100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

CISSP 2024 Terms with questions and answers

Beoordeling
-
Verkocht
-
Pagina's
8
Cijfer
A+
Geüpload op
08-02-2025
Geschreven in
2024/2025

cissp 2024 terms with questions and answersprivacy impact analysisconflicting laws laws

Instelling
CISSP - Certified Information Systems Security Professional
Vak
CISSP - Certified Information Systems Security Professional









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
CISSP - Certified Information Systems Security Professional
Vak
CISSP - Certified Information Systems Security Professional

Documentinformatie

Geüpload op
8 februari 2025
Aantal pagina's
8
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

08/02/2025 14:46:46


CISSP 2024 Terms
Privacy Impact Analysis
Designed to identify the privacy of data being collected, processed, or stored by the
system and assesses the effects of a data breach. Required for GDPR and HIPAA
Conflicting Laws
When an organization or cloud provider is subject to the laws from different
jurisdictions. Example is GDPR vs the CLOUD act.
Laws
Legal rules created by government entities, such as legislatures
Regulations
The rules that are created by government agencies
Standards
Dictate a reasonable level of performance. Can be created by an organization for its
own purposes or come from industry bodies or trade groups.
Frameworks
A set of guidelines helping organizations improve their security posture
External Dependencies
Entities outside the organization that it depends on for business continuity, disaster
recovery, or operations
Hardware Root of Trust
A line of defense against executing unauthorized firmware on a system, used for key
store for Full-Disk encryption. Verifies that keys match before the secure boot
process takes place.
Physically Unclonable Function
A hardware component that generates a digital fingerprint or signatures based on the
unique physical characteristics of an integrated circuit or chip. Responds with a
unique output that is impossible to clone or recreate.
Software Bill of Materials (SBOM)
A list of all software products, libraries, and modules that go into a particular software
build or product. A US gov't requirement
Secure Access Service Edge (SASE)
A design philosophy closely related to Zero Trust which brings together networking
and security functions and delivers them as an integrated cloud service

A networking model that merges WAN and security in the cloud.
FIPS 140-2
Established to aid in the protection of digitally stored unclassified, yet sensitive
information. Developed for non-military American government agencies and
government contractors.
FIPS 140-2 Levels
1: Lowest Level of Security

2: Specifies the security requirements for cryptographic modules that protect
sensitive information

3. Requires physical protections to ensure any attempts to tamper are evident and
detectable

, 08/02/2025 14:46:46


FIPS 140-3
A regulation outlining data collection and handling standards. Superseeds FIPS 140-
2
FIPS 140-3 Levels
1: Requires production-grade equipment and externally tested algorithms

2: Adds requirements for physical taper-evidence and role-based authentication

3: Adds requirements for physical tamper resistance, identity-based authentication,
and separation between interfaces

4: Physical requirements are stringent, requiring the ability to be tamper-active,
erasing the contents of the device if it detects various forms of environmental
attacks.
FIPS 140-3 Three Types of Cryptographic Modules
1. Physical
2. Software
3. Cloud
Level of Protection
Used in key management. Encrypti nkeys must be secured at the same level of
control or higher as the data they protect.

Dictated by the sensitivity level of data.
Key Recovery
Circumstances where you need to recover a key for a particular user, without the
user's cooperation
Key Escrow
Copies of a key are held by a trusted third party
Key Management Lifecycle
1. Generation
2. Distribution
3. Storage
4. Use
5. Revocation
6. Destruction
Quantum Key Distribution
A secure communication method that involve quantum mechanics that enables two
parties to generate a shared random key known only to them.

Detects quantum anomalies that helps intercept eavesdroppers.
Quantum Key Distribution Use
Relies on having an authenticated classical channel of communication where keys
have already been exchanged. Used to distribute a key and used in commercial
solutions where initial keys are distributed by courier.
Information System Lifecycle
A structured framework for managing an information system from its initial
conception to its eventual retirement
Information System Lifecycle Steps
1. Stakeholders needs and requirements
2. Requirements analysis
€9,20
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
membafrancis1

Maak kennis met de verkoper

Seller avatar
membafrancis1 Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
0
Lid sinds
11 maanden
Aantal volgers
0
Documenten
120
Laatst verkocht
-

0,0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen