Chapter 1: Understanding Security Fundamentals Flashcards
A concept used that has multiple protective layers so that if one layer of protection goes down, other layers will be in place to guard against hacking a company’s data.
Defense in Depth
Managers write these as sort of an organizational policies and procedures to help mitigate risks within companies.
Managerial Controls
Ex: Annual Risk Assessment,
Pentesting/vulnerability scanning.
Policies and procedures executed by personnel on a day-to-day basis.
Operational Controls
Ex: Annual Security Awareness Training, Change management, Business Continuity Plan
Policies and procedures implemented by the IT Team to reduce the risk of breaches to cyber security
Technical Controls
Ex: Firewall Rules, Antivrus, Screen savers, Screen filters, IPS/IDS
CCTV (Camera that captures crimes) and motion sensors
Deterrent Controls
Used when investigating an incident that has happened.
Detective Controls
Text files that record events that take place on devices like servers, desktops, and firewalls with details of what happened. Timestamps provide the time of attack. WORM helps to avoid tampering.
Log Files
The actions taken to correct and help guard against future attacks of the same nature.
Corrective Controls
Used when Primary controls are not available
Compensating Controls (Alternative or Secondary Controls)
Used to prevent any potential problems from occurring in the first place like a former employee getting onto a company server and tampering with data.
Preventative Controls
Consists of three main parts:
Identification, Authentication, and Authorization.
Access Controls
Examples include a smart card, Security Identifier, fingerprint reader
Identification
Used to verify access. Examples include a PIN, or password.
Authentication
This is the least amount of privilege given in order to have access to data needed to perform your job.
Authorization
Involves New Technology File System(NTFS) file permissions that give the bare minimum amount of privilege needed to perform your job.
Discretionary Access Control
Full Control Modify Read and Execute List Folder Contents Read Write