Info Sec Final Study Guide

Ace your homework & exams now with Quizwiz!

Data export, denial of availability, data modification, and launch point

Four main purposes of an attack

Education

Integrate skills and competencies into a common body of knowledge

Certified Information Systems Security Professional (CISSP)

a certification considered the flagship (ISC)2 certification and the gold standard for information security professionals

Awareness

a continuous process to help keep all personnel vigilant

Remote Access Tool (RAT)

allows an attacker to remotely control a compromised computer

(ISC)2 Systems Security Certified Practitioner (SSCP)

covers seven domains of best practices for information security

Federal Information Security Management Act (FISMA) of 2014

defines the roles, responsibilities, accountabilities, requirements, and practices that are needed to fully implement security controls and requirements

CompTIA Security+

entry level security certification

Certified information Systems Auditor (CISA)

focuses on information systems audit, control, and security professionals

RSA

global provider of security, risk, and compliance solutions for enterprise environments

rootkits

it is common for ________ to modify parts of the operating system to conceal traces of their presence

professional development

meet a standard by applying evaluation or measurement criteria

Certified Internet Webmaster (CIW

offers several credentials that focus on both general and web related security

SOX Section 404

requires an organization's executive officers to establish, maintain, review, and report on the effectiveness of the company's internal controls over financial reporting (ICFR)

CNSS Training Standard CNSS-4016

risk analysts

ISO 27002

security standard that helps guide the creation of an organization's security policy

hands on skills

security training programs typically differ from security education programs in their focus on _________

Chief Information Security Officer (CISO)

senior official in charge of information security

training

teach necessary security skills and competency to the staff as a whole as well as those whose jobs are in IT

Slow viruses

this virus counters the ability of an antivirus program to detect changes in infected files


Related study sets

MGMT-Leadership: Midterm Chapters 1-7

View Set

Chapter 10: The Appendicular Skeleton Pre-Lab Quiz

View Set

The Imperative -AR Verbs (Commands) If familiar with person use the 3rd person singular

View Set

German I - Forms of "sein", "haben", & "werden"

View Set

Unit 5 - Maternity PreU from Ricci: Essentials of Maternity, Newborn, and Women's Health Nursing, Fifth Edition

View Set

Chapter 24, The Child with Renal Dysfunction

View Set