Chapter 8 Flashcards

1
Q

Explain InfoSec framework, blueprint, and model:

A

A framework is the outline of a more thorough blueprint, used in the creation of the InfoSec environment.

A security model is a generic blueprint offered by a service organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are access controls?

A

Access controls regulate user access into trusted area of an organization, by using policies, software, and technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The 4 processes of access control are:
(!!)

A

-Identification

-Authentication
-Authorization
-Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 3 key principles of access control?

A

-Least privilege: users can access the minimum amount of information necessary.

-Need to know: users can only access the specific information required for their task.

-Separation of duties: more than one individual is responsible for different parts of a task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3 NIST Control Categories:

A

-Management
-Operational
-Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name an example of operational control for each of the following: (!!)
1- Deterrent:
2- Preventative
3- Detective
4- Corrective
5- Recovery
6- Compensating

A

1- Warning signs
2- Gates, fences, and guards.
3- CCTV
4- Fire suppression systems
5- Disaster recovery procedures
6- Defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is “Mandatory Access Controls (MACs)”?

A

It limits users and data owners’ control over information, to protect data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 3 levels of classified data in organizations?

A

1- Public
2- For offical use only
3- Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the “Security Clearance Structure”?

A

In this structure, each user, depending on their authorization level, has access to a certain level of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are “Discretionary Access Controls (DACs)”?

A

The user controls the level of restriction for access to their information.
User by most personal OS’s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Security Architecture Models?

A

They provide InfoSec implementations and help organizations make quick improvements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the InfoSec Governance Framework?

A

A managerial model that provides guidance in the developement of governance structures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly