Cybersecurity Risks and Controls Flashcards
What are Security Controls?
Safeguards or countermeasures to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets.
What is a Control Framework?
A set of controls that protects data within the IT infrastructure of a business or other entity.
What are the key components of a control framework?
- Objective setting
- Event identification and response plans
- Compliance with government and industry requirements
- Monitoring processes
- Control activities
Which controls categories are there?
- Compensating controls
- Corrective controls
- Detective controls
- Deterrent controls
- Directive controls
- Preventive controls
- Recovery controls
Which control types are there?
- Administrative controls (or Management controls)
- Physical controls (or Operational controls)
- Technical controls (or Logical controls)
What is confidentiality?
Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
Which control methods can be used to protect confidentiality?
- Access restriction
- Information categorization
- Data classification
- Awareness training
- Password best practices
- Data encryption
- Multi-factor authentication
- Biometric verification
- Security tokens
- Principle of Least Privilege
- Identification, authentication, authorization through access controls
What is Integrity?
Guarding against improper information modification or destruction and includes ensuring information non-repudiation and authenticity.
What are the possible consequences of integrity loss?
- Unintentional changes
- Unauthorized changes
- Accidental changes
- Inconsistent behavior
- Inaccurate information
- Data corruption
- Data destruction
- Untrustworthy information
- Poor business decisions
- Processing errors
What control methods can be used to protect integrity?
- Data encryption
- Hashing algorithms
- Segregation of duties
- Approval checkpoints
- Testing
- Change management and version control
- File permissions
- Access controls
- Detection
- Response and recovery
- Backups and redundancy
- Secure storage
- Log collection
What is the definition of availability?
Ensuring timely and reliable access to and use of information
What are the possible consequences of information availability loss?
- Data loss
- Unreachable data
- Service interruption or loss
- Communication bottlenecks
- Connection interruptions
- Network intrusions
- Loss of productivity
- Loss of revenue
What control methods can be used to protect availability?
- Hardware maintenance and repair
- System upgrades
- Provide adequate communication bandwidth
- Redundancy and failover
- High availability
- Disaster recovery
- Business continuity
- Incident management
- Data backup
- Security equipment
- Anti-malicious code detection
What is a cyber threat?
A potential cause of incident that results in harm.
What’s a vulnerability?
Weakness of an asset that can be exploited by a threat.