broader base of stakeholders.

Asset Security Domain


CISSP

Media Encryption Software

CISSP Training Seminar – March 2015


Software that is used to encrypt
otherwise unprotected storage media
such as CDs, DVDs, USB drives, or laptop
hard drives.

Asset Security Domain


CISSP

The National Checklist Program (NCP)

CISSP Training Seminar – March 2015


The U.S. Government repository of
publicly available security checklists (or
benchmarks) that provide detailed low-
level guidance on setting the security
configuration of operating systems and
applications.

Asset Security Domain


CISSP

NIST Computer Security Division (CSD)

CISSP Training Seminar – March 2015


Focuses on providing measurements and
standards to protect information
systems against threats to the
confidentiality of information, integrity
of information and processes, and
availability of information and services in
order to build trust and confiden

Asset Security Domain


CISSP

Purging

CISSP Training Seminar – March 2015


The removal of sensitive data from a
system or storage device with the intent
that the data cannot be reconstructed by
any known technique.

Asset Security Domain


CISSP

Quality Assurance (QA)

CISSP Training Seminar – March 2015


An assessment of quality based on
standards external to the process and
involves reviewing of the activities and
quality control processes to ensure final
products meet predetermined standards
of quality.

Asset Security Domain


CISSP

Quality Control (QC)

CISSP Training Seminar – March 2015


An assessment of quality based on
internal standards, processes, and
procedures established to control and
monitor quality.

Asset Security Domain


CISSP

Self-Encrypting USB Drives

CISSP Training Seminar – March 2015


Portable USB drives that embed
encryption algorithms within the hard
drive, thus eliminating the need to install
any encryption software.

Asset Security Domain


CISSP

Abstraction

CISSP Training Seminar – March 2015


Involves the removal of characteristics
from an entity in order to easily
represent its essential properties.

Security Engineering Domain


CISSP

Access Control Matrix

CISSP Training Seminar – March 2015


A two-dimensional table that allows for
individual subjects and objects to be
related to each other.

Security Engineering Domain


CISSP

Asymmetric Algorithms

CISSP Training Seminar – March 2015


One-way functions, that is, a process
that is much simpler to go in one
direction (forward) than to go in the
other direction (backward or reverse
engineering).

Security Engineering Domain


CISSP

Address Space Layout Randomization


(ASLR)

CISSP Training Seminar – March 2015


Involves randomly arranging the
positions of key data areas of a program,
including the base of the executable and
the positions of the stack, heap, and
libraries in a process’s memory address
space.

Security Engineering Domain


CISSP

Aggregation

CISSP Training Seminar – March 2015


Combining non-sensitive data from
separate sources to create sensitive
information.

Security Engineering Domain


CISSP

Algorithm

CISSP Training Seminar – March 2015


A mathematical function that is used in
the encryption and decryption
processes.

Security Engineering Domain


CISSP

Bell–La Padula Model

CISSP Training Seminar – March 2015


Explores the rules that would have to be
in place if a subject is granted a certain
level of clearance and a particular mode
of access.

Security Engineering Domain


CISSP

Brewer-Nash (The Chinese Wall) Model

CISSP Training Seminar – March 2015


This model focuses on preventing
conflict of interest when a given subject
has access to objects with sensitive
information associated with two
competing parties.

Security Engineering Domain


CISSP

Cable Plant Management

CISSP Training Seminar – March 2015


The design, documentation, and
management of the lowest layer of the
OSI network model – the physical layer.

Security Engineering Domain


CISSP

Certificate Authority (CA)

CISSP Training Seminar – March 2015


An entity trusted by one or more users
as an authority in a network that issues,
revokes, and manages digital certificates.

Security Engineering Domain


CISSP

Ciphertext or Cryptogram

CISSP Training Seminar – March 2015


The altered form of a plaintext message,
so as to be unreadable for anyone
except the intended recipients.

Security Engineering Domain


CISSP

Cloud Computing

CISSP Training Seminar – March 2015


A model for enabling ubiquitous,
convenient, on-demand network access
to a shared pool of configurable
computing resources (e.g., networks,
servers, storage, applications, and
services) that can be rapidly provisioned
and released with minimal management

Security Engineering Domain


CISSP

Common Criteria

CISSP Training Seminar – March 2015


Provides a structured methodology for
documenting security requirements,
documenting and validating security
capabilities, and promoting international
cooperation in the area of IT security.

Security Engineering Domain


CISSP

Community Cloud Infrastructure

CISSP Training Seminar – March 2015


Provisioned for exclusive use by a
specific community of consumers from
organizations that have shared concerns.

Security Engineering Domain


CISSP

Confusion

CISSP Training Seminar – March 2015


Provided by mixing (changing) the key
values used during the repeated rounds
of encryption. When the key is modified
for each round, it provides added
complexity that the attacker would
encounter.

Security Engineering Domain


CISSP

Control Objects for Information and


Related Technology (COBIT)

CISSP Training Seminar – March 2015


Provides a set of generally accepted
processes to assist in maximizing the
benefits derived using information
technology (IT) and developing
appropriate IT governance.

Security Engineering Domain


CISSP

Covert Channels

CISSP Training Seminar – March 2015


Communications mechanisms hidden
from the access control and standard
monitoring systems of an information
system.

Security Engineering Domain


CISSP

Cryptanalysis

CISSP Training Seminar – March 2015


The study of techniques for attempting
to defeat cryptographic techniques and,
more generally, information security
services.

Security Engineering Domain


CISSP

Cryptology

CISSP Training Seminar – March 2015


The science that deals with hidden,
disguised, or encrypted communications.
It embraces communications security
and communications intelligence.

Security Engineering Domain


CISSP

Cyber-Physical Systems (CPS)

CISSP Training Seminar – March 2015


Smart networked systems with
embedded sensors, processors, and
actuators that are designed to sense and
interact with the physical world and
support real-time, guaranteed
performance in safety-critical
applications.

Security Engineering Domain


CISSP

Data Hiding

CISSP Training Seminar – March 2015


Maintains activities at different security
levels to separate these levels from each
other.

Security Engineering Domain


CISSP

Data Warehouse

CISSP Training Seminar – March 2015


A repository for information collected
from a variety of data sources.

Security Engineering Domain


CISSP

Decoding

CISSP Training Seminar – March 2015


The reverse process from encoding –
converting the encoded message back
into its plaintext format.

Security Engineering Domain


CISSP

Diffusion

CISSP Training Seminar – March 2015


Provided by mixing up the location of the
plaintext throughout the ciphertext.

Security Engineering Domain


CISSP

Digital Certificate

CISSP Training Seminar – March 2015


An electronic document that contains
the name of an organization or
individual, the business address, the
digital signature of the certificate
authority issuing the certificate, the
certificate holder’s public key, a serial
number, and the expiration date

Security Engineering Domain


CISSP

Digital Rights Management (DRM)

CISSP Training Seminar – March 2015


A broad range of technologies that grant
control and protection to content
providers over their own digital media.

Security Engineering Domain


CISSP

Digital Signatures

CISSP Training Seminar – March 2015


Provide authentication of a sender and
integrity of a sender’s message.

Security Engineering Domain


CISSP

Enterprise Security Architecture (ESA)

CISSP Training Seminar – March 2015


Focused on setting the long-term
strategy for security services in the
enterprise.

Security Engineering Domain


CISSP

Firmware

CISSP Training Seminar – March 2015


The storage of programs or instructions
in ROM.

Security Engineering Domain


CISSP

“Generally Accepted Principles and


Practices for Securing Information
Technology Systems” (NIST SP 800-14)

CISSP Training Seminar – March 2015


Provides a foundation upon which
organizations can establish and review
information technology security
programs.

Security Engineering Domain


CISSP

Graham-Denning

CISSP Training Seminar – March 2015


Primarily concerned with how subjects
and objects are created, how subjects
are assigned rights or privileges, and
how ownership of objects is managed.

Security Engineering Domain


CISSP

Inference

CISSP Training Seminar – March 2015


The ability to deduce (infer) sensitive or
restricted information from observing
available information.

Security Engineering Domain


CISSP

ISO/IEC 21827:2008, The Systems


Security Engineering – Capability
Maturity Model (SSE-CMM)

CISSP Training Seminar – March 2015


Describes the essential characteristics of
an organization’s security engineering
process that must exist to ensure good
security engineering.

Security Engineering Domain


CISSP

Hash Function

CISSP Training Seminar – March 2015


Accepts an input message of any length
and generates, through a one-way
operation, a fixed-length output.

Security Engineering Domain


CISSP

Industrial Control Systems (ICS)

CISSP Training Seminar – March 2015


Used to control industrial processes such
as manufacturing, product handling,
production, and distribution.

Security Engineering Domain


CISSP

IT Infrastructure Library (ITIL)

CISSP Training Seminar – March 2015


Defines the organizational structure and
skill requirements of an IT organization
as well as the set of operational
procedures and practices that direct IT
operations and infrastructure, including
information security operations.

Security Engineering Domain


CISSP

Embedded Systems

CISSP Training Seminar – March 2015


Used to provide computing services in a
small form factor with limited processing
power.

Security Engineering Domain


CISSP

Encoding

CISSP Training Seminar – March 2015


The action of changing a message into
another format through the use of a
code.

Security Engineering Domain


CISSP

Hybrid Cloud Infrastructure

CISSP Training Seminar – March 2015


A composition of two or more distinct
cloud infrastructures (private,
community, or public) that remain
unique entities but are bound together
by standardized or proprietary
technology that enables data and
application portability.

Security Engineering Domain


CISSP

Initialization Vector (IV)

CISSP Training Seminar – March 2015


A non-secret binary vector used as the
initializing input algorithm for the
encryption of a plaintext block sequence
to increase security by introducing
additional cryptographic variance and to
synchronize cryptographic equipment.

Security Engineering Domain


CISSP

Key Clustering

CISSP Training Seminar – March 2015


When different encryption keys generate
the same ciphertext from the same
plaintext message.

Security Engineering Domain


CISSP

Key Length

CISSP Training Seminar – March 2015


The size of a key, usually measured in
bits or bytes, which a cryptographic
algorithm used in ciphering or
deciphering protected information.

Security Engineering Domain


CISSP

Key Space

CISSP Training Seminar – March 2015


This represents the total number of
possible values of keys in a cryptographic
algorithm or other security measure,
such as a password.

Security Engineering Domain


CISSP

Message Authentication Code (MAC)

CISSP Training Seminar – March 2015


A small block of data that is generated
using a secret key and then appended to
the message.

Security Engineering Domain


CISSP

Message Digest

CISSP Training Seminar – March 2015


A small representation of a larger
message. Message digests are used to
ensure the authentication and integrity
of information, not the confidentiality.

Security Engineering Domain


CISSP

Middleware

CISSP Training Seminar – March 2015


A connectivity software that enables
multiple processes running on one or
more machines to interact.

Security Engineering Domain


CISSP

Multilevel Lattice Models

CISSP Training Seminar – March 2015


A security model describes strict layers
of subjects and objects and defines clear
rules that allow or disallow interactions
between them based on the layers they
are in.

Security Engineering Domain


CISSP

Non-repudiation

CISSP Training Seminar – March 2015


A service that ensures the sender cannot
deny a message was sent and the
integrity of the message is intact.

Security Engineering Domain


CISSP

OpenID Connect

CISSP Training Seminar – March 2015


An interoperable authentication protocol
based on the OAuth 2.0 family of
specifications.

Security Engineering Domain


CISSP

OWASP

CISSP Training Seminar – March 2015


A nonprofit organization focused on
improving the security of software.

Security Engineering Domain


CISSP

Paging

CISSP Training Seminar – March 2015


Divides the memory address space into
equal-sized blocks called pages.

Security Engineering Domain


CISSP

Payment Card Industry Data Security


Standard (PCI-DSS)

CISSP Training Seminar – March 2015


Provides the security architect with a
framework of specifications to ensure
the safe processing, storing, and
transmission of cardholder information.

Security Engineering Domain


CISSP

Plaintext

CISSP Training Seminar – March 2015


The message in its natural format.

Security Engineering Domain


CISSP

Primary Storage

CISSP Training Seminar – March 2015


Stores data that has a high probability of
being requested by the CPU.

Security Engineering Domain


CISSP

Private Cloud

CISSP Training Seminar – March 2015


In this model, the cloud infrastructure is
provisioned for exclusive use by a single
organization comprising multiple
consumers.

Security Engineering Domain


CISSP

Protection Keying

CISSP Training Seminar – March 2015


Divides physical memory up into blocks
of a particular size, each of which has an
associated numerical value called a
protection key.

Security Engineering Domain


CISSP

Public Cloud Infrastructure

CISSP Training Seminar – March 2015


Provisioned for open use by the general
public. It may be owned, managed, and
operated by a business, academic, or
government organization, or some
combination of them. It exists on the
premises of the cloud provider.

Security Engineering Domain


CISSP

Registration Authority (RA)

CISSP Training Seminar – March 2015


This performs certificate registration
services on behalf of a CA.

Security Engineering Domain


CISSP

Secondary Storage

CISSP Training Seminar – March 2015


Holds data not currently being used by
the CPU and is used when data must be
stored for an extended period of time
using high-capacity, nonvolatile storage.

Security Engineering Domain


CISSP

Security Assertion Markup Language


(SAML)

CISSP Training Seminar – March 2015


An XML-based standard used to
exchange authentication and
authorization information.

Security Engineering Domain


CISSP

Security Zone of Control

CISSP Training Seminar – March 2015


An area or grouping within which a
defined set of security policies and
measures are applied to achieve a
specific level of security.

Security Engineering Domain


CISSP

Segmentation

CISSP Training Seminar – March 2015


Dividing a computer’s memory into
segments.

Security Engineering Domain


CISSP

Sherwood Applied Business Security


Architecture (SABSA) Framework

CISSP Training Seminar – March 2015


Holistic life cycle for developing security
architecture that begins with assessing
business requirements and subsequently
creating a “chain of traceability” through
the phases of strategy, concept, design,
implementation, and metrics.

Security Engineering Domain


CISSP

State Attacks

CISSP Training Seminar – March 2015


Attempt to take advantage of how a
system handles multiple requests.

Security Engineering Domain


CISSP

State Machine Model

CISSP Training Seminar – March 2015


Describes the behavior of a system as it
moves between one state and another,
from one moment to another.

Security Engineering Domain


CISSP

Stream-based Ciphers

CISSP Training Seminar – March 2015


When a cryptosystem performs its
encryption on a bit-by-bit basis.

Security Engineering Domain


CISSP

Symmetric Algorithms

CISSP Training Seminar – March 2015


Operate with a single cryptographic key
that is used for both encryption and
decryption of the message.

Security Engineering Domain


CISSP

Substitution

CISSP Training Seminar – March 2015


The process of exchanging one letter or
byte for another.

Security Engineering Domain


CISSP

System Kernel

CISSP Training Seminar – March 2015


The core of an OS, and one of its main
functions is to provide access to system
resources, which includes the system’s
hardware and processes.

Security Engineering Domain


CISSP

The Open Group Architecture


Framework (TOGAF)

CISSP Training Seminar – March 2015


An architecture content framework
(ACF) to describe standard building
blocks and components as well as
numerous reference models.

Security Engineering Domain


CISSP

Transposition

CISSP Training Seminar – March 2015


The process of reordering the plaintext
to hide the message.

Security Engineering Domain


CISSP

Work Factor

CISSP Training Seminar – March 2015


This represents the time and effort
required to break a protective measure.

Security Engineering Domain


CISSP

Zachman Framework

CISSP Training Seminar – March 2015


A logical structure for identifying and
organizing the descriptive
representations (models) that are
important in the management of
enterprises and to the development of
the systems, both automated and
manual, that comprise them.

Security Engineering Domain


CISSP

Bastion hosts

CISSP Training Seminar – March 2015


Serve as a gateway between a trusted
and untrusted network that gives
limited, authorized access to untrusted
hosts.

Communications and Network Security


Domain
CISSP

Bridges

CISSP Training Seminar – March 2015


Layer 2 devices that filter traffic between
segments based on Media Access
Control (MAC) addresses.

Communications and Network Security


Domain
CISSP

Common application service element


(CASE)

CISSP Training Seminar – March 2015


Sublayer that provides services for the
application layer and request services
from the session layer

Communications and Network Security


Domain
CISSP

Concentrators

CISSP Training Seminar – March 2015


Multiplex connected devices into one
signal to be transmitted on a network

Communications and Network Security


Domain
CISSP

Direct-Sequence Spread Spectrum (DSSS)

CISSP Training Seminar – March 2015


A wireless technology that spreads a
transmission over a much larger
frequency band, and with corresponding
smaller amplitude

Communications and Network Security


Domain
CISSP

Decryption

CISSP Training Seminar – March 2015


The process of transforming encrypted
data back into its original form, so it can
be understood.

Communications and Network Security


Domain
CISSP

Fibre Channel over Ethernet (FCoE)

CISSP Training Seminar – March 2015


A lightweight encapsulation protocol and
lacks the reliable data transport of the
TCP layer

Communications and Network Security


Domain
CISSP

File Transfer Protocol (FTP)

CISSP Training Seminar – March 2015


A stateful protocol that requires two
communication channels

Communications and Network Security


Domain
CISSP

Firewalls

CISSP Training Seminar – March 2015


Devices that enforce administrative
security policies by filtering incoming
traffic based on a set of rules

Communications and Network Security


Domain
CISSP

Frequency-Hopping Spread Spectrum


(FHSS)

CISSP Training Seminar – March 2015


This wireless technology spreads its
signal over rapidly changing frequencies

Communications and Network Security


Domain
CISSP

Internet Control Message Protocol


(ICMP)

CISSP Training Seminar – March 2015


Provides a means to send error
messages for non-transient error
conditions and provides a way to probe
the network in order to determine
general characteristics about the
network.

Communications and Network Security


Domain
CISSP

Layer 1

CISSP Training Seminar – March 2015


Physical Layer

Communications and Network Security


Domain
CISSP

Layer 2

CISSP Training Seminar – March 2015


Data-Link Layer

Communications and Network Security


Domain
CISSP

Layer 3

CISSP Training Seminar – March 2015


Network Layer

Communications and Network Security


Domain
CISSP

Layer 4

CISSP Training Seminar – March 2015


Transport Layer

Communications and Network Security


Domain
CISSP

Layer 5

CISSP Training Seminar – March 2015


Session Layer

Communications and Network Security


Domain
CISSP

Layer 6

CISSP Training Seminar – March 2015


Presentation Layer

Communications and Network Security


Domain
CISSP

Layer 7

CISSP Training Seminar – March 2015


Application Layer

Communications and Network Security


Domain
CISSP

Lightweight Directory Access Protocol


(LDAP)

CISSP Training Seminar – March 2015


A client/server-based directory query
protocol loosely based upon X.500,
commonly used for managing user
information

Communications and Network Security


Domain
CISSP

Modems

CISSP Training Seminar – March 2015


Allow users remote access to a network
via analog phone lines

Communications and Network Security


Domain
CISSP

OSI reference model

CISSP Training Seminar – March 2015


Layering model structured into seven
layers (physical layer, data-link layer,
network layer, transport layer, session
layer, presentation layer, application
layer)

Communications and Network Security


Domain
CISSP

Ping scanning

CISSP Training Seminar – March 2015


A basic network mapping technique that
helps narrow the scope of an attack

Communications and Network Security


Domain
CISSP

Public-key encryption

CISSP Training Seminar – March 2015


Involves a pair of keys-a public key and a
private key-associated with an entity
that needs to authenticate its identity
electronically or to sign or encrypt data

Communications and Network Security


Domain
CISSP

Remote Authentication Dial-in User


Service (RADIUS)

CISSP Training Seminar – March 2015


An authentication protocol used mainly
in networked environments, such as
ISPs, or for similar services requiring
single sign-on for layer 3 network access,
for scalable authentication combined
with an acceptable degree of security.

Communications and Network Security


Domain
CISSP

Remote Procedure Calls (RPC)

CISSP Training Seminar – March 2015


Represent the ability to allow for the
executing of objects across hosts

Communications and Network Security


Domain
CISSP

Screen Scraper

CISSP Training Seminar – March 2015


A program which can extract data from
output on a display intended for a
human

Communications and Network Security


Domain
CISSP

Security perimeter

CISSP Training Seminar – March 2015


The first line of protection between
trusted and untrusted networks

Communications and Network Security


Domain
CISSP

Specific application service element


(SASE)

CISSP Training Seminar – March 2015


Sublayer that provides application
specific services (protocols)

Communications and Network Security


Domain
CISSP

Spread spectrum

CISSP Training Seminar – March 2015


A method commonly used to modulate
information into manageable bits that
are sent over the air wirelessly

Communications and Network Security


Domain
CISSP

TCP/IP or Department of Defense (DoD)


model

CISSP Training Seminar – March 2015


Layering model structured into four
layers (link layer, network layer,
transport layer, application layer)

Communications and Network Security


Domain
CISSP

Traceroute

CISSP Training Seminar – March 2015


A diagnostic tool that displays the path a
packet traverses between a source and
destination host

Communications and Network Security


Domain
CISSP

Transmission Control Protocol (TCP)

CISSP Training Seminar – March 2015


Provides connection-oriented data
management and reliable data transfer

Communications and Network Security


Domain
CISSP

User Datagram Protocol (UDP)

CISSP Training Seminar – March 2015


Provides a lightweight service for
connectionless data transfer without
error detection and correction

Communications and Network Security


Domain
CISSP

Virtual Private Network (VPN)

CISSP Training Seminar – March 2015


An encrypted tunnel between two hosts
that allows them to securely
communicate over an untrusted network

Communications and Network Security


Domain
CISSP

Voice over Internet Protocol (VoIP)

CISSP Training Seminar – March 2015


A technology that allows you to make
voice calls using a broadband Internet
connection instead of a regular (or
analog) phone line

Communications and Network Security


Domain
CISSP

Wireless local area network (WLAN)

CISSP Training Seminar – March 2015


Links two or more devices over a short
distance using a wireless distribution
method, usually providing a connection
through an access point for Internet
access.

Communications and Network Security


Domain
CISSP

Wireless mesh network

CISSP Training Seminar – March 2015


A wireless network made up of radio
nodes organized in a mesh topology

Communications and Network Security


Domain
CISSP

Wireless metropolitan area networks

CISSP Training Seminar – March 2015


A type of wireless network that connects
several wireless LANs

Communications and Network Security


Domain
CISSP

Wireless personal area networks


(WPANs)

CISSP Training Seminar – March 2015


Interconnect devices within a relatively
small area that is generally within a
person’s reach

Communications and Network Security


Domain
CISSP

Access badges

CISSP Training Seminar – March 2015


Used to enter secured areas of a facility
and are used in conjunction with a badge
reader to read information stored on the
badge

Identity and Access Management


Domain
CISSP

Access Control Systems

CISSP Training Seminar – March 2015


Physical or electronic systems designed
to control who, or what, has access to a
network

Identity and Access Management


Domain
CISSP

Account management systems

CISSP Training Seminar – March 2015


Systems that attempt to streamline the
administration of user identity across
multiple systems

Identity and Access Management


Domain
CISSP

Authentication

CISSP Training Seminar – March 2015


The process of verifying the identity of
the user

Identity and Access Management


Domain
CISSP

Authorization

CISSP Training Seminar – March 2015


The process of defining the specific
resources a user needs and determining
the type of access to those resources the
user may have

Identity and Access Management


Domain
CISSP

Cryptographic Device

CISSP Training Seminar – March 2015


A hardware device that contains non-
programmable logic and non-volatile
storage dedicated to all cryptographic
operations and protection of private
keys.

Identity and Access Management


Domain
CISSP

Electronic authentication (e-


authentication)

CISSP Training Seminar – March 2015


The process of establishing confidence in
user identities electronically presented
to an information system

Identity and Access Management


Domain
CISSP

Facility access control

CISSP Training Seminar – March 2015


Protects enterprise assets and provides a
history of who gained access and when
the access was granted

Identity and Access Management


Domain
CISSP

Identity as a Service (IDaaS)

CISSP Training Seminar – March 2015


Cloud-based services that broker identity
and access management functions to
target systems on customers’ premises
and/or in the cloud

Identity and Access Management


Domain
CISSP

Identity proofing

CISSP Training Seminar – March 2015


The process of collecting and verifying
information about a person for the
purpose of proving that a person who
has requested an account, a credential,
or other special privilege is indeed who
he or she claims to be, and establishing a
reliable relationsh

Identity and Access Management


Domain
CISSP

Kerberos

CISSP Training Seminar – March 2015


Developing standard for authenticating
network users. Kerberos offers two key
benefits: it functions in a multi-vendor
network, and it does not transmit
passwords over the network.

Identity and Access Management


Domain
CISSP

Logical access controls

CISSP Training Seminar – March 2015


Protection mechanisms that limit users’
access to information and restrict their
forms of access on the system to only
what is appropriate for them

Identity and Access Management


Domain
CISSP

MAC address

CISSP Training Seminar – March 2015


A 48-bit number (typically represented in
hexadecimal format) that is supposed to
be globally unique

Identity and Access Management


Domain
CISSP

Mandatory Access Controls (MACs)

CISSP Training Seminar – March 2015


Access control that requires the system
itself to manage access controls in
accordance with the organization’s
security policies

Identity and Access Management


Domain
CISSP

Multi-factor Authentication

CISSP Training Seminar – March 2015


Ensures that a user is who they claim to
be. The more factors used to determine
a person’s identity, the greater the trust
of authenticity.

Identity and Access Management


Domain
CISSP

Password Management System

CISSP Training Seminar – March 2015


A system that manages passwords
consistently across the enterprise

Identity and Access Management


Domain
CISSP

Physical Access Control Systems (PACS)

CISSP Training Seminar – March 2015


Allows authorized security personnel to
simultaneously manage and monitor
multiple entry points from a single,
centralized location

Identity and Access Management


Domain
CISSP

Radio Frequency Identification (RFID)

CISSP Training Seminar – March 2015


A non-contact, automatic identification
technology that uses radio signals to
identify, track, sort and detect a variety
of objects including people, vehicles,
goods and assets without the need for
direct contact

Identity and Access Management


Domain
CISSP

Role-Based Access Control (RBAC)

CISSP Training Seminar – March 2015


An access control model that bases the
access control authorizations on the
roles (or functions) that the user is
assigned within an organization

Identity and Access Management


Domain
CISSP

Rule-Based Access Control

CISSP Training Seminar – March 2015


An access control model that based on a
list of predefined rules that determine
what accesses should be granted

Identity and Access Management


Domain
CISSP

Security Assertion Markup Language 2.0


(SAML 2.0)

CISSP Training Seminar – March 2015


A version of the SAML OASIS standard
for exchanging authentication and
authorization data between security
domains

Identity and Access Management


Domain
CISSP

Single factor authentication

CISSP Training Seminar – March 2015


Involves the use of simply one of the
three available factors solely in order to
carry out the authentication process
being requested

Identity and Access Management


Domain
CISSP

Single Sign-On (SSO)

CISSP Training Seminar – March 2015


A unified login experience (from the
viewpoint of the end user) when
accessing one or more systems

Identity and Access Management


Domain
CISSP

Trusted Platform Modules (TPM)

CISSP Training Seminar – March 2015


A local hardware encryption engine and
secured storage for encryption keys

Identity and Access Management


Domain
CISSP

User ID

CISSP Training Seminar – March 2015


Provides the system with a way of
uniquely identifying a particular user
amongst all the users of that system

Identity and Access Management


Domain
CISSP

2011 CWE/SANS Top 25 Most Dangerous


Software Errors

CISSP Training Seminar – March 2015


A list of the most widespread and critical
errors that can lead to serious
vulnerabilities in software.

Security Assessment and Testing Domain


CISSP

Audit Records

CISSP Training Seminar – March 2015


Contain security event information such
as successful and failed authentication
attempts, file accesses, security policy
changes, account changes, and use of
privileges.

Security Assessment and Testing Domain


CISSP

Architecture Security Reviews

CISSP Training Seminar – March 2015


A manual review of the product
architecture to ensure that it fulfills the
necessary security requirements.

Security Assessment and Testing Domain


CISSP

Automated Vulnerability Scanners

CISSP Training Seminar – March 2015


Tests an application for the use of
system components or configurations
that are known to be insecure.

Security Assessment and Testing Domain


CISSP

Condition Coverage

CISSP Training Seminar – March 2015


This criteria requires sufficient test cases
for each condition in a program decision
to take on all possible outcomes at least
once. It differs from branch coverage
only when multiple conditions must be
evaluated to reach a decision.

Security Assessment and Testing Domain


CISSP

Data Flow Coverage

CISSP Training Seminar – March 2015


This criteria requires sufficient test cases
for each feasible data flow to be
executed at least once.

Security Assessment and Testing Domain


CISSP

Decision (Branch) Coverage

CISSP Training Seminar – March 2015


Considered to be a minimum level of
coverage for most software products,
but decision coverage alone is
insufficient for high-integrity
applications.

Security Assessment and Testing Domain


CISSP

Information Security Continuous


Monitoring (ISCM)

CISSP Training Seminar – March 2015


Maintaining ongoing awareness of
information security, vulnerabilities, and
threats to support organizational risk
management decisions.

Security Assessment and Testing Domain


CISSP

Intrusion Detection Systems (IDS)

CISSP Training Seminar – March 2015


Real-time monitoring of events as they
happen in a computer system or
network, using audit trail records and
network traffic and analyzing events to
detect potential intrusion attempts.

Security Assessment and Testing Domain


CISSP

Intrusion Prevention Systems (IPS)

CISSP Training Seminar – March 2015


Any hardware or software mechanism
that has the ability to detect and stop
attacks in progress.

Security Assessment and Testing Domain


CISSP

Loop Coverage

CISSP Training Seminar – March 2015


This criteria requires sufficient test cases
for all program loops to be executed for
zero, one, two, and many iterations
covering initialization, typical running,
and termination (boundary) conditions.

Security Assessment and Testing Domain


CISSP

Misuse Case

CISSP Training Seminar – March 2015


A Use Case from the point of view of an
Actor hostile to the system under design.

Security Assessment and Testing Domain


CISSP

Multi-Condition Coverage

CISSP Training Seminar – March 2015


This criteria requires sufficient test cases
to exercise all possible combinations of
conditions in a program decision.

Security Assessment and Testing Domain


CISSP

Negative Testing

CISSP Training Seminar – March 2015


Ensures the application can gracefully
handle invalid input or unexpected user
behavior.

Security Assessment and Testing Domain


CISSP

Path Coverage

CISSP Training Seminar – March 2015


This criteria requires sufficient test cases
for each feasible path, basis path, etc.,
from start to exit of a defined program
segment, to be executed at least once.

Security Assessment and Testing Domain


CISSP

Positive Testing

CISSP Training Seminar – March 2015


Determines that your application works
as expected.

Security Assessment and Testing Domain


CISSP

Real User Monitoring (RUM)

CISSP Training Seminar – March 2015


An approach to web monitoring that
aims to capture and analyze every
transaction of every user of a website or
application.

Security Assessment and Testing Domain


CISSP

Regression Analysis

CISSP Training Seminar – March 2015


The determination of the impact of a
change based on review of the relevant
documentation.

Security Assessment and Testing Domain


CISSP

Security Log Management

CISSP Training Seminar – March 2015


The process for generating, transmitting,
storing, analyzing, and disposing of
computer security log data.

Security Assessment and Testing Domain


CISSP

Statement Coverage

CISSP Training Seminar – March 2015


This criteria requires sufficient test cases
for each program statement to be
executed at least once; however, its
achievement is insufficient to provide
confidence in a software product’s
behavior.

Security Assessment and Testing Domain


CISSP

Static Source Code Analysis (SAST)

CISSP Training Seminar – March 2015


Analysis of the application source code
for finding vulnerabilities without
actually executing the application.

Security Assessment and Testing Domain


CISSP

Synthetic Performance Monitoring

CISSP Training Seminar – March 2015


Involves having external agents run
scripted transactions against a web
application.

Security Assessment and Testing Domain


CISSP

System Events

CISSP Training Seminar – March 2015


Operational actions performed by OS
components, such as shutting down the
system or starting a service.

Security Assessment and Testing Domain


CISSP

Threat Modeling

CISSP Training Seminar – March 2015


A process by which developers can
understand security threats to a system,
determine risks from those threats, and
establish appropriate mitigations.

Security Assessment and Testing Domain


CISSP

Use Cases

CISSP Training Seminar – March 2015


Abstract episodes of interaction
between a system and its environment.

Security Assessment and Testing Domain


CISSP

Validation

CISSP Training Seminar – March 2015


The determination of the correctness,
with respect to the user needs and
requirements, of the final program or
software produced from a development
project.

Security Assessment and Testing Domain


CISSP

Verification

CISSP Training Seminar – March 2015


The authentication process by which the
biometric system matches a captured
biometric against the person’s stored
template.

Security Assessment and Testing Domain


CISSP

Vulnerability Management Software

CISSP Training Seminar – March 2015


Log the patch installation history and
vulnerability status of each host, which
includes known vulnerabilities and
missing software updates.

Security Assessment and Testing Domain


CISSP

Web Proxies

CISSP Training Seminar – March 2015


Intermediate hosts through which
websites are accessed.

Security Assessment and Testing Domain


CISSP

White-box Testing

CISSP Training Seminar – March 2015


A design that allows one to peek inside
the “box” and focuses specifically on
using internal knowledge of the software
to guide the selection of test data.

Security Assessment and Testing Domain


CISSP

Acoustic Sensors

CISSP Training Seminar – March 2015


Device that uses passive listening devices

Security Operations Domain


CISSP

Administrator accounts

CISSP Training Seminar – March 2015


Accounts that are assigned only to
named individuals that require
administrative access to the system to
perform maintenance activities, and
should be different and separate from a
user’s normal account.

Security Operations Domain


CISSP

Balanced Magnetic Switch (BMS)

CISSP Training Seminar – March 2015


Devices that use a magnetic field or
mechanical contact to determine if an
alarm signal is initiated

Security Operations Domain


CISSP

Chain of custody

CISSP Training Seminar – March 2015


The who, what, when, where, and how
the evidence was handled—from its
identification through its entire life cycle,
which ends with destruction, permanent
archiving, or returning ot owner.

Security Operations Domain


CISSP

Cipher Lock

CISSP Training Seminar – March 2015


A lock controlled by touch screen,
typically 5 to 10 digits that when pushed
in the right combination the lock will
releases and allows entry

Security Operations Domain


CISSP

Configuration management (CM)

CISSP Training Seminar – March 2015


A discipline for evaluating, coordinating,
approving or disapproving, and
implementing changes in artifacts that
are used to construct and maintain
software systems

Security Operations Domain


CISSP

Data Leak Prevention (DLP)

CISSP Training Seminar – March 2015


A suite of technologies aimed at
stemming the loss of sensitive
information that occurs in the
enterprise.

Security Operations Domain


CISSP

Egress filtering

CISSP Training Seminar – March 2015


The practice of monitoring and
potentially restricting the flow of
information outbound from one network
to another

Security Operations Domain


CISSP

Infrared Linear Beam Sensors

CISSP Training Seminar – March 2015


A focused infrared (IR) light beam is
projected from an emitter and bounced
off of a reflector that is placed at the
other side of the detection area

Security Operations Domain


CISSP

Instant Keys

CISSP Training Seminar – March 2015


Provide a quick way to disable a key by
permitting one turn of the master key to
change a lock

Security Operations Domain


CISSP

Intrusion Detection System (IDS)

CISSP Training Seminar – March 2015


A technology that alerts organizations to
adverse or unwanted activity

Security Operations Domain


CISSP

Indemnification

CISSP Training Seminar – March 2015


The party to party litigation costs
resulting from its breach of warranties

Security Operations Domain


CISSP

Intrusion Prevention System (IPS)

CISSP Training Seminar – March 2015


A technology that monitors activity like
an IDS but will automatically take
proactive preventative action if it detects
unacceptable activity.

Security Operations Domain


CISSP

Honeypot

CISSP Training Seminar – March 2015


Decoy servers or systems setup to gather
information regarding an attacker or
intruder into your system

Security Operations Domain


CISSP

Honeyfarm

CISSP Training Seminar – March 2015


A centralized collection of honeypots
and analysis tools

Security Operations Domain


CISSP

Honeynet

CISSP Training Seminar – March 2015


Two or more honeypots on a network

Security Operations Domain


CISSP

Live evidence

CISSP Training Seminar – March 2015


Data that are dynamic and exist in
running processes or other volatile
locations (e.g., system/device RAM) that
disappear in a relatively short time once
the system is powered down

Security Operations Domain


CISSP

Locard’s exchange principle

CISSP Training Seminar – March 2015


States that when a crime is committed,
the perpetrators leave something behind
and take something with them, hence
the exchange

Security Operations Domain


CISSP

Magnetic Stripe (mag stripe) cards

CISSP Training Seminar – March 2015


Consist of a magnetically sensitive strip
fused onto the surface of a PVC material,
like a credit card

Security Operations Domain


CISSP

Mortise Lock

CISSP Training Seminar – March 2015


A lock or latch that is recessed into the
edge of a door, rather than being
mounted to its surface.

Security Operations Domain


CISSP

Power users

CISSP Training Seminar – March 2015


Accounts granted greater privileges than
normal user accounts when it is
necessary for the user to have greater
control over the system, but where
administrative access is not required

Security Operations Domain


CISSP

Protocol Anomaly-Based IDS

CISSP Training Seminar – March 2015


Identifies any unacceptable deviation
from expected behavior based on known
network protocols

Security Operations Domain


CISSP

Proximity Card (prox cards)

CISSP Training Seminar – March 2015


Use embedded antenna wires connected
to a chip within the card through RF.

Security Operations Domain


CISSP

Records and Information Management


(RIM)

CISSP Training Seminar – March 2015


Essential activities to protect business
information and can be established in
compliance with laws, regulations, or
corporate governance

Security Operations Domain


CISSP

Remanence

CISSP Training Seminar – March 2015


The measure of the existing magnetic
field on the media after degaussing

Security Operations Domain


CISSP

Rim Lock

CISSP Training Seminar – March 2015


A lock or latch typically mounted on the
surface of a door, typically associated
with a dead bolt type of lock

Security Operations Domain


CISSP

Sandboxing

CISSP Training Seminar – March 2015


A form of software virtualization that
lets programs and processes run in their
own isolated virtual environment

Security Operations Domain


CISSP

Security Informatn and Event


Management (SIEM)

CISSP Training Seminar – March 2015


A group of technologies which aggregate
information about access controls and
selected system activity to store for
analysis and correlation

Security Operations Domain


CISSP

Service accounts

CISSP Training Seminar – March 2015


Accounts used to provide privileged
access used by system services and core
applications

Security Operations Domain


CISSP

Smart Cards

CISSP Training Seminar – March 2015


Credential cards with one or more
microchip processing that accepts or
processes infomraiton and can be
contact or contact less.

Security Operations Domain


CISSP

Statistical Anomaly-based IDS

CISSP Training Seminar – March 2015


Analyzes event data by comparing it to
typical, known, or predicted traffic
profiles in an effort to find potential
security breaches

Security Operations Domain


CISSP

Steganography

CISSP Training Seminar – March 2015


The science of hiding information

Security Operations Domain


CISSP

Traffic anomaly-based IDS

CISSP Training Seminar – March 2015


Identifies any unacceptable deviation
from expected behavior based on actual
traffic structure

Security Operations Domain


CISSP

Time domain Reflectometry (TDR)

CISSP Training Seminar – March 2015


Send induced radio frequency (RF)
signals down a cable that is attached to
the fence fabric

Security Operations Domain


CISSP

ActiveX Data Objects (ADO)

CISSP Training Seminar – March 2015


A Microsoft high-level interface for all
kinds of data.

Software Development Security Domain


CISSP

Capability Maturity Model for Software


(CMM or SW-CMM)

CISSP Training Seminar – March 2015


Maturity model focused on quality
management processes and has five
maturity levels that contain several key
practices within each maturity level.

Software Development Security Domain


CISSP

Common Object Request Broker


Architecture (CORBA)

CISSP Training Seminar – March 2015


A set of standards that addresses the
need for interoperability between
hardware and software products.

Software Development Security Domain


CISSP

Computer Virus

CISSP Training Seminar – March 2015


A program written with functions and
intent to copy and disperse itself without
the knowledge and cooperation of the
owner or user of the computer.

Software Development Security Domain


CISSP

Configuration Mangement (CM)

CISSP Training Seminar – March 2015


Monitoring and managing changes to a
program or documentation.

Software Development Security Domain


CISSP

Covert Channel

CISSP Training Seminar – March 2015


An information flow that is not
controlled by a security control.

Software Development Security Domain


CISSP

Encryption

CISSP Training Seminar – March 2015


The conversion of electronic data into
another form, called ciphertext, which
cannot be easily understood by anyone
except authorized parties.

Software Development Security Domain


CISSP

Data Mining

CISSP Training Seminar – March 2015


The practice of examining large
databases in order to generate new
information.

Software Development Security Domain


CISSP

Database Management System (DBMS)

CISSP Training Seminar – March 2015


A suite of application programs that
typically manages large, structured sets
of persistent data.

Software Development Security Domain


CISSP

Database Model

CISSP Training Seminar – March 2015


Describes the relationship between the
data elements and provides a framework
for organizing the data.

Software Development Security Domain


CISSP

DevOps

CISSP Training Seminar – March 2015


An approach based on lean and agile
principles in which business owners and
the development, operations, and
quality assurance departments
collaborate.

Software Development Security Domain


CISSP

Log

CISSP Training Seminar – March 2015


A record of the events occurring within
an organization’s systems and networks.

Software Development Security Domain


CISSP

Integrated Product and Process


Development (IPPD)

CISSP Training Seminar – March 2015


A management technique that
simultaneously integrates all essential
acquisition activities through the use of
multidisciplinary teams to optimize the
design, manufacturing, and
supportability processes.

Software Development Security Domain


CISSP

Iterative Models

CISSP Training Seminar – March 2015


Development models that allow for
successive refinements of requirements,
design, and coding.

Software Development Security Domain


CISSP

Knowledge Discovery in Databases (KDD)

CISSP Training Seminar – March 2015


A mathematical, statistical, and
visualization method of identifying valid
and useful patterns in data.

Software Development Security Domain


CISSP

Metadata

CISSP Training Seminar – March 2015


Information about the data.

Software Development Security Domain


CISSP

Rapid Application Development (RAD)

CISSP Training Seminar – March 2015


A form of rapid prototyping that requires
strict time limits on each phase and
relies on tools that enable quick
development.

Software Development Security Domain


CISSP

Software Assurance (SwA)

CISSP Training Seminar – March 2015


The level of confidence that software is
free from vulnerabilities, either
intentionally designed into the software
or accidentally inserted at any time
during its life cycle, and that it functions
in the intended manner.

Software Development Security Domain


CISSP

Time Multiplexing

CISSP Training Seminar – March 2015


Allows the operating system to provide
well-defined and structured access to
processes that need to use resources
according to a controlled and tightly
managed schedule.

Software Development Security Domain


CISSP

Time of Check/Time of Use (TOC/TOU)


Attacks

CISSP Training Seminar – March 2015


Takes advantage of the dependency on
the timing of events that takes place in a
multitasking operating system.

Software Development Security Domain


CISSP

Trusted Computing Bases (TCB)

CISSP Training Seminar – March 2015


The collection of all of the hardware,
software, and firmware within a
computer system that contains all
elements of the system responsible for
supporting the security policy and the
isolation of objects.

Software Development Security Domain


CISSP

Waterfall Development Model

CISSP Training Seminar – March 2015


A development model in which each
phase contains a list of activities that
must be performed and documented
before the next phase begins.

Software Development Security Domain

You might also like