Chapters 1-3
Chapters 4-6
Chapters 7-9
Chapters 10-12
Bonus!
100

C.I.A. stands for

confidentiality, integrity, and availability

100

these are more detailed than policies and describe the steps that must be taken to conform with the policies

standards 

100

the release of ambient static electricity into a ground.

electrostatic discharge

100

A method of regulating the modification of systems within the
organization by requiring formal review and approval for each change.

change control

100

A significant revision of a version from its previous state.

major release

200

name the emerging accelerated development models that merge development and operational skills

DevOps OR DevSecOps OR SecDevOps... Something ops for sure... 

200

Specifications of authorization that govern the rights and privileges of users to a particular information asset.

access control list

200

an electromechanical device that automatically releases the lock protecting a control point if a power outage occurs. This type of lock is used for fire
safety locations.

fail-safe lock

200

A specific point in the project plan when a task that has a noticeable impact on
the plan’s progress is complete.

milestone

200

The processes of removing or repairing flaws in information assets that
cause a vulnerability or removing the risk associated with the vulnerability.

remediation

300

this word means any events or circumstances that have the potential to adversely affect operations and assets 

threats

300

a combination of hardware and software that filters or prevents specific information from moving between the outside network and the inside network.

firewall

300

a small room or enclosure with separate entry and exit points, designed to restrain a person who fails an access authorization attempt

mantrap

300

A list of the tasks to be accomplished in the project,
the skill sets or individual employees needed to perform the tasks, the start and end dates
for tasks, the estimated resources required, and the dependencies among tasks.

work breakdown structure

300

The use of mobile scanning techniques to identify open wireless access
points.

war driving

400

these are formally adopted rules for acceptable behavior in modern society 

laws

400

A private, secure network operated over a public and insecure network

VPN

400

a space between the ceiling in one level of a commercial building and the
floor of the level above.

plenum

400

Sworn testimony that certain facts are in the possession of an investigating
officer and that they warrant the examination of specific items located at a specific place.

affadavit

400

A type of rehearsal that seeks to realistically simulate the circumstances
needed to thoroughly test a plan.

war game

500

As part of an effort to encourage ethical behavior, many professional organizations have established these

codes of conduct or codes of ethics 

500

A strategy to gain assurance that the users of a network do not send high value information or other critical information outside the network

DLP

500

the process of gaining unauthorized entry into a facility by closely
following another person through an entrance and using the credentials of the
authorized person to bypass a control point.

tailgating

500

Investigations that involve the preservation, identification, extraction,
documentation, and interpretation of computer media for evidentiary and root cause
analysis.

digital forensics

500

Permission to search for evidentiary material at a specified location
and/or to seize items to return to an investigator’s lab for examination.

search warrant

M
e
n
u