Chapter 1a Flashcards

1
Q

Technical Controls

A

Controls implemented using systems; Operating system controls; Firewalls, anti-virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Managerial Controls

A

Standard operating procedures and policies that explain to people how best to manage their systems and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Operational Controls

A

Controls that are implemented by people; Security guards, awareness programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Physical Controls

A

Limit physical access; Guard shack; Fences, locks; Badge readers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Preventive Control Types

A

block access to a resource; ex: firewall rules, door locks, guards checking ID, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Deterrent Control Type

A

Discourages intrusion attempts but does not prevent access.; Splash screen; Threat of demotion; Front reception desk; Posted warning signs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Detective Control Type

A

Identifies and logs intrusion attempts but may not prevent access.; Collecting logs; Reviewing login reports; Patrolling the property; Enabling Motion Detectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Corrective Control Type

A

Applied after an event has been detected. Might reverse the impact of the event and allow for continued operations with minimal downtime.; Restoring from backups; Creating policies for reporting security issues; Contacting law enforcement to manage criminal activity; Using a fire extinguisher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Compensating Control Type

A

Provides other means when other controls are not currently available. May be a temporary solution to prevent the exploitation of a weakness.; Firewall blocking an application while it is being patched; Separate duties and limiting scope of security concerns; Requiring multiple guards on duty at the same time; Using a generator during a power outage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Directive Control Type

A

Directing a subject towards doing something more secure. Relatively weak. ‘Do this please’; Store all sensitive files in a protected folder; Create compliance policies and procedures; Train users on proper security policy; Authorized personnel only sign

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The CIA Triad

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Confidentiality

A

Prevent disclosure of information to unauthorized individuals or systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Integrity

A

Messages can’t be modified without detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Availability

A

Systems and networks must be up and running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption

A

A process of encoding messages to keep them secret, so only ‘authorized’ parties can read it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Access Controls

A

Controls that selectively restrict access to a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Two Factor Authentication

A

Requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hashing

A

Map data of an arbitrary length to data of a fixed length

19
Q

Digital Signatures

A

A mathematical scheme to verify the integrity of data

20
Q

Certificates

A

Combine with a digital signature to verify an individual

21
Q

Non Repudiation

A

Provides proof of integrity, can be asserted to be genuine

22
Q

Hash

A

Represents data as a short string of text. If the data changes then the hash changes. Only tells you if data has been changed. Impossible to recover the original message from the hash. Also called a digest or fingerprint.

23
Q

AAA framework

A

Authentication, Authorization, and Accounting. A security framework that controls access to computer resources, enforces policies, and audits usage.

24
Q

Certificate Authority (CA)

A

An entity trusted by one or more users as an authority in a network that issues, revokes, and manages digital certificates.

25
Q

Authorization models

A

Allows organizations to give access rights to the appropriate users by adding an abstraction that creates a clear relationship between the user and resource. Groups users and gives them access to resources

26
Q

Gap Analysis

A

An extensive study used to determine current security levels compared to where we want them to be.

27
Q

Zero Trust

A

Security design paradigm where any request (host-to-host or container-to-container) must be authenticated before being allowed.

28
Q

Data Plane

A

The part of a device that is performing the actual security process

29
Q

Control Plane

A

Manages the actions of the data plane; Define policies and rules; Determines how packets should be forwarded; Routing tables, session tables, NAT tables

30
Q

Adaptive Identity

A

Relies on real-time validation that takes into account the user’s behavior, device, location, and more

31
Q

Threat scope reduction

A

Decrease the number of possible entry points

32
Q

Policy driven access control

A

Combine the adaptive identity with a predefined set of rules

33
Q

Security Zones

A

Segregation of network resources into distinct zones based on security requirements and trust levels.

34
Q

Policy enforcement point (PEP)

A

A point where all communications on a network are subject to evaluation.

35
Q

Policy Engine

A

Cross-references the access request with its predefined policies

36
Q

Policy Administrator

A

Communicates with PEP to allow or disallow access

37
Q

Physical Security

A

Prevents physical access to a resource

38
Q

Access control Vestibule

A

A secure entry system with two gateways, only one of which is open at any one time.

39
Q

Two Person Integrity

A

No single person has access to a physical asset

40
Q

Honeypot

A

A security tool used to lure attackers away from the actual network components. Can be used to study the techniques that attackers are trying to use against you.

41
Q

Honey Net

A

A collection of honeypots used to present an attacker with an even more realistic attack environment.

42
Q

Honeyfiles

A

Files that appear important or look like they contain sensitive information. Can be used as an alert if the file is accessed, or can contain traceable data.

43
Q

HoneyTokens

A

Fake credentials that don’t actually provide access to sensitive information.