1st Day Flashcards
Cybersecurity Analysts fill what role in a network?
Network Defenders
Indicators of Compromise are
Signs of something bad happening in the network
SOCs should be a single point of contact for what activity?
Incident Response, Monitoring, and Security
Security Controls should be selected and deployed based on what?
A Framework
Technical (Logical) Controls are
Security controls implemented as a system (hardware, software, firmware)
Operational Controls are
Security controls implemented primarily by people rather than systems
Preventative Controls are designed to
eliminate or reduce the likelihood that an attack can succeed
Detective Controls are
Controls that may not prevent or deter, but will identify and record any attempted or successful intrusion
Corrective Controls are
Controls that act to eliminate or reduce the impact of an intrusion event
Physical Controls are
A type of security control that acts against in-person intrusion attempts
Deterrent Controls are
A type of security control that discourages intrusion attempts
Compensating Controls are
a security control that acts as a substitute for a principal control. ( i.e. if a principal control is too expensive, the compensating control is next best)
Responsive Controls are
A system that actively monitors for vulnerabilities or attacks, and takes action to mitigate them before they cause damage