Cysa + Flashcards
A location where security professionals monitor and protect critical
information assets in an organization
Security Operations Center (SOC)
This document is called the security and privacy controls for federal
information systems and organizations
NIST Special Publication 800-53 Revision 5
mitigates vulnerabilities and risk to ensure the confidentiality, integrity,
availability, nonrepudiation, and authentication of data
Security Control
an international standard and a proprietary framework
ISO 27001
A category of security control that is implemented as a system
(hardware, software, or firmware)
Technical (Logical) Controls
A category of security control that is implemented primarily by
people rather than systems
Operational Controls
A category of security control that provides oversight of the
information system
Managerial Controls
A control that acts to eliminate or reduce the likelihood that an
attack can succeed
Preventative Control
A control that may not prevent or deter access, but will identify
and record any attempted or successful intrusion
Detective Control
A control that acts to eliminate or reduce the impact of an
intrusion event
Corrective Control
A type of security control that acts against in-person intrusion
attempts
Physical Control
A type of security control that discourages intrusion attempts
Deterrent Control
A type of security control that acts as a substitute for a principal
control. Not the top line, but gives you some protection
Compensating Control
A control that uses a system that actively monitors for potential vulnerabilities or
attacks, and then takes action to mitigate them before they can
cause damage
Responsive Control
a system that monitors all incoming and outgoing network, traffic and
blocks
Firewall
Devices that can monitor network traffic for patterns that indicate an
intrusion is occurring such as a repeated failed log on attempt (takes action)
Intrusion Prevention System (IPS)
The process where data is generated and is then collected, processed,
analyzed, and disseminated to provide insights into the security status of
information systems
Security Intelligence
Investigation, collection, analysis, and dissemination of information about
emerging threats and threat sources to provide data about the external
threat landscape
Cyber Threat Intelligence