Exam1 Flashcards
A category of security control that gives oversight of the information system. Risk assessments, vulnerability assessments.
Managerial Control
help ensure that the day-to-day operations of an organization comply with the security policy. Awareness and training, configuration management, media protection, physical and environment protection.
Operational Control
Attempt to prevent an incident before it occurs. n Hardening, training, Security guards, change management, account disablement policy
Preventative Control
A category of security control that is implemented as a system (hardware, software, or firmware). Technical controls may also be described as logical controls. Encryption, antivirus software, IDSs, IPSs, Firewalls, Least privilege
Technical Control
Attempt to discover incidents after they have occurred. Log monitoring, SIEM systems, security audit, video surveillance, Motion detection, IDSs
Detective Control
Attempt to reverse the impact of an incident; includes IPS, backups, and system recovery. Backups and system recovery, incident handling processes.
Corrective Control
Attempt to discourage individuals from causing an incident. Cable locks, physical locks
Deterrent Control
Are alternative controls when a primary control is not feasible
Compensating Control
Refer to controls you can physically touch
Physical Control
A legal framework that sets guidelines for the collection and processing of personal information of individuals within the European Union (EU)
General Data Protection Regulation (GDPR)
*Gramm-Leach-Bliley Act (GLBA)
*Health Insurance Portability and Accountability Act (HIPAA)
*California Consumer Privacy Act (CCPA)
National, territory, or state laws
an information security standard used to handle credit cards from major card brands. The standard is administered by the Payment Card Industry Security Standards Council, and its use is mandated by the card brands. It was created to better control cardholder data and reduce credit card fraud.
Payment Card Industry Data Security Standard (PCI DSS)
Consensus-developed secure configuration guidelines for hardening (benchmarks) and prescriptive, prioritized, and simplified sets of cybersecurity best practices (configuration guides)
Center for Internet Security (CIS)
An agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness.
National Institute of Standards and Technology (NIST)
A process that integrates security and risk management activities into the system development life cycle through an approach to security control selection and specification that considers effectiveness, efficiency, and constraints due to applicable laws, directives, Executive Orders, policies, standards, or regulations
Risk management framework (RMF)
A set of industry standards and best practices created by NIST to help organizations manage cybersecurity risks
Cybersecurity Framework (CSF)
An independent organization that establishes standards. They develop standards for a wide variety of industrial and commercial applications, and some directly address cybersecurity topics.
International Organization for Standardization (ISO)
Information Security Management, provides information on security management system (ISMS) requirements. Organizations that implement is the ISMS requirements can go through a three stage certification process.
ISO 27001
Information Technology Security Techniques, is a complement to ISO 27001. While ISO 27001 outlines the requirements to become certified, this standard provides organizations with a best practices guideline.
ISO 27002
An extension to ISO 27001 and is a framework for managing privacy controls to reduce the risk of privacy breach to the privacy of individuals.
ISO 27701