100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

iSACA Cybersecurity Fundamentals Certification Exam ALL ANSWERS 100% CORRECT

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
04-01-2024
Written in
2023/2024

Confidentiality Protection from unauthorized access integrity Protection from unauthorized modification Availability protection from disruptions in access Cybersecurity the protection of information assets (digital assets) by addressing threats to information processed, stored, and transported by internetworked information systems NIST Functions to Protect Digital Assets IPDRR 1) Identify 2) Protect 3) Detect 4) Respond 5) Recover Nonrepudiation Def: ensuring that a message or other piece of information is genuine Examples: digital signatures and transaction logs Risk combination of the probability of an event and its consequences, mitigated through controls Threat Anything that is capable of acting against an asset in a harmful manner Asset something of either tangible or intangible value that is worth protecting Vulnerability A weakness in the design, implementation, operation or internal control of a process that could expose the system to adverse threats from threat events Inherent risk The risk level or exposure without taking into account the actions that management has taken or might take (e.g., implementing controls) Residual risk the risk that remains after management implements internal controls or some other response to risk Likelihood A.K.A probability measure of frequency of which an event may occur, which depends on the threat and vulnerability Approaches to Cybersecurity Risk Dependent on: 1) Risk tolerance 2) Size & scope of the environment 3) Amount of data available Approaches: 1) Ad hoc 2) Compliance-based 3) Risk-based Threat Agents The actors causing the threats that might exploit a vulnerability Types: 1) Corporations - competitive advantage 2) Cybercriminals - profit 3) Cyberterrorists - critical infrastructures/government 4) Cyberwarriors - politically motivated 5) Employees - revenge 6) Hacktivists - politically motivated 7) Nation states - government/private entities 8) Online social hackers - identity theft, profit 9) Script kiddies - learning to hack Attack vector The path or route used to gain access to the target (asset) Types: 1) Ingress - intrusion 2) Egress - Data removal Attack Attributes 1) Attack Vector 2) Payload 3) Exploit 4) Vulnerability 5) Target (Asset) Threat Process 1) Perform reconnaissance (gathering information) 2) Create attack tools 3) Deliver malicious capabilities 4) Exploit and compromise 5) Conduct an attack 6) Achieve results 7) Maintain a presence or set of capabilities 8) Coordinate a campaign Malware Def: software designed to infiltrate or damage a computer system without the user's informed consent Examples: Viruses, network worms, Trojan horses Policies communicate required and prohibited activities and behaviors Standards Interpret policies in specific situations Procedures Provide details on how to comply with policies and standards Guidelines

Show more Read less
Institution
Course










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
January 4, 2024
Number of pages
18
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

iSACA Cybersecurity Fundamentals
Certification Exam ALL ANSWERS 100%
CORRECT SPRING FALL-2023/24 EDITION
GUARANTEED GRADE A+

Confidentiality

Protection from unauthorized access

integrity

Protection from unauthorized modification

Availability

protection from disruptions in access

Cybersecurity

the protection of information assets (digital assets) by addressing threats to information processed,
stored, and transported by internetworked information systems

NIST Functions to Protect Digital Assets

IPDRR

1) Identify
2) Protect
3) Detect
4) Respond
5) Recover

Nonrepudiation

Def: ensuring that a message or other piece of information is genuine

Examples: digital signatures and transaction logs

Risk

combination of the probability of an event and its consequences, mitigated through controls

,Threat

Anything that is capable of acting against an asset in a harmful manner

Asset

something of either tangible or intangible value that is worth protecting

Vulnerability

A weakness in the design, implementation, operation or internal control of a process that could expose
the system to adverse threats from threat events

Inherent risk

The risk level or exposure without taking into account the actions that management has taken or might
take (e.g., implementing controls)

Residual risk

the risk that remains after management implements internal controls or some other response to risk

Likelihood

A.K.A probability

measure of frequency of which an event may occur, which depends on the threat and vulnerability

Approaches to Cybersecurity Risk

Dependent on:
1) Risk tolerance
2) Size & scope of the environment
3) Amount of data available

Approaches:
1) Ad hoc
2) Compliance-based
3) Risk-based

Threat Agents

The actors causing the threats that might exploit a vulnerability

Types:
1) Corporations - competitive advantage
2) Cybercriminals - profit
3) Cyberterrorists - critical infrastructures/government
4) Cyberwarriors - politically motivated
5) Employees - revenge
6) Hacktivists - politically motivated

, 7) Nation states - government/private entities
8) Online social hackers - identity theft, profit
9) Script kiddies - learning to hack

Attack vector

The path or route used to gain access to the target (asset)

Types:
1) Ingress - intrusion
2) Egress - Data removal

Attack Attributes

1) Attack Vector
2) Payload
3) Exploit
4) Vulnerability
5) Target (Asset)

Threat Process

1) Perform reconnaissance (gathering information)
2) Create attack tools
3) Deliver malicious capabilities
4) Exploit and compromise
5) Conduct an attack
6) Achieve results
7) Maintain a presence or set of capabilities
8) Coordinate a campaign

Malware

Def: software designed to infiltrate or damage a computer system without the user's informed consent

Examples: Viruses, network worms, Trojan horses

Policies

communicate required and prohibited activities and behaviors

Standards

Interpret policies in specific situations

Procedures

Provide details on how to comply with policies and standards

Guidelines
$14.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Document also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
THEEXCELLENCELIBRARY Harvard University
Follow You need to be logged in order to follow users or courses
Sold
17
Member since
2 year
Number of followers
6
Documents
2641
Last sold
1 month ago
THE EXCELLENCE LIBRARY

The Excellence Library Where Academic Success Begins. Welcome to The Excellence Library — your trusted marketplace for past and upcoming exam papers with verified answers, spanning all academic fields. Whether you're a med student, a future lawyer, a high schooler prepping for finals, or a researcher looking for model dissertations — we've got you covered. What We Offer Accurate & Complete Exam Papers From Medicine, Nursing, Law (Bar Exams), High School subjects, and more. Model Dissertations & Novels Top-tier academic references and full-text materials to guide your writing and study. Affordable & Fair Pricing Quality resources at a price that respects students' budgets. Why Choose Us? Thoroughly Reviewed Answers – Every paper includes clear, correct solutions. Massive Library – Thousands of documents, constantly updated. Academic Excellence, Delivered – We help you prepare smarter, not harder. Fast Delivery – Get what you need, when you need it. Our Goal To empower students and professionals by offering reliable, affordable academic materials — helping you succeed one paper at a time.

Read more Read less
2.5

2 reviews

5
0
4
0
3
1
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions