701 - Chapter 9 Flashcards
What type of security control is something you can physically touch such as a lock, a fence, and a ID badge, a security camera?
Physical
What can serve as an access badge to secure access to certain areas? And how do they work? And what can be added to these for multi factor authentication?
Proximity or smart cards… users pass the card near a proximity card reader and the card reader then reads data on the card…a PIN
What else can be used to control access to building and secure spaces to deter security incidents?
Security guards or a receptionist
What physical control can provide reliable proof of a persons, location and activity by identifying who enters and exits secure areas?
Video surveillance
True or false closed circuit television CC TV can be used as a compensating control in some situations
True
What monitors the environment and can detect changes? What are some common types of these?
Sensors… motion detection , noise detection, infrared temperature monitor, pressure monitor, microwaves monitor, ultrasonic waves monitor
What provides a barrier around a property and deters people from entering? What also is visible especially around entrances and can deter attackers from trying to break?
A fence…lights
What is an important to do with lighting? Why and how?
Protect them… because if they don’t work, they can’t do their job… By placing them high enough out of reach or surrounding them with a metal cage
Military bases often erect these, while a business uses these? In both cases, what are they deterring?
Barricades…bollards… a person driving in to the structure that they are protecting
What is a physical barrier between the outside world and a data center, consisting of two sets of interlocking doors designed to create a secure compartment that allows only one person to enter at a time? What are the doors usually equipped with? And what are they preventing?
Access control vestibule… Biometric scanners, RFID card readers or facial recognition systems…tailgating
What is the process of tracking valuable assets throughout their life cycle?
Asset management
what is the process that provides consistent procedures for identifying the need for new assets, And effectively on boarding and managing new vendors
Acquisition/procurement process
What is the process that assigns each asset to a named owner who bears responsibility for the asset and a classification system that identifies as sensitivity and criticality of each asset to the organization?
Assignment/accounting process
What is the process that maintains an inventory of all of the assets owned by the organization and their current current location?
Monitoring and asset tracking process
What is the process to track servers, desktop, computers, laptop computers, router, switches, and other hardware assets?
Hardware asset management
What vulnerabilities can be reduced with a hardware asset management process?
Architecture and design weaknesses, system sprawl and undocumented assets
What automated method can be implemented to assist with inventory control for hardware asset management?
RFID
What involves tracking and managing software licenses, installations, and usage within an organization? And how does it help?
Software asset management… it helps with licensing compliance, optimizes software usage, minimizes the risk of security vulnerabilities associated with unpatched or unauthorized software
What is the security practice of implementing several layers of protection called?
Defense in depth, also known as layered security
What are the different types of diversity for layered security?
Vendor diversity, technology diversity, control diversity
What is the practice of implementing security controls from different vendors to increase security? And What is an example of this?
Vendor diversity…To implement a screened subnet requires two firewalls…using firewalls from different vendors means it is unlikely to develop a vulnerability at the same time in each
What is the practice of using different technologies to protect an environment?
Technology diversity
What is the use of different security control categories to protect an environment called?
Control diversity
What is the practice of illegally capturing credit card data at the point of sale? And what is the practice of making a copy of a credit card using data captured from a magnetic strip called
Credit card skimming… card cloning
What is the type of physical attack that can be rudimentary but effective? And what type of attack will disrupt By going after a power source or flooding it with water to cause a catastrophe?
Brute force attack… environmental attack
What is adding duplication to critical system components and networks called? And what does it provide? And what are these trying to eliminate?
Redundancy… fault tolerance… single point of failure
What are five types of redundancies that organizations will implement?
Disc redundancies using RAID, NIC redundancy with NIC teaming, server redundancies by adding load balancers, power redundancies by adding generators or UPSes, site redundancies by adding hot cold or warm sites
What is any component whose failure results in the failure of an entire system called?
Single point of failure
True or false people can never be a single point of failure
False… if that person is the only one with expertise on how to perform a specific task, they can become a single point of failure
True or false RAID-0 or striping Provides redundancy and fault tolerance
False it provides neither as its benefit is increased read and right performance
What is RAID-1 called? And how does it provide redundancy? And how can redundancy be further added?
Mirroring… By having two discs store the same information… by adding a disc controller to both drives, this is called disc duplexing
What is RAID-5? And what happens if there is a disk failure?
Three or more discs that are striped together and including parity information… The disk can be re-created by reading the remaining good disks information
What is RAID-6? And what is the benefit?
An extension of raid-5 with an additional parity block and disc… if two drives should fail you can still recover the data
What combines the features of mirroring RAID-1 and striping RAID-0?
RAID-10