Chapter 1: Controls Flashcards
Prevents the disclosure of data to unauthorized people so that authorized people have access to data (CIA Triad)
Confidentiality
you know the data has not been altered or tampered with. (CIA Triad)
Integrity
Data is always available; example is RAID (CIA Triad)
Availability
where you give someone only the most limited access required
Least Privilege
Concept of protecting a company’s data with a series of protective layers so that if one layer fails another layer will already be in place to thwart attack
Defense in Depth
Written by managers to create organizational policies and procedure to reduce risk within companies; annual risk assessments/penetration testing vulnerability scanning (Control Type)
Managerial Control
Executed by company personnel during their day to day operations; annual security awareness training/change management/business continuity plan; (Control Type)
Operational Control
Those implemented by IT team to reduce the risk to the business; firewall rules/antivirus/screensavers/IDS/IPS (Control Type)
Technical Controls
CCTV and Motion Sensors (Control Type)
Deterrent Controls
Used to investigate and incident that has happened and needs to be investigated (Control Type)
Detective Controls
The actions you take to recover from an incident; file suppression systems-fire destroyed data (Control Type)
Corrective Controls
Can be used instead of a primary control that has failed or is not available; use a credit card when all cash is gone (Control Type)
Compensating Controls
Are in place to deter any attack; could be having a security guard with a large dog whaling around the perimeter of building (Control Type)
Preventative Controls
The user is only given the access needed to perform their job; also known as user based. (Type of Access Control)
Discretionary Access Control
Based on the classification level of the data-looks at how much damage could be inflicted to the interests of the nation; Top Secret/Secret/Confidential (Type of Access Control)
Mandatory Access Control