ISC2 CC – Domain 5 Guide: Learn Cryptography, Data Handling, Security Controls, and Social Engineering the Smart Way

Overview

Domain 5 focuses on the practical aspects of information security, such as Cryptography, Data Handling, Security Controls, and Social Engineering.

It discusses data protection, secure system management, access control, and how attackers take advantage of human behavior. These are the controls and concepts that security experts apply on a daily basis.
This guide clearly defines each major term and contextualizes it so that you understand its purpose, strengths, and limitations.

Cryptography

  1. Cryptography Fundamentals
Cryptology, Cryptography, and Cryptanalysis
  • Cryptology
    The overall field of secure communication. It includes both creating and breaking encryption.
  • Cryptography
    The practice of protecting information by transforming it so its meaning is hidden from unauthorized parties.
  • Cryptanalysis
    The process of breaking encryption by using mathematics, logic, or weaknesses in how the encryption is implemented.
Cipher

A cipher is an algorithm used to encrypt or decrypt data. It defines how plaintext is transformed into ciphertext and back again.

Plaintext vs. Ciphertext
  • Plaintext (Cleartext)
    Data in its original, readable form.
  • Ciphertext
    Encrypted data that appears unreadable without the correct key.
Encryption vs. Decryption
  • Encryption converts plaintext into ciphertext.
  • Decryption converts ciphertext back into plaintext.
  1. Symmetric, Asymmetric, and Hybrid Encryption
cryptography
Symmetric Encryption
  • Uses a single shared key for both encryption and decryption.
  • Advantages: Fast and strong per bit.
  • Disadvantages: Requires secure key sharing and does not scale well.
Key Management Issue

For n users, symmetric encryption requires:
n(n − 1) / 2 keys

This quickly becomes unmanageable in large environments.

Asymmetric Encryption
  • Uses a public key and a private key.
  • The public key encrypts data.
  • The private key decrypts data.

Advantages

  • No need to pre-share secrets.

Disadvantages

  • Slower and computationally expensive.
  • Weaker per bit compared to symmetric encryption.
Hybrid Encryption

Hybrid systems combine both approaches:

  • Asymmetric encryption is used to securely exchange a session key.
  • Symmetric encryption is used for the actual data transfer.

This provides both security and performance and is how modern systems operate.

  1. Hashing and Integrity
Hash
Hash Functions

A hash function is a one-way mathematical function that converts data into a fixed-length value called a hash or message digest.

Key characteristics:

  • Used to verify data integrity.
  • Even a tiny change in input creates a completely different hash.
  • Collisions (two inputs producing the same hash) are rare but possible.

Hashing does not provide confidentiality. It ensures data has not been altered.

  1. Attacks on Cryptography
Key Theft

Attackers often bypass encryption entirely by stealing keys, passwords, or certificates.

Brute-Force Attacks

The attacker tries every possible key until the correct one is found. This attack works against all key-based systems except the one-time pad.

Key Stretching

Key stretching intentionally slows password verification, often by 1–2 seconds, making large-scale brute-force attacks impractical.

Man-in-the-Middle (MITM)

An attacker secretly intercepts and possibly alters communication between two parties without their knowledge.

Side-Channel Attacks

Instead of attacking the algorithm, these attacks analyze physical characteristics such as:

  • Timing
  • Power usage
  • CPU activity
  • Electromagnetic emissions
  1. Data Handling, Classification, and Destruction
Data Handling

Sensitive data should only be accessed by authorized individuals, and all access should be logged and monitored.

Data Storage

Data must be stored in secure locations with:

  • Access controls
  • Environmental protections
  • Monitoring
Data Retention

Data must be kept:

  • As long as required for business needs, or
  • As long as required by regulation (such as HIPAA or PCI-DSS), whichever is longer.
Paper Disposal

Cross-cut shredding is recommended. Straight-cut shredding can often be reconstructed.

Digital Data Disposal Methods
  • Deleting
    Removes file references only; data remains recoverable.
  • Formatting
    Rebuilds the file system; data may still be recovered.
  • Overwriting (Clearing)
    Writes zeros or random data to storage locations.
  • Sanitization
    Makes data recovery infeasible for the defined threat level.
  • Purging
    Prevents recovery even using forensic lab techniques.
  • Degaussing
    Uses a strong magnetic field to erase magnetic media, destroying the device.
  • Physical Destruction
    Shredding, crushing, or incineration. This is the most secure and final method.
  1. The Information Life Cycle
  1. Data Acquisition
    Data is created or collected and stored.
  2. Data Use
    Confidentiality, integrity, and availability must be maintained.
  3. Data Archival
    Data is stored for long-term or future use.
  4. Data Disposal
    Data is destroyed when no longer needed.
  1. Configuration, Patch, and Change Management
Configuration Management

Systems should be hardened before deployment by:

  • Closing unused ports
  • Disabling unnecessary services
  • Removing default accounts
  • Scanning for vulnerabilities
  • Using hardened images
  • Monitoring configuration changes
Patch Management

Regularly applying updates to:

  • Operating systems
  • Network devices
  • IoT devices
  • Storage systems

This reduces known vulnerabilities.

Change Management

A formal process to control modifications:

  1. Identify the change
  2. Propose the change
  3. Assess risk
  4. Obtain approval
  5. Test
  6. Schedule
  7. Notify stakeholders
  8. Implement
  9. Perform post-implementation review
  1. Access Controls
Access Control Categories
  • Administrative (Directive)
    Policies, procedures, and standards.
  • Technical
    Firewalls, encryption, authentication systems.
  • Physical
    Locks, guards, cameras, fences.
Access Control Types
  • Preventative – Stop incidents before they occur
  • Detective – Identify incidents
  • Corrective – Fix issues
  • Recovery – Restore systems and data
  • Deterrent – Discourage attacks
  • Compensating – Alternate controls when primary controls are not possible
  1. Information Security Governance
Policies (Mandatory Controls)

Common examples include:

  • Acceptable Use Policy (AUP)
  • Bring Your Own Device (BYOD) Policy
  • Privacy Policy
  • Password Policy
Data States
  • Data at Rest – Stored data
  • Data in Motion – Data being transmitted
  • Data in Use – Actively processed data (cannot be encrypted)
Security Awareness vs. Training
  • Training builds knowledge and skills.
  • Awareness changes behavior and reduces real-world risk.
  1. Social Engineering and Human Attacks
What Is Social Engineering?

Social engineering manipulates people into bypassing technical controls.

Common Psychological Techniques
  • Authority
  • Intimidation
  • Social proof
  • Scarcity
  • Urgency
  • Familiarity
Social Engineering Attack Types
  • Phishing – Mass emails targeting many users
  • Spear Phishing – Targeted attacks against specific individuals
  • Whaling – Spear phishing aimed at executives
  • Vishing – Voice-based phishing via phone calls or automated systems

https://thecyberskills.com/phishing-attack-red-flags-protection/

Conclusion: What Domain 5 Covers

Domain 5 ties together the human, technical, and procedural elements of security. It includes:

  • Cryptography and hashing
  • Data handling and destruction
  • Configuration, patch, and change management
  • Access control models
  • Security governance
  • Awareness and training
  • Social engineering attacks

Understanding these concepts is essential for protecting systems not just in theory, but in real-world environments.

https://www.isc2.org/certifications/cc

Scroll to Top