Chapter 1a Flashcards
Technical Controls
Controls implemented using systems; Operating system controls; Firewalls, anti-virus
Managerial Controls
Standard operating procedures and policies that explain to people how best to manage their systems and data.
Operational Controls
Controls that are implemented by people; Security guards, awareness programs
Physical Controls
Limit physical access; Guard shack; Fences, locks; Badge readers
Preventive Control Types
block access to a resource; ex: firewall rules, door locks, guards checking ID, etc
Deterrent Control Type
Discourages intrusion attempts but does not prevent access.; Splash screen; Threat of demotion; Front reception desk; Posted warning signs
Detective Control Type
Identifies and logs intrusion attempts but may not prevent access.; Collecting logs; Reviewing login reports; Patrolling the property; Enabling Motion Detectors
Corrective Control Type
Applied after an event has been detected. Might reverse the impact of the event and allow for continued operations with minimal downtime.; Restoring from backups; Creating policies for reporting security issues; Contacting law enforcement to manage criminal activity; Using a fire extinguisher
Compensating Control Type
Provides other means when other controls are not currently available. May be a temporary solution to prevent the exploitation of a weakness.; Firewall blocking an application while it is being patched; Separate duties and limiting scope of security concerns; Requiring multiple guards on duty at the same time; Using a generator during a power outage
Directive Control Type
Directing a subject towards doing something more secure. Relatively weak. ‘Do this please’; Store all sensitive files in a protected folder; Create compliance policies and procedures; Train users on proper security policy; Authorized personnel only sign
The CIA Triad
Confidentiality, Integrity, Availability
Confidentiality
Prevent disclosure of information to unauthorized individuals or systems
Integrity
Messages can’t be modified without detection
Availability
Systems and networks must be up and running
Encryption
A process of encoding messages to keep them secret, so only ‘authorized’ parties can read it.
Access Controls
Controls that selectively restrict access to a resource
Two Factor Authentication
Requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)