ISC2 Certified in Cybersecurity

Interactive Flash Cards

Security Principles

Adequate Security

What does adequate security mean?

Answer

Security measures should match the level of risk and the possible damage if information is lost, misused, changed, or accessed without permission.

Security Principles

Administrative Controls

What is Administrative Controls?

Answer

Administrative controls are security measures created through policies, procedures, and management rules.

Security Principles

Artificial Intelligence

What is Artificial Intelligence (AI)?

Answer

Artificial Intelligence is the ability of computers or machines to imitate human intelligence, such as learning, reasoning, and making decisions.

Security Principles

Assets

What is Assets?

Answer

Assets are anything valuable an organization owns, such as systems, equipment, buildings, data, or intellectual property.

Security Principles

Authentication

What is Authentication?

Answer

Authentication is the process of verifying that a user, system, or sender is really who they claim to be before access is allowed.

Security Principles

Authorization

What is Authorization?

Answer

Authorization is the permission given to a user or system to access a resource or perform certain actions.

Security Principles

Availability

What is Availability?

Answer

Availability means authorized users can access and use information when they need it.

Security Principles

Baseline

What is Baseline?

Answer

A baseline is the minimum approved security configuration allowed by an organization or standard.

Security Principles

Biometric

What are biometric methods?

Answer

Biometrics are physical traits such as fingerprints, voice, hand shape, or iris patterns used to identify a person.

Security Principles

Bot

What is Bot?

Answer

A bot is malicious software that lets an attacker remotely control an infected system like a robot.

Security Principles

Classified or Sensitive Information

What is Classified or Sensitive Information?

Answer

It is information that must be protected from unauthorized disclosure and is marked to show how sensitive it is.

Security Principles

Confidentiality

What is Confidentiality?

Answer

Confidentiality means information is not shared with unauthorized people or processes.

Security Principles

Criticality

What is Criticality?

Answer

Criticality measures how important information or a system is to the success of a mission or business function.

Security Principles

Data Integrity

What is Data Integrity?

Answer

Data integrity means data stays accurate and is not changed in an unauthorized way while stored, processed, or transmitted.

Security Principles

Encryption

What is Encryption?

Answer

Encryption is the process of converting readable data into unreadable ciphertext to protect it.

Security Principles

GDPR

What is GDPR?

Answer

GDPR is a European Union law that protects personal data and treats privacy as a human right.

Security Principles

Governance

What is Governance?

Answer

Governance is how an organization is managed and how decisions are made using policies, roles, and procedures.

Security Principles

HIPAA

What is HIPAA?

Answer

HIPAA is a U.S. law that protects health information and sets privacy rules for healthcare data.

Security Principles

Impact

What is Impact?

Answer

Impact is the amount of harm or damage that could happen if a threat exploits a vulnerability.

Security Principles

Information Security Risk

What is Information Security Risk?

Answer

Information security risk is the possibility that unauthorized access, use, disclosure, disruption, modification, or destruction could cause harm.

Security Principles

Integrity

What is Integrity?

Answer

Integrity means information stays complete, accurate, consistent, and useful for its intended purpose.

Security Principles

ISO

What is ISO?

Answer

ISO is an international organization that develops voluntary standards used around the world.

Security Principles

IETF

What is IETF?

Answer

IETF is the internet standards organization that develops protocol standards such as IP, TCP, and DNS.

Security Principles

Likelihood

What is Likelihood?

Answer

Likelihood is the chance that a vulnerability may be exploited by a threat.

Security Principles

Likelihood of Occurrence

What is Likelihood of Occurrence?

Answer

Likelihood of occurrence is an estimate of how probable it is that a threat can exploit a vulnerability.

Security Principles

Multi-Factor Authentication

What is Multi-Factor Authentication (MFA)?

Answer

Multi-factor authentication uses two or more different authentication factors, such as something you know, have, or are.

Security Principles

NIST

What is NIST?

Answer

NIST is a U.S. organization that develops standards and guidance, including important cybersecurity standards.

Security Principles

Non-repudiation

What is Non-repudiation?

Answer

Non-repudiation means a person cannot deny doing an action such as creating, approving, sending, or receiving information.

Security Principles

Personally Identifiable Information (PII)

What is PII?

Answer

PII is information that can identify a person, such as a name, Social Security number, or other linked personal details.

Security Principles

Physical Controls

What is Physical Controls?

Answer

Physical controls are tangible security measures such as locks, guards, fences, walls, and badge readers.

Security Principles

Privacy

What is Privacy?

Answer

Privacy is the right of an individual to control how information about them is collected, used, and shared.

Security Principles

Probability

What is Probability?

Answer

Probability is the chance that a threat can exploit a vulnerability.

Security Principles

Protected Health Information (PHI)

What is PHI?

Answer

PHI is health-related information protected under HIPAA, such as medical details, treatment data, or payment information.

Security Principles

Qualitative Risk Analysis

What is Qualitative Risk Analysis?

Answer

Qualitative risk analysis evaluates risk using labels such as low, medium, or high instead of numbers.

Security Principles

Quantitative Risk Analysis

What is Quantitative Risk Analysis?

Answer

Quantitative risk analysis uses numbers to measure likelihood, impact, and possible financial loss or gain.

Security Principles

Risk

What is Risk?

Answer

Risk is the possibility of harm or loss caused by a potential event or circumstance.

Security Principles

Risk Acceptance

What is Risk Acceptance?

Answer

Risk acceptance means deciding to live with a risk because the benefits are worth it and no extra action is taken.

Security Principles

Risk Assessment

What is Risk Assessment?

Answer

Risk assessment is the process of identifying and analyzing risks, threats, vulnerabilities, and existing controls.

Security Principles

Risk Avoidance

What is Risk Avoidance?

Answer

Risk avoidance means not doing an activity because the risk is too high.

Security Principles

Risk Management

What is Risk Management?

Answer

Risk management is the process of identifying, evaluating, treating, and monitoring risks.

Security Principles

Risk Management Framework

What is Risk Management Framework?

Answer

A risk management framework is a structured method for managing risk across an organization.

Security Principles

Risk Mitigation

What is Risk Mitigation?

Answer

Risk mitigation means putting controls in place to reduce the likelihood or impact of a risk.

Security Principles

Risk Tolerance

What is Risk Tolerance?

Answer

Risk tolerance is the amount of risk an organization is willing to accept to achieve a goal.

Security Principles

Risk Transference

What is Risk Transference?

Answer

Risk transference means shifting the financial impact of a risk to another party, such as through insurance.

Security Principles

Risk Treatment

What is Risk Treatment?

Answer

Risk treatment is choosing the best way to deal with an identified risk.

Security Principles

Security Controls

What is Security Controls?

Answer

Security controls are safeguards or countermeasures used to protect confidentiality, integrity, and availability.

Security Principles

Sensitivity

What is Sensitivity?

Answer

Sensitivity is how important information is to its owner and how much protection it needs.

Security Principles

Single-Factor Authentication

What is Single-Factor Authentication (SFA)?

Answer

Single-factor authentication uses only one authentication factor, such as a password, token, or biometric.

Security Principles

State

What is State?

Answer

State is the condition an entity is in at a specific point in time.

Security Principles

System Integrity

What is System Integrity?

Answer

System integrity means a system works as intended and is free from unauthorized or improper changes.

Security Principles

Technical Controls

What is Technical Controls?

Answer

Technical controls are security measures enforced by hardware, software, or firmware.

Security Principles

Threat

What is Threat?

Answer

A threat is any event or situation that could harm systems, information, people, or organizational operations.

Security Principles

Threat Actor

What is Threat Actor?

Answer

A threat actor is a person or group that tries to exploit vulnerabilities to cause harm.

Security Principles

Threat Vector

What is Threat Vector?

Answer

A threat vector is the method or path a threat actor uses to carry out an attack.

Security Principles

Token

What is Token?

Answer

A token is a physical object a user has and uses to prove their identity.

Security Principles

Vulnerability

What is Vulnerability?

Answer

A vulnerability is a weakness that can be exploited by a threat.

Security Principles

IEEE

What is IEEE?

Answer

IEEE is a professional organization that develops standards for fields like telecommunications and computer engineering.

IR, BC and DRC

Adverse Events

What is Adverse Events?

Answer

Adverse events are events with harmful results, such as crashes, packet floods, web defacement, or malicious code.

IR, BC and DRC

Breach

What is Breach?

Answer

A breach happens when sensitive information is accessed, exposed, or obtained without proper authorization.

IR, BC and DRC

Business Continuity (BC)

What is Business Continuity (BC)?

Answer

Business continuity is the actions, processes, and tools used to keep critical operations running during a disruption.

IR, BC and DRC

Business Continuity Plan (BCP)

What is a Business Continuity Plan (BCP)?

Answer

A business continuity plan is a documented set of instructions for keeping important business processes running during and after a major disruption.

IR, BC and DRC

Business Impact Analysis (BIA)

What is a Business Impact Analysis (BIA)?

Answer

A business impact analysis identifies important functions, dependencies, and recovery priorities during a significant disruption.

IR, BC and DRC

Disaster Recovery (DR)

What is Disaster Recovery (DR)?

Answer

Disaster recovery is the work needed to restore IT and communication services during and after an outage or disruption.

IR, BC and DRC

Disaster Recovery Plan (DRP)

What is a Disaster Recovery Plan (DRP)?

Answer

A disaster recovery plan is a documented set of processes and procedures for restoring critical systems and technology after a disaster.

IR, BC and DRC

Event

What is Event?

Answer

An event is any observable occurrence in a network or system.

IR, BC and DRC

Exploit

What is Exploit?

Answer

An exploit is a specific attack that takes advantage of a vulnerability.

IR, BC and DRC

Incident

What is Incident?

Answer

An incident is an event that actually or potentially threatens the confidentiality, integrity, or availability of information or systems.

IR, BC and DRC

Incident Response (IR)

What is Incident Response (IR)?

Answer

Incident response is the process of detecting, analyzing, and handling incidents to reduce their impact.

IR, BC and DRC

Incident Response Plan (IRP)

What is an Incident Response Plan (IRP)?

Answer

An incident response plan is a documented set of steps for detecting, responding to, and limiting the effects of a cyberattack.

IR, BC and DRC

Intrusion

What is Intrusion?

Answer

An intrusion is a security incident where someone gains, or tries to gain, unauthorized access to a system or resource.

IR, BC and DRC

Security Operations Center

What is a Security Operations Center (SOC)?

Answer

A Security Operations Center is a central team that monitors, detects, and analyzes security events to prevent business disruptions.

IR, BC and DRC

Zero Day

What is Zero Day?

Answer

A zero day is a previously unknown vulnerability that can be exploited before a fix or reliable defense is available.

Access Control Concepts

Audit

What is Audit?

Answer

An audit is an independent review of records and activities to check whether controls, policies, and procedures are being followed.

Access Control Concepts

Crime Prevention through Environmental Design (CPTED)

What is CPTED?

Answer

CPTED is a design approach that uses building layout and environmental features to reduce the chance of crime.

Access Control Concepts

Defense in Depth

What is Defense in Depth?

Answer

Defense in depth is a security strategy that uses multiple layers of protection instead of relying on just one control.

Access Control Concepts

Discretionary Access Control (DAC)

What is DAC?

Answer

DAC is an access control model where the owner of an object decides who can access it and what they can do.

Access Control Concepts

Encrypt

What is Encrypt?

Answer

To encrypt means to convert information into a protected form that only authorized people can read.

Access Control Concepts

Firewalls

What is Firewalls?

Answer

Firewalls are devices or software that filter network traffic based on security rules.

Access Control Concepts

Insider Threat

What is Insider Threat?

Answer

An insider threat is a trusted user or entity with authorized access that could misuse that access to cause harm.

Access Control Concepts

iOS

What is iOS?

Answer

iOS is Apple’s operating system for mobile devices.

Access Control Concepts

Layered Defense

What is Layered Defense?

Answer

Layered defense means using several controls one after another to better protect an asset.

Access Control Concepts

Linux

What is Linux?

Answer

Linux is an open-source operating system whose source code is publicly available.

Access Control Concepts

Log Anomaly

What is Log Anomaly?

Answer

A log anomaly is an unusual pattern in log data that may need further investigation.

Access Control Concepts

Logging

What is Logging?

Answer

Logging is the process of collecting and storing records of activities and events in systems and networks.

Access Control Concepts

Logical Access Control Systems

What is Logical Access Control Systems?

Answer

A logical access control system is an automated system that controls access to digital resources after verifying identity.

Access Control Concepts

Mandatory Access Control

What is Mandatory Access Control (MAC)?

Answer

Mandatory access control is an access model where the system enforces access rules based on organizational policy.

Access Control Concepts

Mantrap

What is Mantrap?

Answer

A mantrap is a controlled entrance with two doors where only one door can open at a time.

Access Control Concepts

Object

What is Object?

Answer

An object is a passive entity, such as a file, record, or device, that stores or receives information.

Access Control Concepts

Physical Access Controls

What is Physical Access Controls?

Answer

Physical access controls are tangible security measures such as locks, guards, fences, walls, and badge readers.

Access Control Concepts

Principle of Least Privilege

What is Principle of Least Privilege?

Answer

The principle of least privilege means users and programs should have only the minimum access needed to do their jobs.

Access Control Concepts

Privileged Account

What is Privileged Account?

Answer

A privileged account is an account with higher access rights than a normal user account.

Access Control Concepts

Ransomware

What is Ransomware?

Answer

Ransomware is malware that locks systems or files until money is paid.

Access Control Concepts

Role-based Access Control (RBAC)

What is RBAC?

Answer

RBAC is an access control model where permissions are assigned based on a user’s role.

Access Control Concepts

Rule

What is Rule?

Answer

A rule is an instruction used to allow or deny access based on an identity and an access list.

Access Control Concepts

Segregation of Duties

What is Segregation of Duties?

Answer

Segregation of duties means splitting tasks so one person alone cannot complete a sensitive process.

Access Control Concepts

Subject

What is Subject?

Answer

A subject is an active entity, such as a user, process, or device, that accesses objects or changes system state.

Access Control Concepts

Turnstile

What is Turnstile?

Answer

A turnstile is a one-person entry barrier that helps control physical access.

Access Control Concepts

Unix

What is Unix?

Answer

Unix is an operating system commonly used in software development.

Access Control Concepts

User Provisioning

What is User Provisioning?

Answer

User provisioning is the process of creating, managing, and removing user accounts on a system.

Network Security

Application Programming Interface (API)

What is an API?

Answer

An API is a set of rules and tools that allows software applications to communicate with each other.

Network Security

Bit

What is Bit?

Answer

A bit is the smallest unit of digital data and can be either 0 or 1.

Network Security

Broadcast

What is Broadcast?

Answer

Broadcast is a one-to-many way of sending network traffic to all devices on a segment.

Network Security

Byte

What is Byte?

Answer

A byte is a unit of digital information that usually contains eight bits.

Network Security

Cloud Computing

What is Cloud Computing?

Answer

Cloud computing is the on-demand delivery of shared computing resources such as servers, storage, and applications over a network.

Network Security

Community Cloud

What is Community Cloud?

Answer

A community cloud is a cloud environment shared by organizations with similar needs or concerns, such as security or compliance.

Network Security

De-encapsulation

What is De-encapsulation?

Answer

De-encapsulation is the process of unpacking data that was previously wrapped inside another protocol or structure.

Network Security

Denial-of-Service (DoS)

What is a DoS attack?

Answer

A denial-of-service attack prevents or delays access to systems or services for legitimate users.

Network Security

Domain Name Service (DNS)

What is DNS?

Answer

DNS is the system that translates domain names into IP addresses.

Network Security

Encapsulation

What is Encapsulation?

Answer

Encapsulation is the process of wrapping data inside another structure or protocol for transmission or protection.

Network Security

File Transfer Protocol (FTP)

What is FTP?

Answer

FTP is a protocol used to transfer files between systems over a network.

Network Security

Fragment Attack

What is Fragment Attack?

Answer

A fragment attack breaks traffic into pieces in a way that can confuse or crash the receiving system.

Network Security

Hardware

What is Hardware?

Answer

Hardware is the physical part of a computer or device.

Network Security

Hybrid Cloud

What is Hybrid Cloud?

Answer

A hybrid cloud combines private and public cloud services so some data stays private while other data uses public cloud resources.

Network Security

Infrastructure as a Service (IaaS)

What is IaaS?

Answer

IaaS is a cloud service model where the provider supplies core computing, storage, and networking resources.

Network Security

Internet Control Message Protocol (ICMP)

What is ICMP?

Answer

ICMP is a network protocol used to report errors and check whether a host or service is reachable.

Network Security

Internet Protocol (IPv4)

What is IPv4?

Answer

IPv4 is the standard protocol used to send data packets across networks.

Network Security

Man-in-the-Middle

What is Man-in-the-Middle?

Answer

A man-in-the-middle attack happens when an attacker secretly intercepts and possibly changes data between two parties.

Network Security

Microsegmentation

What is Microsegmentation?

Answer

Microsegmentation divides a network into very small protected zones to limit movement and improve security.

Network Security

Oversized Packet Attack

What is Oversized Packet Attack?

Answer

An oversized packet attack sends packets that are too large for the target system to handle, which can cause failure.

Network Security

Packet

What is Packet?

Answer

A packet is a unit of data used at Layer 3 of the OSI model.

Network Security

Payload

What is Payload?

Answer

A payload is the harmful action performed by malicious code after it runs.

Network Security

Payment Card Industry Data Security Standard (PCI DSS)

What is PCI DSS?

Answer

PCI DSS is a security standard for organizations that handle credit or debit card data.

Network Security

Platform as a Service (PaaS)

What is PaaS?

Answer

PaaS is a cloud service model that provides a platform for building and deploying applications.

Network Security

Private Cloud

What is Private Cloud?

Answer

A private cloud is a cloud environment used by a single organization and controlled internally or by a dedicated provider.

Network Security

Protocols

What is Protocols?

Answer

Protocols are sets of rules that define how systems communicate.

Network Security

Public Cloud

What is Public Cloud?

Answer

A public cloud is a cloud service offered for open use by the general public.

Network Security

Simple Mail Transfer Protocol (SMTP)

What is SMTP?

Answer

SMTP is the standard protocol used to send email.

Network Security

Software

What is Software?

Answer

Software is the collection of programs and data that tell a computer what to do.

Network Security

Software as a Service (SaaS)

What is SaaS?

Answer

SaaS is a cloud service model where users access the provider’s software over the internet.

Network Security

Spoofing

What is Spoofing?

Answer

Spoofing is pretending to be another system, address, or sender to trick a target.

Network Security

TCP/IP Model

What is the TCP/IP Model?

Answer

The TCP/IP model is a four-layer networking model used for communication across the internet.

Network Security

VLAN

What is VLAN?

Answer

A VLAN is a logical network grouping that makes devices act like they are on the same LAN even if they are separated.

Network Security

VPN

What is a VPN?

Answer

A VPN is a secure private connection built over another network, usually the internet.

Network Security

WLAN

What is a WLAN?

Answer

A WLAN is a local network that uses wireless radio signals instead of cables.

Network Security

Zenmap

What is Zenmap?

Answer

Zenmap is the graphical interface for Nmap, a tool used to scan networks and discover connected systems.

Network Security

Zero Trust

What is Zero Trust?

Answer

Zero Trust is a security model where no part of the network is automatically trusted and every access request is verified.

Security Operations

Application Server

What is Application Server?

Answer

An application server is a computer that hosts applications for users or workstations.

Security Operations

Asymmetric Encryption

What is Asymmetric Encryption?

Answer

Asymmetric encryption uses one key to encrypt data and a different key to decrypt it.

Security Operations

Checksum

What is Checksum?

Answer

A checksum is a value used to detect errors in stored or transmitted data.

Security Operations

Ciphertext

What is Ciphertext?

Answer

Ciphertext is unreadable encrypted data.

Security Operations

Classification

What is Classification?

Answer

Classification is the process of assigning a sensitivity level to information based on the harm that could result if it is exposed.

Security Operations

Configuration Management

What is Configuration Management?

Answer

Configuration management is the process of ensuring that only approved and verified changes are made to a system.

Security Operations

Cryptanalyst

What is Cryptanalyst?

Answer

A cryptanalyst is a person who studies cryptography to find weaknesses in algorithms or implementations.

Security Operations

Cryptography

What is Cryptography?

Answer

Cryptography is the practice of protecting information by transforming it into a secure form.

Security Operations

Data Loss Prevention (DLP)

What is DLP?

Answer

DLP is technology designed to detect and stop unauthorized use or transmission of sensitive data.

Security Operations

Decryption

What is Decryption?

Answer

Decryption is the process of converting ciphertext back into readable plaintext.

Security Operations

Degaussing

What is Degaussing?

Answer

Degaussing is a method of erasing magnetic media so data cannot be recovered.

Security Operations

Digital Signature

What is Digital Signature?

Answer

A digital signature is a cryptographic method that proves origin, supports integrity, and helps with non-repudiation.

Security Operations

Egress Monitoring

What is Egress Monitoring?

Answer

Egress monitoring is the monitoring of outgoing network traffic.

Security Operations

Encryption System

What is Encryption System?

Answer

An encryption system is the full set of hardware, software, algorithms, and procedures used to encrypt and decrypt data.

Security Operations

Hardening

What is Hardening?

Answer

Hardening is the process of securely configuring and locking down systems to reduce the attack surface.

Security Operations

Hash Function

What is Hash Function?

Answer

A hash function is an algorithm that creates a fixed value that acts like a fingerprint for data.

Security Operations

Hashing

What is Hashing?

Answer

Hashing is the process of applying a hash function to data to create a representative value.

Security Operations

Information Sharing

What is Information Sharing?

Answer

Information sharing is the ability or requirement for systems and applications to exchange information with others.

Security Operations

Ingress Monitoring

What is Ingress Monitoring?

Answer

Ingress monitoring is the monitoring of incoming network traffic.

Security Operations

Message Digest

What is Message Digest?

Answer

A message digest is a hash value that uniquely represents data and changes completely if the data changes.

Security Operations

Operating System

What is Operating System?

Answer

An operating system is the core software that runs a computer and manages hardware, applications, and files.

Security Operations

Patch

What is Patch?

Answer

A patch is a software update that directly changes files or settings to fix or improve another software component.

Security Operations

Patch Management

What is Patch Management?

Answer

Patch management is the process of identifying, testing, installing, and verifying software updates.

Security Operations

Plaintext

What is Plaintext?

Answer

Plaintext is data in its normal readable form before encryption.

Security Operations

Records

What is Records?

Answer

Records are documented evidence of activities or results, used to show what happened or prove a process was followed.

Security Operations

Records Retention

What is Records Retention?

Answer

Records retention is the practice of keeping records for as long as needed and then destroying them at the proper time.

Security Operations

Remanence

What is Remanence?

Answer

Remanence is leftover data that remains on storage media even after it has been cleared.

Security Operations

Request for Change (RFC)

What is an RFC?

Answer

An RFC is a formal request to make a change to a system, process, or product.

Security Operations

Security Governance

What is Security Governance?

Answer

Security governance is the full set of policies, roles, and processes used to make security decisions in an organization.

Security Operations

Social Engineering

What is Social Engineering?

Answer

Social engineering is the use of deception to trick people into revealing information or giving access.

Security Operations

Symmetric Encryption

What is Symmetric Encryption?

Answer

Symmetric encryption uses the same key for both encryption and decryption.

Security Operations

Web Server

What is Web Server?

Answer

A web server is a computer and software setup that provides web content or services to users.

Security Operations

Whaling Attack

What is Whaling Attack?

Answer

A whaling attack is a phishing attack aimed at high-level people, often to trick them into approving large transfers.