Cram Guide SON 1.1 &1.2 Flashcards
What are technical security controls?
Controls implemented through hardware or software.
What is an example of a technical control?
Firewalls, encryption, IDS, authentication, and access controls.
What is a key advantage of technical controls?
They provide automated protection and scalability.
What is a drawback of technical controls?
They can fail or become outdated.
What are managerial security controls?
Controls that focus on governance, strategy, and security policies.
What is a key advantage of managerial controls?
They align security with organizational goals and compliance.
What is a drawback of managerial controls?
Their effectiveness depends on managerial commitment and upkeep.
What are operational security controls?
Controls tied to daily tasks and procedures followed by users or admins.
What is an example of an operational control?
Backups, user training, incident response, and change management.
What is a key advantage of operational controls?
They address user actions and routine security practices directly.
What is a drawback of operational controls?
They depend on consistent human action and are prone to error.
What are physical security controls?
Controls that protect the physical environment of information assets.
What is an example of a physical control?
Guards, fences, locks, CCTV, biometrics, server rooms, fire suppression.
What is a key advantage of physical controls?
They defend against theft, damage, and natural disasters.
What is a drawback of physical controls?
No protection against cyber threats & maintenance cost.
What are corrective security controls?
Controls that respond to and fix security incidents after they occur.
What is an example of a corrective control?
Antivirus quarantine, incident response, backups, or patching.
What are compensating security controls?
Alternative controls used when primary controls aren’t feasible.
What is an example of a compensating control?
Strong password policy and behavior monitoring instead of MFA.
What is non-repudiation in security?
It ensures no party can deny sending or receiving information.
What is the control plane in Zero Trust?
It verifies identity and access dynamically using policy-driven decisions.
What is the data plane in Zero Trust?
It enforces access decisions and defines trust boundaries between systems.
What is the role of the Policy Engine in Zero Trust?
It evaluates access requests based on defined policies.
What is the Policy Enforcement Point in Zero Trust?
It executes access decisions made by the policy engine.