Bash, the Crucial Exams Chat Bot
AI Bot

SSCP - Security Operations and Administration  Flashcards

ISC2 Systems Security Certified Practitioner (SSCP) Flashcards

FrontBack
Acceptable Use Policy (AUP)Rules outlining the proper use of organization systems and data
Backup StrategiesMethods for creating copies of data, such as full, incremental, or differential backups
Business Continuity Plan (BCP)A strategy for ensuring essential functions continue during disasters
Change Management ProcessA standardized approach to handling changes in IT systems to minimize impact
CIA TriadThe core principles of security: Confidentiality, Integrity, Availability
Data ClassificationCategorizing data based on its sensitivity and impact on the organization
Defense-in-DepthImplementing multiple layers of security controls to protect assets
Disaster Recovery PlanA documented process for restoring IT operations after a disruption
EncryptionProcess of converting data into a secure format to prevent unauthorized access
Incident Response Plan (IRP)A documented approach to identifying, managing, and mitigating incidents
Incident Response StepsPreparation, Identification, Containment, Eradication, Recovery, Lessons Learned
Log MonitoringOngoing review of system logs to identify and respond to anomalies
Multifactor Authentication (MFA)Security mechanism combining two or more authentication factors
Password Policy Best PracticesEnforce strong passwords, set expiration dates, and prevent reuse
Patch ManagementRegular updating of systems to fix vulnerabilities and improve performance
Personnel SecuritySteps to minimize insider threats through background checks and training
Principle of Least PrivilegeLimiting user access rights to only what is necessary for their job roles
Risk AssessmentProcess of identifying, analyzing, and evaluating risks to assets
Role-Based Access Control (RBAC)Access control model based on users’ roles and responsibilities
Security Awareness TrainingEducating employees about security threats and best practices
Security PolicyA set of rules and practices that regulate how organizational assets are protected
Separation of DutiesDividing tasks among multiple people to prevent fraud or errors
Vulnerability AssessmentThe process of identifying, quantifying, and prioritizing system vulnerabilities
Zero Trust ModelSecurity principle of not automatically trusting anyone inside or outside the network
This deck focuses on day-to-day security operations, best practices for administrative tasks, and incident response protocols critical to SSCP knowledge.
Share on...
Follow us on...