Info Sec Final Study Guide
Data export, denial of availability, data modification, and launch point
Four main purposes of an attack
Education
Integrate skills and competencies into a common body of knowledge
Certified Information Systems Security Professional (CISSP)
a certification considered the flagship (ISC)2 certification and the gold standard for information security professionals
Awareness
a continuous process to help keep all personnel vigilant
Remote Access Tool (RAT)
allows an attacker to remotely control a compromised computer
(ISC)2 Systems Security Certified Practitioner (SSCP)
covers seven domains of best practices for information security
Federal Information Security Management Act (FISMA) of 2014
defines the roles, responsibilities, accountabilities, requirements, and practices that are needed to fully implement security controls and requirements
CompTIA Security+
entry level security certification
Certified information Systems Auditor (CISA)
focuses on information systems audit, control, and security professionals
RSA
global provider of security, risk, and compliance solutions for enterprise environments
rootkits
it is common for ________ to modify parts of the operating system to conceal traces of their presence
professional development
meet a standard by applying evaluation or measurement criteria
Certified Internet Webmaster (CIW
offers several credentials that focus on both general and web related security
SOX Section 404
requires an organization's executive officers to establish, maintain, review, and report on the effectiveness of the company's internal controls over financial reporting (ICFR)
CNSS Training Standard CNSS-4016
risk analysts
ISO 27002
security standard that helps guide the creation of an organization's security policy
hands on skills
security training programs typically differ from security education programs in their focus on _________
Chief Information Security Officer (CISO)
senior official in charge of information security
training
teach necessary security skills and competency to the staff as a whole as well as those whose jobs are in IT
Slow viruses
this virus counters the ability of an antivirus program to detect changes in infected files