General Security Concepts (12%) Flashcards
What are the four Security Controls
Technical Controls
Managerial controls
Operational control
Physical control.
Technical Controls
- Controls implemented using systems
- Operating systems controls
- Firewalls, anti-virus
Managerial Controls
- Administrative controls associated with security design and implementation
- Security Policies, standard operating procedures
Operational Controls
- Controls implemented by people instead of systems,
- Security guards, awareness programs
Physical Controls examples
- Limit physical access
-Guard Shack - Fences, locks
- Badge readers
Preventative control type examples for each control category
Firewall - (Technical)
On boarding Policy (Managerial)
Guard Shack (Operational
Physical (door lock)
Deterrent control type examples for each category
Splash Screen (Technical)
Demotion (Managerial)
Reception Desk (Operational)
Warning Signs (Physical)
Detective control type examples for each category.
System Logs (Technical)
Review login reports (Managerial)
Property Patrols (Operational)
Motion detectors (Physical)
Corrective control types for each category
Back up recovery (Technical)
Policies for reporting issues (Managerial)
Contact authorities (Operational)
Fire extinguisher (Physical)
Compensating control types for each category.
Blocking instead of patching (Technical)
Separation of duties (Managerial)
Require multiple security staff (Operational)
Power Generator (Physical)
Directive control types for each category
File storage Policies (Technical)
Compliance Policies (Managerial)
Security Policy training (Operational)
Sign: Authorised Personal Only (Physical)
What is a compensating control type
Control using other means, Existing controls aren’t sufficient, may be temporary
Directive control types
- Direct a subject towards security compliance
- A relatively weak security control
Preventive control types
Block access to a resource
Deterrent control types
Discourage an intrusion attempt.
Detective
Identify and log an intrusion attempt.
May not prevent access.
Corrective control types
Apply a control after an event has been detected.
Reverse the impact of an event
Continue operating with minimal downtime
The CIA triad
Combination of Principles:
- Confidentiality (Prevent disclosure of information to unauthorised individuals or systems)
-Integrity (Messages cant be modified without detection)
-Availability (Systems and networks must be up and running.
Confidentiality
Certain information should only be known to certain people.
Encryption (Encode messages only certain people can read it)
Access Controls (Selectively Restrict access to a resource).
Two factor authentication (Additional confirmation before information is disclosed)
Integrity
Data is stored and transferred as intended
Hashing ( Map data of an arbitrary length to data of a fixed length)
Hashing (Map data of an arbitrary length to data of a fixed length).
Digital signatures (Mathematical scheme to verify the integrity of data)
Certificates (Combine with a a digital signature to verify an individual).
Non-Repudiation (Provides proof of integrity can be asseted to be genuine
Availability
Information is accessible to authorised user
Redundancy (Build services that will always be available)
System will continue to run, even when a failure occurs
Patching, Stability Close Security holes
Non Repudiation
Confirmation of integrity and proof or origin, with high assurance of authenticity.