CISSP 8 Domains
1) S______ and r___ m__________
2) A____ s_______
3) S_______ a__________ and e________
4) C_________ and n______ s________
5) I_______ and a_____ m__________
6) S______ a_________ and t______
7) S_______ o_________
8) S______ d_________ s_______
Security; risk management;
Asset security;
Security architecture; engineering;
Communication; network security;
Identity; access management;
Security assessment; testing;
Security operations;
Software development security;
Layers of the web
- S______ web
- D___ web
- D___ web
Surface;
Deep;
Dark;
NIST’s RMF steps
Prepare;
Categorize;
Select;
Implement;
Assess;
Authorize;
Monitor;
An asset is an item perceived as having v____ to an o__________.
- Assets can be d_____ or p______.
value; organisation;
digital; physical;
Examples of digital assets include the p_____ i_________ of employees, clients or vendors, such as:
- S_____ S_______ N_______, or unique national identification numbers assigned to individuals
- D_____ of b_____
- B____ a______ numbers
- M______ a________
personal information;
Social Security Numbers;
Dates; birth;
Bank account;
Mailing addresses;
Examples of physical assets include:
- P______ k_____
- S______
- D_____ c________
- O_____ spaces
Payment kiosks;
Servers;
Desktop computers;
Office;
Some common strategies to manage risks include:
- A________: Accepting a r___ to avoid disrupting b______ c________
- A________: Creating a p___ to avoid the r___ altogether
- T_________: Transferring r___ to a third party to m_____
- M_______: Lessening the i_____ of a known r___
Acceptance; risk; business continuity;
Avoidance; plan; risk;
Transference; risk; manage;
Mitigation; impact; risk;
Examples of risk management frameworks include:
- _ _ _ _ RMF
- H_____ I__________ T____ A________ (_ _ _ _ _ _ _)
NIST;
Health Information Trust Alliance (HITRUST);
Threat
Any c___________ or e_____ that can negatively impact a______.
circumstance; event; assets;
Insider threats
Staff m______ or v_____ abuse their a________ a_____ to obtain data that may h___ an organisation.
members; vendors; authorized access; harm;
Advanced Persistent Threats (APTs)
A t____ a____ maintains unauthorized access to a s_____ for an e________ period of t___.
threat actor; system; extended; time;
Risk
Anything that can impact the c__________, i_______, or a___________ of an a____
confidentiality; integrity; availability; asset;
Basic formula for determining the level of risk:
Risk = Likelihood of a t_____
threat;
Different factors affecting the likelihood of a risk to an organization’s assets:
- E_______ risk
- I_______ risk
- L______ systems
- M_________ risk
- S________ c_______/l_________
External;
Internal;
Legacy;
Multiparty;
Software compliance/licensing;
Vulnerability
weakness; threat;
inspect; vulnerabilities; systems;
Some vulnerabilities include:
- P____L_____
- Z___L____
-L__4S____
- P____P____
- S______ l______ and m_________ f_____
- S_____-s___ r______ f_______
ProxyLogon;
ZeroLogon;
Log4Shell;
PetitPotam;
Security logging; monitoring failures;
Server-side request forgery;
Business continuity
An organization’s ability to maintain their e______ p__________ by establishing r___ d______ r_______ plans
everyday productivity; risk disaster recovery;
External threat
Anything o______ the o__________ that has the potential to h___ organizational a_____
outside; organization; harm; assets;
Internal threat
A c______ or f______ employee, external v_____, or trusted p______ who poses a s______ risk
current; former; vendor; partner; security;
Ransomware
A m_________ a_____ where threat actors e______ an organization’s d___ and demand p______ to restore access.
malicious attack; encrypt; data; payment;
Risk mitigation
The process of having the right p_______ and r____ in place to quickly reduce the i_____ of a risk like a b_____
procedures; rules; impact; breach;
Security posture
An organization’s ability to manage its d______ of critical a____ and d___ and react to c_____
defense; assets; data; change;
Shared responsibility
The idea that all individuals within an organization take an active role in lowering r___ and m_________ both p_____ and v_____ s_______
risk; maintaining; physical; virtual security;
Social engineering
A m__________ t_________ that exploits human e_____ to gain private i__________, a_____, or v________
manipulation technique; error; information, access; valuables;