100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ISC2 - CC SOLUTIONS LATEST EDITION 2023 GUARANTEED GRADE A+ $14.59   Add to cart

Other

ISC2 - CC SOLUTIONS LATEST EDITION 2023 GUARANTEED GRADE A+

 22 views  0 purchase
  • Course
  • ISC2 - CC
  • Institution
  • ISC2 - CC

Application Server A computer responsible for hosting applications to user workstations. NIST SP 800-82 Rev.2 Asymmetric Encryption An algorithm that uses one key to encrypt and a different key to decrypt the input plaintext. Checksum A digit representing the sum of the correct digits in a pie...

[Show more]

Preview 3 out of 18  pages

  • May 29, 2023
  • 18
  • 2022/2023
  • Other
  • Unknown
  • isc2 cc
  • ISC2 - CC
  • ISC2 - CC
avatar-seller
Allan100
ApplicationServer
Acomputerresponsibleforhostingapplicationstouserworkstations.
NISTSP800-82Rev.2
AsymmetricEncryption
Analgorithmthatusesonekeytoencryptandadifferentkeyto
decrypttheinputplaintext.
Checksum
Adigitrepresentingthesumofthecorrectdigitsinapieceof
storedortransmitteddigitaldata,againstwhichlatercomparisons
canbemadetodetecterrorsinthedata.
Ciphertext
Thealteredformofaplaintextmessagesoitisunreadablefor
anyoneexcepttheintendedrecipients.Inotherwords,ithasbeen
turnedintoasecret.
Classification
Classificationidentifiesthedegreeofharmtotheorganization,its
stakeholdersorothersthatmightresultifaninformationassetis
divulgedtoanunauthorizedperson,processororganization.Inshort,
classificationisfocusedfirstandforemostonmaintainingthe
confidentialityofthedata,basedonthedatasensitivity.
Configurationmanagement
Aprocessanddisciplineusedtoensurethattheonlychangesmadeto
asystemarethosethathavebeenauthorizedandvalidated.
Cryptanalyst
Onewhoperformscryptanalysiswhichisthestudyofmathematical
techniquesforattemptingtodefeatcryptographictechniquesand/or
informationsystemssecurity.Thisincludestheprocessoflooking
forerrorsorweaknessesintheimplementationofanalgorithmorof
thealgorithmitself.
Cryptography
Thestudyorapplicationsofmethodstosecureorprotectthemeaning
andcontentofmessages,files,orotherinformation,usuallyby
disguise,obscuration,orothertransformationsofthatcontentand
meaning.
DataLossPrevention(DLP)
Systemcapabilitiesdesignedtodetectandpreventtheunauthorized
useandtransmissionofinformation.
Decryption Thereverseprocessfromencryption.Itistheprocessofconverting
aciphertextmessagebackintoplaintextthroughtheuseofthe
cryptographicalgorithmandtheappropriatekeyfordecryption(which
isthesameforsymmetricencryption,butdifferentforasymmetric
encryption).Thistermisalsousedinterchangeablywiththe
"deciphering."
Degaussing
Atechniqueoferasingdataondiskortape(includingvideotapes)
that,whenperformedproperly,ensuresthatthereisinsufficient
magneticremanencetoreconstructdata.
DigitalSignature
Theresultofacryptographictransformationofdatawhich,when
properlyimplemented,providestheservicesoforiginauthentication,
dataintegrity,andsignernon-repudiation.NISTSP800-12Rev.1
EgressMonitoring
Monitoringofoutgoingnetworktraffic.
Encryption
Theprocessandactofconvertingthemessagefromitsplaintextto
ciphertext.Sometimesitisalsoreferredtoasenciphering.Thetwo
termsaresometimesusedinterchangeablyinliteratureandhave
similarmeanings.
EncryptionSystem
Thetotalsetofalgorithms,processes,hardware,software,and
proceduresthattakentogetherprovideanencryptionanddecryption
capability.
Hardening
Areferencetotheprocessofapplyingsecureconfigurations(to
reducetheattacksurface)andlockingdownvarioushardware,
communicationssystems,andsoftware,includingoperatingsystem,web
server,applicationserver,application,etc.Hardeningisnormally
performedbasedonindustryguidelinesandbenchmarks,suchasthose
providedbytheCenterforInternetSecurity(CIS).
HashFunction
Analgorithmthatcomputesanumericalvalue(calledthehashvalue)
onadatafileorelectronicmessagethatisusedtorepresentthat
fileormessageanddependsontheentirecontentsofthefileor
message.Ahashfunctioncanbeconsideredtobeafingerprintofthe
fileormessage.NISTSP800-152
Hashing
Theprocessofusingamathematicalalgorithmagainstdatatoproduce
anumericvaluethatisrepresentativeofthatdata.SourceCNSSI
4009-2015
InformationSharing TherequirementsforinformationsharingbyanITsystemwithoneor
moreotherITsystemsorapplications,forinformationsharingto
supportmultipleinternalorexternalorganizations,missions,or
publicprograms.NISTSP800-16
IngressMonitoring
Monitoringofincomingnetworktraffic.
MessageDigest
Adigitalsignaturethatuniquelyidentifiesdataandhasthe
propertysuchthatchangingasinglebitinthedatawillcausea
completelydifferentmessagedigesttobegenerated.NISTIR-8011
Vol.3
OperatingSystem
Thesoftware"mastercontrolapplication"thatrunsthecomputer.It
isthefirstprogramloadedwhenthecomputeristurnedon,andits
maincomponent,thekernel,residesinmemoryatalltimes.The
operatingsystemsetsthestandardsforallapplicationprograms
(suchastheWebserver)thatruninthecomputer.Theapplications
communicatewiththeoperatingsystemformostuserinterfaceand
filemanagementoperations.NISTSP800-44Version2
Patch
Asoftwarecomponentthat,wheninstalled,directlymodifiesfilesor
devicesettingsrelatedtoadifferentsoftwarecomponentwithout
changingtheversionnumberorreleasedetailsfortherelated
softwarecomponent.Source:ISO/IEC19770-2
PatchManagement
Thesystematicnotification,identification,deployment,installation
andverificationofoperatingsystemandapplicationsoftwarecode
revisions.Theserevisionsareknownaspatches,hotfixes,and
servicepacks.Source:CNSSI4009
Plaintext
Amessageordatainitsnaturalformatandinreadableform;
extremelyvulnerablefromaconfidentialityperspective.
Records
Therecordings(automatedand/ormanual)ofevidenceofactivities
performedorresultsachieved(e.g.,forms,reports,testresults),
whichserveasabasisforverifyingthattheorganizationandthe
informationsystemareperformingasintended.Alsousedtoreferto
unitsofrelateddatafields(i.e.,groupsofdatafieldsthatcanbe
accessedbyaprogramandthatcontainthecompletesetof
informationonparticularitems).NISTSP800-53Rev.4
RecordsRetention
Apracticebasedontherecordslifecycle,accordingtowhich
recordsareretainedaslongasnecessary,andthenaredestroyed
aftertheappropriatetimeintervalhaselapsed.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Allan100. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.59. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75759 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.59
  • (0)
  Add to cart