
CCISO Certified Chief Information Security Officer All-in-One Exam Guide

Information security risk management programs generally have three components: Approach, Process, and Method.
Jordan Genung • CCISO Certified Chief Information Security Officer All-in-One Exam Guide
Trojan A virus disguised as something useful
Jordan Genung • CCISO Certified Chief Information Security Officer All-in-One Exam Guide
The structure of the information security organization should be the one that best fits the organization as a whole.
Jordan Genung • CCISO Certified Chief Information Security Officer All-in-One Exam Guide
Two frequently used quantitative methods are Single Loss Expectancy and Annualized Loss Expectancy.
Jordan Genung • CCISO Certified Chief Information Security Officer All-in-One Exam Guide
Vulnerability-specific attacks Exploiting buffer overflows or other software defects
Jordan Genung • CCISO Certified Chief Information Security Officer All-in-One Exam Guide
Malware Software that intentionally is harmful or malicious
Jordan Genung • CCISO Certified Chief Information Security Officer All-in-One Exam Guide
Fake websites Used for harvesting sensitive information (credentials)