Chapter 1 Flashcards

1
Q

What are the four categories of security controls?

A

Technical, managerial, operational, physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Technical controls

A
  • controls implemented using systems
  • operation systems controls
  • firewalls, antivirus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Operational controls

A

-Controls implanted by people instead of systems
-security guards, awareness of programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Control types

A

Preventive, deterrent, detective, compensating, directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Preventive control

A
  • block access to a resource
  • you shall not pass
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Deterrent control

A
  • discourage an intrusion attempt
  • does not directly prevent access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Detective control

A
  • identify and log and intrusion attempt
  • may not prevent access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Corrective control

A

-Apply a control an enemy has been detected
- can reverse the impact with minimal downtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Compensating control

A

-control using other means
- existing controls aren’t sufficient
-may be temporary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Directive control

A
  • directive subject to data security compliance
  • a relatively weak security control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Preventive technical

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Preventive managerial

A

Onboarding policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Preventive operational

A

Guard shack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Preventive physical

A

Door lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Deterrent technical

A

Splash screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Deterrent managerial

A

Demotion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Deterrent operational

A

Reception desk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Deterrent physical

A

Warning signs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Detective technical

A

System log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Detective managerial

A

Review login reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Detective operational

A

Property patrols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Detective physical

A

Motion detector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Corrective technical

A

Back up recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Corrective managerial

A

Policies for reporting issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Corrective operational

A

Contact authorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Corrective physical

A

Fire extinguisher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Compensating technical

A

Block instead of patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Compensating Managerial

A

Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Compensating operational

A

Require multiple security staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Compensating physical

A

Power generator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Directive technical

A

File storage policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Directive managerial

A

Compliance policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Directive operational

A

Security policy training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Directive physical

A

Sign: Authorized Personnel only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Are control types inclusive

A

No there are many types of control and some organizations will combine types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the three pillars of the triad?

A

Confidentiality, integrity, availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Confidentiality

A

Prevent disclosed of information to unauthorized individuals or systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Integrity

A

Messages won’t be modified without detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Availability

A

Systems and networks must be up and running

40
Q

Encryption

A

Encoded messages so only certain people can read it

41
Q

Access control

A

Selectively restrict access to resources

42
Q

Two-factor authentication

A

Additional confirmation before information is disclosed

43
Q

Hashing

A

Map data of an arbitrary length to data of a fixed length

44
Q

Digital signatures

A

Mathematical scheme to verify integrity of data

45
Q

Non-repudiation

A

Provides proof of integrity, can be asserted to be genuine

46
Q

Redundancy

A

Build services that will always be available

47
Q

Fault tolerance

A

Systems will continue to run even when a failure occurs

48
Q

Patching

A

-stability
-close security holes

49
Q

What does a digital signature provide?

A
  • you can’t deny what you’ve said
  • adds a different perspective for cryptography
50
Q

Why use hash in cryptography ?

A

-represents data as a short string of text
- a message digest, a fingerprint

51
Q

What does hash not tell you?

A

Doesn’t necessarily associate data with an individual

52
Q

Proof of origin: Authentication

A

Prove the source/s of the data received

53
Q

Sign with private key

A
  • message doesn’t need to be encrypted
  • no one else can sign this
54
Q

Verify with public key

A

Any change to the message will invalidate the signature

55
Q

Identification

A
  • this is who you claim to be
  • usually your username
56
Q

Login authentication

A
  • prove you are who you say you are
  • password and other authentication factors
57
Q

User authorization

A
  • based on your identification and authorization, what access do you have?
58
Q

Accounting

A
  • resources: login time, data sent and received, logout time
59
Q

How can you truly authenticate a device?

A

Put a digitally signed certificate on the device

60
Q

What happens after The organization creates a certificate for a device

A

The organization digitally signs the certificate with the organization’s CA

61
Q

Why is a certificate included on a Device as an authentication factor

A

The CA’s digital signature is used to validate the certificate therefore the device

62
Q

Users and services —> data and applications

A

Associating individual users to access rights does not scale

63
Q

Why is this more efficient? Put an authorization model in the middle of (user and services—> authorization model —> data and applications)

A

Authorization model is Defined by roles, organizations, attributes, etc.

64
Q

No authorization model

A
  • a simple relationship
    •user—> resources
  • issues with this method
    • difficult to understand why an authorization may exist
    • does not scale
65
Q

Using an authorization model

A
  • add an abstraction
    • reduce complexity
    • create a clear relationship between the user and the resource
  • administration is streamlined
    • easy to understand the authorizations
    • support any number of users or resources
66
Q

Gap analysis

A
  • where you are compared with where you want to be
  • the is can take weeks or months
    • extensive study with numerous participants
    • get ready for emails,data gathering, and technical research
67
Q

Choosing framework for gap analysis

A
  • work towards known baseline
    • internal set of goals
    • some organization should use formal standards example: )NIST special publication 800-171 Revision 2, Protecting controlled unclassified information in non federal systems and organizations) or (ISO/IEC 27001, information security management systems
68
Q

Gap analysis evaluate people

A
  • get a baseline of employees
    • formal experience
    • current training
    • knowledge of security policies and procedures
69
Q

Gap analysis evaluating process

A

-research existing IT systems
- evaluate existing security policies

70
Q

Gap analysis compare and contrast

A
  • the comparison
    • evaluate existing systems
  • identify weaknesses
    • along with most effective processes
  • a detailed analysis
    • examine a broad security categories
    • break those down into smaller segments
71
Q

Gab analysis final comparison

A

-detailed baseline objectives
- a clear view of the current state

72
Q

Gab analysis: what resources will it take on the pathway from the current security to goal

A

Time, money, and lot of change control will occur

73
Q

Zero trust

A

-holistic approach to network security
- covers every device, every process, every person

74
Q

Zero trust: how is everything verified ?

A

-nothing is inherently trusted
- multi-factor authentication, encryption, system permission, additional firewalls, monitoring, and analytics, etc

75
Q

Planes of operation

A

Split the network into functional planes such as physical, virtual, and component

76
Q

Planes of operation: Data plane

A
  • process the frames, packets, and network data
  • processing, forward, trunking, encrypting , NAT
77
Q

Planes of operation: Control plane

A
  • manages the actions of the data plane
  • define policies and rules
  • determine how packets should be forwarded
  • routing tables, session tables,NAT tables
78
Q

NAT

A

network address translation: performed by firewalls or routers

79
Q

Controlling trust

A

-adaptive identity:consider source and requested resources

-threat scope reduction: decrease number of possible entry points

  • policy-driven access control: combine adaptive identity with a predefined set of rules
80
Q

Security zones

A

-broad categories provides a security-related foundation

  • where you are coming from and where are you going (trusted, untrusted)( marketing,it, accounting, HR)

-using zones may be enough by itself to deny traffic

  • some zones are implicitly trusted
81
Q

Policy enforcement point

A

-subject and systems: end users, applications, non-human entities

-policy enforcement point (PEP): gate keeper

  • Allow, monitor, and terminate connections: multiple components working together
82
Q

What policies are need to be applied to put trust in the plane?

A
  • policy decision point: there’s a process for making an authentication decision
  • policy engine: evaluates each access decision based on policy and other information sources ( grant deny revoke)

-policy administration: communicates with policy enforcement point, generates access tokens and credentials and tells PEP to allow or disallow access

83
Q

Physical security includes

A

-Baracades/ballards
-Access control vestibules
- fencing
-video surveillance
-guards and access badges
-lighting
-sensors

84
Q

Physical security: Barricades/bollards

A

-prevent access: there are limits to prevention

  • channel people through specific access point: allow people and prevent cars, trucks, and other things

-identify safety concerns and prevent injuries

  • can be used to an extreme: concrete barriers/ bollards, moats
85
Q

Physical security: access control vestibules

A

-all doors normally unlocked: opening one door causes others to lock

  • all doors normal locked: unlocking one door prevents others from being unlocked

-one door open other locked: when one is open the other doors cannot lock

-one at a time controlled groups: manage control through an area

86
Q

Physical security: fencing

A
  • build a perimeter: usually very obvious, may not be what your looking for
  • transparent or opaque: see through fence or solid
  • robust: difficult to cut

-prevent climbing: razor wire, building or high

87
Q

Physical security: video surveillance

A

-CCTV (close circuit television: can replicate guards

-camera features: motion recognition that can alarm and alert when something moves, object detection and identification

  • often many different cameras: networked together and recorded overtime
88
Q

Physical security: guard and access badges

A

-Guards: physical protection at the reception area of a facility, they can validate identification of existing employees

-two-person integrity/control: minimize exposer to attack and no single person has access to a physical asset

89
Q

Physical security: lighting

A

-more lighting means more security: attackers avoid light, easier to see lit, IR cameras can see better

  • specialized design: consider overall light levels,lighting angles for facial recognition, avoid shadows or glare
90
Q

Physical security: sensors

A

-infrared: detects infrared reaction in both lighting and darkness, common in motion detectors

-pressure: detects change in force, floor and window sensors

-microwave: detects movement across large areas

-ultrasonic: send signals, receive sound waves,detect motion, collision detection

91
Q

Deception and disruption includes

A

-Honey pots
-honey nets
-honey files
-honey tokens

92
Q

Deception and disruption: Honey pots

A

-create a virtual world to explore

-attract the bad guys and trap them there

  • attacker is probably a machine

-Different options for honey pots: most are open source and available to download

93
Q

Deception and disruption: honey nets

A

-build a larger deception network with one or more honeypots

  • a real network includes more than a single device: servers, workstations, routers,firewalls,switches
  • more than one source of information
94
Q

Deception and disruption: honey files

A

-bait for the honeypot (passwords.txt),and many honey files to file share

-attract the attackers with more honey:create files with fake information, something bright and shiny

-an alert is sent if the file is accessed: a virtual bear trap

95
Q

Deception and disruption: Honey tokens

A

-attract the malicious actors: add traceable data to the honey pot, if the data is stolen you will know where it came from

  • API credentials: does not actually provide access, notification are sent when used
  • fake email addresses: add it to contact list, monitor the internet to see who posted it

-honey token examples: database records, browser cookies, webpage pixel