100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CISSP 2024 Terms with questions and answers

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
08-02-2025
Written in
2024/2025

cissp 2024 terms with questions and answersprivacy impact analysisconflicting laws laws

Institution
CISSP - Certified Information Systems Security Professional
Course
CISSP - Certified Information Systems Security Professional









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISSP - Certified Information Systems Security Professional
Course
CISSP - Certified Information Systems Security Professional

Document information

Uploaded on
February 8, 2025
Number of pages
8
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

08/02/2025 14:46:46


CISSP 2024 Terms
Privacy Impact Analysis
Designed to identify the privacy of data being collected, processed, or stored by the
system and assesses the effects of a data breach. Required for GDPR and HIPAA
Conflicting Laws
When an organization or cloud provider is subject to the laws from different
jurisdictions. Example is GDPR vs the CLOUD act.
Laws
Legal rules created by government entities, such as legislatures
Regulations
The rules that are created by government agencies
Standards
Dictate a reasonable level of performance. Can be created by an organization for its
own purposes or come from industry bodies or trade groups.
Frameworks
A set of guidelines helping organizations improve their security posture
External Dependencies
Entities outside the organization that it depends on for business continuity, disaster
recovery, or operations
Hardware Root of Trust
A line of defense against executing unauthorized firmware on a system, used for key
store for Full-Disk encryption. Verifies that keys match before the secure boot
process takes place.
Physically Unclonable Function
A hardware component that generates a digital fingerprint or signatures based on the
unique physical characteristics of an integrated circuit or chip. Responds with a
unique output that is impossible to clone or recreate.
Software Bill of Materials (SBOM)
A list of all software products, libraries, and modules that go into a particular software
build or product. A US gov't requirement
Secure Access Service Edge (SASE)
A design philosophy closely related to Zero Trust which brings together networking
and security functions and delivers them as an integrated cloud service

A networking model that merges WAN and security in the cloud.
FIPS 140-2
Established to aid in the protection of digitally stored unclassified, yet sensitive
information. Developed for non-military American government agencies and
government contractors.
FIPS 140-2 Levels
1: Lowest Level of Security

2: Specifies the security requirements for cryptographic modules that protect
sensitive information

3. Requires physical protections to ensure any attempts to tamper are evident and
detectable

, 08/02/2025 14:46:46


FIPS 140-3
A regulation outlining data collection and handling standards. Superseeds FIPS 140-
2
FIPS 140-3 Levels
1: Requires production-grade equipment and externally tested algorithms

2: Adds requirements for physical taper-evidence and role-based authentication

3: Adds requirements for physical tamper resistance, identity-based authentication,
and separation between interfaces

4: Physical requirements are stringent, requiring the ability to be tamper-active,
erasing the contents of the device if it detects various forms of environmental
attacks.
FIPS 140-3 Three Types of Cryptographic Modules
1. Physical
2. Software
3. Cloud
Level of Protection
Used in key management. Encrypti nkeys must be secured at the same level of
control or higher as the data they protect.

Dictated by the sensitivity level of data.
Key Recovery
Circumstances where you need to recover a key for a particular user, without the
user's cooperation
Key Escrow
Copies of a key are held by a trusted third party
Key Management Lifecycle
1. Generation
2. Distribution
3. Storage
4. Use
5. Revocation
6. Destruction
Quantum Key Distribution
A secure communication method that involve quantum mechanics that enables two
parties to generate a shared random key known only to them.

Detects quantum anomalies that helps intercept eavesdroppers.
Quantum Key Distribution Use
Relies on having an authenticated classical channel of communication where keys
have already been exchanged. Used to distribute a key and used in commercial
solutions where initial keys are distributed by courier.
Information System Lifecycle
A structured framework for managing an information system from its initial
conception to its eventual retirement
Information System Lifecycle Steps
1. Stakeholders needs and requirements
2. Requirements analysis
$10.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
membafrancis1

Get to know the seller

Seller avatar
membafrancis1 Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
10 months
Number of followers
0
Documents
120
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions