1 Flashcards
Categories of security controls
Technical, managerial, operational, physical
Technical controls
Technology-based measures such as
firewalls and encryption
Managerial controls
Policies, procedures, and guidelines
for security management
Operational controls
Day-to-day security practices such
as monitoring and access management
Physical controls
Measures to safeguard physical assets and premises
Types of security controls
Preventive, deterrent, detective, corrective, compensating, directive
Preventive controls
Aimed at preventing security incidents
Deterrent control
Intended to discourage potential attackers
Detective controls
Focused on identifying and detecting
security incidents
Corrective controls
Implemented after an incident to
mitigate the impact
Compensating controls
Alternative measures to compensate for inadequate primary controls
Directive controls
Policies or regulations providing
specific guidance
Confidentiality, Integrity, and Availability (CIA)
Safeguards data confidentiality, , integrity, and accessibility
Confidentiality
Ensures that sensitive information remains shielded from prying eyes and that access is granted solely to those with the appropriate authorization
Integrity
Prevents unauthorized changes or
manipulations to your information, maintaining its accuracy and reliability. Hashing algorithms such as SHA1 or MD5 provide data integrity.
Availability
Ensures that your systems are up and running, that your data can be accessed promptly, and that your online services remain accessible.
Non-repudiation
Prevents denial of one’s actions, ensuring accountability
Authentication
Purpose: To verify the identity of a user or system.
Process: Involves checking credentials like passwords, PINs, or biometric data (fingerprints, facial recognition).
802.1X protocol
802.1X takes the lead in authenticating devices seeking access to a network, and each device must have a valid certificate on its endpoint.
Authorization
Purpose: To determine what an authenticated user or system is allowed to do.
Process: Involves setting permissions and access levels for different resources.
Accounting
This process involves capturing essential details such as usernames, timestamps, IP addresses, accessed resources, and actions performed
AAA server
A guard responsible for three important tasks: authentication, authorization, and accounting.
AAA protocols
RADIUS, Diameter, and TACACS+
Gap analysis
Gap analysis is a strategic process that evaluates an organization’s security practices against established security standards, regulations, and industry best practices.
Key taks of gap analysis
Assessment, benchmarking, identification, prioritization, remediation strategy
Zero trust
Control plane
The part of a network that controls how data packets are forwarded. The process of creating a routing table, for example, is considered part of the control plane
Data plane
In contrast to the control plane, which determines how packets should be forwarded, the data plane actually forwards the packets. The data plane is also called the forwarding plane.
Control plane vs Data plane
Think of the control plane as being like the stoplights that operate at the intersections of a city. Meanwhile, the data plane (or the forwarding plane) is more like the cars that drive on the roads, stop at the intersections, and obey the stoplights.
Control plane 115