Chapter 1 Flashcards
What are the four categories of security controls?
Technical, managerial, operational, physical
Technical controls
- controls implemented using systems
- operation systems controls
- firewalls, antivirus
Operational controls
-Controls implanted by people instead of systems
-security guards, awareness of programs
Control types
Preventive, deterrent, detective, compensating, directive
Preventive control
- block access to a resource
- you shall not pass
Deterrent control
- discourage an intrusion attempt
- does not directly prevent access
Detective control
- identify and log and intrusion attempt
- may not prevent access
Corrective control
-Apply a control an enemy has been detected
- can reverse the impact with minimal downtime
Compensating control
-control using other means
- existing controls aren’t sufficient
-may be temporary
Directive control
- directive subject to data security compliance
- a relatively weak security control
Preventive technical
Firewall
Preventive managerial
Onboarding policy
Preventive operational
Guard shack
Preventive physical
Door lock
Deterrent technical
Splash screen
Deterrent managerial
Demotion
Deterrent operational
Reception desk
Deterrent physical
Warning signs
Detective technical
System log
Detective managerial
Review login reports
Detective operational
Property patrols
Detective physical
Motion detector
Corrective technical
Back up recovery
Corrective managerial
Policies for reporting issues
Corrective operational
Contact authorities
Corrective physical
Fire extinguisher
Compensating technical
Block instead of patch
Compensating Managerial
Separation of duties
Compensating operational
Require multiple security staff
Compensating physical
Power generator
Directive technical
File storage policy
Directive managerial
Compliance policy
Directive operational
Security policy training
Directive physical
Sign: Authorized Personnel only
Are control types inclusive
No there are many types of control and some organizations will combine types
What is the three pillars of the triad?
Confidentiality, integrity, availability
Confidentiality
Prevent disclosed of information to unauthorized individuals or systems
Integrity
Messages won’t be modified without detection