SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Third Edition
Rate it:
Open Preview
7%
Flag icon
The three primary goals of an information security program are to prevent the loss of confidentiality, the loss of integrity, and the loss of availability for any IT systems and data.
8%
Flag icon
Personally identifiable information (PII) is information that identifies an individual and includes items such as the person’s name, national identification number such as the U.S. Social Security number, and birthdate.
8%
Flag icon
Protected health information (PHI) is any information about an individual’s medical and health history.
8%
Flag icon
A defense in depth strategy provides a layered approach to security by implementing multiple controls at different layers.
8%
Flag icon
Nonrepudiation ensures that a party cannot believably deny (or repudiate) taking an action. Audit logging and digital signatures are two common methods used to enforce nonrepudiation.
8%
Flag icon
Authentication provides identification for users, and accounting tracks their activities in audit logs.
8%
Flag icon
Due diligence refers to the investigative steps that an organization takes prior to taking on something new, such as signing a contract or making a major purchase.
8%
Flag icon
Management is responsible for any losses that occur because of residual risk.
9%
Flag icon
Hashing
9%
Flag icon
Audit logs
9%
Flag icon
Defense in depth provides a layered approach to security and protects an organization even if one or more security elements fail.
10%
Flag icon
Something you are (type 3)
10%
Flag icon
written password policy
10%
Flag icon
Passwords are the least secure method of authentication;
10%
Flag icon
Don’t write down passwords
10%
Flag icon
Users should be encouraged to create passphrases
11%
Flag icon
The HOTP protocol creates asynchronous dynamic passwords.
11%
Flag icon
One-time Password In Everything (OPIE)
11%
Flag icon
Iris   The area surrounding the eye’s pupil is the iris, which is almost as unique as the retina. Iris scans are more acceptable to users because they don’t require physical contact and cameras can take pictures of the iris from a distance. However, lighting can affect the accuracy of an iris scan, and some iris scanners can be tricked with a high-quality picture.
11%
Flag icon
With single sign-on (SSO), a user authenticates once and then the system uses the same credentials for the entire session.
11%
Flag icon
not the user’s password.
12%
Flag icon
encrypts a time-stamped ticket-granting ticket (TGT) with a separate key,
12%
Flag icon
decrypts the symmetric key with a hash of its password.
12%
Flag icon
also provides an encrypted symmetric key that systems use to encrypt information between the client and the target server.
12%
Flag icon
Identity provider
12%
Flag icon
authentication
12%
Flag icon
OAuth
12%
Flag icon
OpenID Connect.
12%
Flag icon
OAuth 2.0
12%
Flag icon
TIP    Kerberos, SAML, OAuth, and OpenIDConnect each provide SSO capabilities. With SSO, users only have to log on once and then use the same credentials to access multiple resources.
13%
Flag icon
Non-Discretionary Access Control
13%
Flag icon
Role-based Access Control
13%
Flag icon
Rule-based Access Control
13%
Flag icon
Simple security property rule—no read up
13%
Flag icon
integrity
13%
Flag icon
Biba is a MAC model that uses the no read down and no write up rules to enforce integrity. Integrity protects against unauthorized data modifications.
13%
Flag icon
The certification rules are integrity-monitoring rules, and the enforcement rules are integrity-preserving rules.
14%
Flag icon
Provisioning refers to creating accounts for users and granting them access to appropriate resources.
14%
Flag icon
HMAC-based One-Time Password (HOTP).
14%
Flag icon
One-time Password In Everything (OPIE),
14%
Flag icon
RBAC model
14%
Flag icon
The MAC model provides the highest level of security when compared to DAC and RBAC models.
14%
Flag icon
labels,
18%
Flag icon
DHCP uses UDP ports 67 and 68.
18%
Flag icon
ARP resolves IP addresses to physical or hardware addresses (MAC addresses).
18%
Flag icon
Berkeley Internet Name Domain (BIND) is a version of DNS software that runs on UNIX systems.
19%
Flag icon
•  Authentication Header (AH)
20%
Flag icon
personal area networks (PANs).
21%
Flag icon
passive (without a battery).
21%
Flag icon
Two important protocols operate on the Transport layer (layer 4). They are TCP and UDP.
« Prev 1 3 4 5