GCGA Ch. 1 Mastering Security Basics Flashcards

1
Q

Security Control Categories

A

Technical, Managerial, Operational, Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Control Types

A

Preventive, Deterrent, Detective, Corrective, Compensating, Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Controls

A

Controlling who accesses data is how you ensure confidentiality (C) in the CIA triad. Identification, authentication, and authorization are the 3 core identity and access management activities that help ensure only authorized personnel can access data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A

Keeping data secret from all but those authorized to access it. This is accomplished by encryption, identification, authentication, and authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Managerial Controls

A

Primarily administrative in function. They are typically documented in an organization’s security policy and focus on managing risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Operational Controls

A

Help ensure that the day-to-day operations of an organization comply with the security policy. People implement them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Physical Controls

A

Impact the physical world, such as locks on doors, fences, security guards, and other objects that you can physically touch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Preventive Controls

A

Attempt to prevent an incident from occurring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Detective Controls

A

Attempt to detect incidents after they have occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Corrective Controls

A

Attempt to restore normal operations after an incident occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Deterrent Controls

A

Attempt to discourage individuals from causing an incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Compensating Controls

A

Alternative controls used when a primary control is not feasible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Directive Controls

A

Provide instruction to individuals on how they should handle security- related situations that arise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encryption

A

Scrambling data to make it unreadable to unauthorized personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Examples of technical controls

A

Encryption, antivirus software, Intrusion Detection Systems (IDSs), Intrusion Prevention Systems (IPSs), firewalls, least privilege principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Examples of managerial controls

A

Risk assessments, vulnerability assessments

17
Q

Examples of operational controls

A

Awareness and training, configuration management, media protection

18
Q

Examples of physical controls

A

Barricades, bollards, access control vestibules, lighting, signs, fences, sensors

19
Q

Examples of preventive controls

A

Hardening (defense-in-depth, layered security, disabling unnecessary ports & services), training (vs social engineers), security guards, account disablement process (ensures employee account is disabled after employee leaves org), IPS

20
Q

Examples of detective controls

A

Log monitoring, SIEM, IDS, security audit (ex. account audit to make sure personnel/technical

21
Q

Examples of corrective controls

A

Backups and system recovery, incident handling processes

22
Q

Examples of deterrent controls

A

Warning signs, login banners

23
Q

Examples of compensating controls

A

Time-based one-time password (temporarily, instead of a smart card)

24
Q

Examples of directive controls

A

Policies, standards, procedures, and guidelines, change management

25
Least privilege principle
specifies that individuals or processes are granted only the privileges they need to perform their assigned tasks or functions, but no more. Privileges are a combination of rights and permissions