1.1 Flashcards
Deterrent Control
Psychologically discourages an attacker from attempting an intrusion.
EX: Warning sign
Preventive Control
Physically or logically restricts unauthorized access.
EX: Physical door lock or password.
Detective Control
Identify and record any attempted or successful intrusion.
EX: Security Camear
Corrective Control
Responds to and fixes an incident. Also prevent the reoccurrence of the incident.
EX: antivirus software
Technical Security Control
Hardware or software mechanisms used to protect assets.
EX: Antivirus software, firewalls, intrusion detection systems
Operational Security Control
Items preventing or detecting unauthorized access to physical spaces, systems and assets.
Compensating controls
refer to measures put in place to mitigate the risk of a vulnerability when security teams cannot directly eliminate it or when direct remediation is not immediately possible, such as additional monitoring or enhanced encryption.
Policy enforcement points
enforce decisions about whether to grant access to a requested resource or not.
Non-repudiation
assures the origin and integrity of transmitted data, preventing entities from denying the validity of the data.
Zero trust
security concept that recommends not trusting any entity inside or outside the organization by default. It does not assist in granting access based on roles.
honeypot
allows security teams to monitor attacker activity and gather information about the attacker’s tactics and tools.
mimics real systems or applications as a decoy system.
honeynet
uses a network of interconnected honeypots to simulate an entire network versus mimicking a system or application.
honeyfile
uses fake files that appear to contain sensitive information. A honeyfile will detect attempts to access and steal data.
honeytoken
contains false credentials, login credentials, or other data types that distract attackers, trigger alerts, and provide insight into attacker activity.
Gap analysis
assesses the differences in performance between a company’s information systems or software applications to determine whether they meet requirements.
Authorization models
dictate what resources a user or system can access within a system.
AAA
Authentication, authorization, and accounting
RBAC
Role-based access control (RBAC) is the role assigned to individual users within an enterprise.
policy engine
includes subject and host identities and credentials, access control policies, up-to-date threat intelligence, behavioral analytics, and other results of host and network security scanning and monitoring.
Adaptive identity
dynamically adjusting user access rights based on various factors, such as user behavior, to maintain security and mitigate risk.