GCGA Ch. 9 Implementing Controls to Protect Assets Flashcards

1
Q

Physical security controls

A

controls you can physically touch. They often control entry and exit points and include various types of locks. Controlled areas such as data centers and server rooms should only have a single entrance and exit point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cable locks

A

secure mobile computers such as laptop computers in a training lab. Small devices can be stored in safes or locking office cabinets to prevent the theft of unused resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access badges

A

can electronically unlock a door and help prevent unauthorized personnel from entering a secure area. By themselves, proximity cards do not identify and authenticate users. Some systems combine proximity cards with PINs for identification and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security guards

A

a preventive physical security control, and they can prevent unauthorized personnel from entering a secure area. A benefit of guards is that they can recognize people and compare an individual’s picture ID for people they don’t recognize.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cameras and closed-circuit television (CCTV) systems

A

provide video surveillance and can give reliable proof of a person’s identity and activity. Many cameras include motion detection and object detection capabilities. It’s also possible to use CCTV systems as a compensating control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Sensors

A

can detect changes in the environment, such as motion, noise, and temperature changes. Sensors can also be used to detect changes in pressure, such as when someone is walking on a floor. Motion detection may be accomplished using microwave technology or ultrasonic waves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fencing, lighting, and alarms, motion detection systems

A

commonly implemented for physical security. Infrared motion detection systems detect human activity based on temperatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Barricades

A

provide stronger physical security than fences and attempt to deter attackers. Bollards are effective barricades that allow people through but block vehicles. Access control vestibules consist of two sets of interlocking doors, designed to create a secure compartment that allows only one person to enter at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Asset management processes

A

track an organization’s hardware, software, and data assets. They should include acquisition/procurement processes, assignment/accounting processes, and monitoring/asset tracking processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Layered security

A

Organizations use a diversity of methods to provide layered security. Vendor diversity is the practice of implementing security controls from different vendors to increase security. Technology diversity uses different technologies to protect an environment, and control diversity uses different security control types, such as technical controls, managerial controls, operational controls, and physical controls. Physical security controls may be subjected to brute force attacks where someone simply crashes through the control. Facilities may also be subject to environmental attacks where the attacker alters the temperature, humidity, or other conditions to disable equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Single point of failure

A

any component that can cause the entire system to fail if it fails. It normally refers to hardware but can be a person. If one person is the only person who can perform a task, that person can be a single point of failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RAID disk subsystems

A

provide fault tolerance and increase availability. RAID-1 (mirroring) uses two disks. RAID-5 uses three or more disks and can survive the failure of one disk. RAID-6 and RAID-10 use four or more disks and can survive the failure of two disks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Load balancers

A

spread the processing load over multiple servers. In an active/active configuration, all servers are actively processing requests. In an active/passive configuration, at least one server is not active but is instead monitoring activity ready to take over for a failed server. Software-based load balancers use a virtual IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Affinity scheduling

A

sends client requests to the same server based on the client’s IP address. This is useful when clients need to access the same server for an entire online session. Round-robin scheduling sends requests to servers using a predefined order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NIC teaming

A

groups two or more physical network adapters into a single software-based network adapter. It provides load balancing for outgoing traffic and fault tolerance if one of the NICs fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Power redundancies

A

include a UPS, a dual power supply, and generators. Managed PDUs monitor the quality of power delivered to devices within a server rack.

17
Q

Offline backups

A

use traditional backup media such as tapes, local disks, drives in a NAS, and even backup targets within a SAN. Online backups are stored in the cloud.

18
Q

Traditional backup methods

A

include full, full/differential, full/incremental, snapshot, and image strategies. A full backup strategy alone allows the quickest recovery time. Full/incremental backup strategies minimize the amount of time needed to perform daily backups. Full/ differential backup strategies minimize the amount of time required to restore backups.

19
Q

Backup best practices

A

A copy of backups should be kept off-site and should be kept far enough away so that a disaster impacting the primary site doesn’t impact the backups. It’s important to consider the distance between the main site and the off-site location.

20
Q

Backup location

A

The location of the data backups affects data sovereignty. If backups are stored in a different country, the backups’ data is now subject to the laws and regulations of that country. Backups should be encrypted to protect the sensitive data they contain from compromise should the backup media be lost or stolen.

21
Q

BIA

A

A business impact analysis (BIA) is part of a business continuity plan (BCP), and it identifies mission- essential functions, critical systems, and vulnerable business processes that are essential to the organization’s success. The BIA identifies maximum downtimes for these systems and components. It considers various scenarios that can affect these systems and components, and the impact to life, property, safety, finance, and reputation from an incident.

22
Q

RTO

A

A recovery time objective (RTO) identifies the maximum amount of time it should take to restore a system after an outage.

23
Q

RPO

A

The recovery point objective (RPO) refers to the amount of data you can afford to lose.

24
Q

MTBF

A

The mean time between failures (MTBF) identifies the average (the arithmetic mean) time between failures.

25
MTTR
The mean time to repair (MTTR) identifies the average (the arithmetic mean) time it takes to restore a failed system. Continuity of operations planning identifies alternate processing sites (used for site resiliency) and alternate business practices. Recovery sites provide alternate locations for business functions after a major disaster.
26
Hot site
A hot site includes everything needed to be operational within 60 minutes and is the most effective recovery solution but is also the most expensive. A cold site has power and connectivity requirements and little else and is the least expensive to maintain. Warm sites are a compromise between hot sites and cold sites.
27
DRP
A disaster recovery plan (DRP) identifies how to recover critical systems after a disaster and often prioritizes services to restore after an outage.
28
Periodic testing
validates continuity of operations plans.
29
Tabletop exercises
Exercises validate the steps to restore individual systems, activate alternate sites, and document other actions within a plan. Tabletop exercises are discussion-based only.
30
Simulations
functional exercises that allow personnel to test the plans in a simulated operational environment. Parallel processing makes sure that the disaster recovery site is actually working by activating it during the test. Fail over tests actually shut down the primary site and test whether the recovery site properly handles the load.
32