🔥 40% Off Crucial Exams Memberships — This Week Only

2 days, 13 hours remaining!
Bash, the Crucial Exams Chat Bot
AI Bot

SSCP - Security Operations and Administration  Flashcards

ISC2 Systems Security Certified Practitioner (SSCP) Flashcards

Separation of Duties
Dividing tasks among multiple people to prevent fraud or errors
A documented process for restoring IT operations after a disruption
Ongoing review of system logs to identify and respond to anomalies
Disaster Recovery Plan
Data Classification
Incident Response Steps
Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned
Categorizing data based on its sensitivity and impact on the organization
Log Monitoring
Zero Trust Model
Security principle of not automatically trusting anyone inside or outside the network
FrontBack
Acceptable Use Policy (AUP)Rules outlining the proper use of organization systems and data
Backup StrategiesMethods for creating copies of data, such as full, incremental, or differential backups
Business Continuity Plan (BCP)A strategy for ensuring essential functions continue during disasters
Change Management ProcessA standardized approach to handling changes in IT systems to minimize impact
CIA TriadThe core principles of security: Confidentiality, Integrity, Availability
Data ClassificationCategorizing data based on its sensitivity and impact on the organization
Defense-in-DepthImplementing multiple layers of security controls to protect assets
Disaster Recovery PlanA documented process for restoring IT operations after a disruption
EncryptionProcess of converting data into a secure format to prevent unauthorized access
Incident Response Plan (IRP)A documented approach to identifying, managing, and mitigating incidents
Incident Response StepsPreparation, Identification, Containment, Eradication, Recovery, Lessons Learned
Log MonitoringOngoing review of system logs to identify and respond to anomalies
Multifactor Authentication (MFA)Security mechanism combining two or more authentication factors
Password Policy Best PracticesEnforce strong passwords, set expiration dates, and prevent reuse
Patch ManagementRegular updating of systems to fix vulnerabilities and improve performance
Personnel SecuritySteps to minimize insider threats through background checks and training
Principle of Least PrivilegeLimiting user access rights to only what is necessary for their job roles
Risk AssessmentProcess of identifying, analyzing, and evaluating risks to assets
Role-Based Access Control (RBAC)Access control model based on users’ roles and responsibilities
Security Awareness TrainingEducating employees about security threats and best practices
Security PolicyA set of rules and practices that regulate how organizational assets are protected
Separation of DutiesDividing tasks among multiple people to prevent fraud or errors
Vulnerability AssessmentThe process of identifying, quantifying, and prioritizing system vulnerabilities
Zero Trust ModelSecurity principle of not automatically trusting anyone inside or outside the network
Front
Incident Response Steps
Click the card to flip
Back
Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned
Front
Backup Strategies
Back
Methods for creating copies of data, such as full, incremental, or differential backups
Front
Business Continuity Plan (BCP)
Back
A strategy for ensuring essential functions continue during disasters
Front
Role-Based Access Control (RBAC)
Back
Access control model based on users’ roles and responsibilities
Front
Principle of Least Privilege
Back
Limiting user access rights to only what is necessary for their job roles
Front
Encryption
Back
Process of converting data into a secure format to prevent unauthorized access
Front
Zero Trust Model
Back
Security principle of not automatically trusting anyone inside or outside the network
Front
Incident Response Plan (IRP)
Back
A documented approach to identifying, managing, and mitigating incidents
Front
CIA Triad
Back
The core principles of security: Confidentiality, Integrity, Availability
Front
Defense-in-Depth
Back
Implementing multiple layers of security controls to protect assets
Front
Risk Assessment
Back
Process of identifying, analyzing, and evaluating risks to assets
Front
Acceptable Use Policy (AUP)
Back
Rules outlining the proper use of organization systems and data
Front
Separation of Duties
Back
Dividing tasks among multiple people to prevent fraud or errors
Front
Log Monitoring
Back
Ongoing review of system logs to identify and respond to anomalies
Front
Multifactor Authentication (MFA)
Back
Security mechanism combining two or more authentication factors
Front
Disaster Recovery Plan
Back
A documented process for restoring IT operations after a disruption
Front
Vulnerability Assessment
Back
The process of identifying, quantifying, and prioritizing system vulnerabilities
Front
Patch Management
Back
Regular updating of systems to fix vulnerabilities and improve performance
Front
Security Policy
Back
A set of rules and practices that regulate how organizational assets are protected
Front
Change Management Process
Back
A standardized approach to handling changes in IT systems to minimize impact
Front
Data Classification
Back
Categorizing data based on its sensitivity and impact on the organization
Front
Password Policy Best Practices
Back
Enforce strong passwords, set expiration dates, and prevent reuse
Front
Security Awareness Training
Back
Educating employees about security threats and best practices
Front
Personnel Security
Back
Steps to minimize insider threats through background checks and training
1/24
This deck focuses on day-to-day security operations, best practices for administrative tasks, and incident response protocols critical to SSCP knowledge.
Share on...
Follow us on...