General Security Concepts Flashcards
Chapters 1-4
What are the four main control categories?
Technical, Managerial, Operational, and Physical.
Chapter 1
What are Technical Controls?
Technology-based measures such as firewalls and encryption.
Their primary focus is on upholding system integrity, mitigating the risk of unauthorized access, and protecting sensitive data from potential threats.
REMINDER: Technical controls mitigate risk and are implemented by the security team.
Chapter 1
What are Managerial Controls?
Policies, procedures, and guidelines for security management.
Through effective planning, organizing, and performance monitoring, managerial controls ensure that employees are aligned with the organization’s goals, thereby minimizing the potential for risks and enhancing overall operational safety.
Performance reviews
Risk assessments
Code of conduct
Chapter 1
What are Operational Controls?
Day-to-day security practices such as monitoring and access management.
They involve managing operational procedures, ensuring adherence to quality standards, enhancing productivity, and optimizing efficiency. Carried out by people within the organization who play a crucial role in achieving smooth operations and maximizing output.
Incident response procedures
Security awareness training
User access management
Chapter 1
What are Physical Controls?
Measures to safeguard physical assets and premises
Physical Controls focus on the protection of an organization’s tangible assets, facilities, and resources.
Access control vestibule
Biometric locks
Guards/security personnel
Security fences
CCTV surveillance systems
Mantraps
Vehicle barriers
Tamper-evident seals
REMINDER: Physical controls are called physical as you can touch them.
Chapter 1
What are the six control types?
Preventive, Deterrent, Detective, Corrective, Compensating, and Directive.
Chapter 1
What are Preventive controls?
Aimed at preventing security incidents.
These controls are designed to prevent problems or risks from occurring in the first place. They focus on eliminating or minimizing potential threats before they can cause harm. Examples of preventative controls include firewall installations to prevent unauthorized access to computer networks by using access control lists,employee training programs to educate staff about safety procedures and prevent workplace accidents, and quality control checks in the manufacturing process to prevent defects.
REMINDER: Ensure that you study preventive, detective, deterrent, and compensating controls thoroughly.
Chapter 1
What are Deterrent controls?
Intended to discourage potential attackers.
Deterrent controls aim to discourage individuals from engaging in undesirable behaviors or activities. They create a perception of risk or negative consequences to deter potential offenders. Examples of deterrent controls include surveillance cameras in public areas to deter criminal activity, warning signs indicating the presence of a security system to discourage burglars, and strong passwords and multi-factor authentication to discourage unauthorized access to online accounts.
REMINDER: Ensure that you study preventive, detective, deterrent, and compensating controls thoroughly.
Chapter 1
What are Detective controls? Give some examples.
Focused on identifying and detecting security incidents.
Detective controls are implemented to identify and detect problems or risks that have already occurred. They help uncover issues and anomalies promptly to initiate corrective actions. Examples of detective controls include fraud and Security Information and Event Management (SIEM) systems that aggregate and correlate log data from multiple sources, providing a comprehensive view of network activities and enabling the detection of suspicious patterns or behaviors.
REMINDER: Ensure that you study preventive, detective, deterrent, and compensating controls thoroughly.
Chapter 1
What are Corrective controls? Give some examples.
Implemented after an incident to mitigate the impact.
Corrective controls are put in place to address problems or risks after they have been identified. They aim to rectify the situation, mitigate the impact, and restore normalcy. Examples of corrective controls include implementing a backup and recovery system to restore data after a system failure and implementing fixes or patches to address software vulnerabilities.
Chapter 1
What are Compensating controls? Give some examples.
Compensating controls are alternative measures implemented when primary controls are not feasible or sufficient. They help offset the limitations or deficiencies of other controls. Examples of compensating controls include requiring additional layers of approval for financial transactions in the absence of automated control systems, utilizing a secondary authentication method when the primary method fails or is unavailable, and increasing physical security measures when technical controls are compromised.
Chapter 1
What are Directive controls? Give some examples.
Alternative measures to compensate for inadequate primary controls.
Directive controls involve providing specific instructions or guidelines to ensure compliance with policies, procedures, or regulations. They establish a clear framework for employees to follow. Examples of directive controls include a code of conduct or ethical guidelines that outline acceptable behavior within an organization, standard operating procedures (SOPs) that detail step by-step instructions for completing tasks, and regulatory requirements that mandate specific reporting procedures for financial institutions.
Chapter 1
Describe the CIA Triad?
Confidentiality: Confidentiality ensures that sensitive information remains shielded from prying eyes and that access is granted solely to those with the appropriate authorization. Confidentiality safeguards trade secrets, personal data, and any confidential information that requires a digital lock and key.
Integrity: Integrity ensures that your data remains unaltered and trustworthy. It prevents unauthorized changes or manipulations to your information, maintaining its accuracy and reliability. Hashing algorithms such as SHA1 or MD5 provide data integrity.
Availability: This principle guarantees that your digital assets and services are accessible when needed. Availability ensures that your systems are up and running, that your data can be accessed promptly, and that your online services remain accessible.
Chapter 2
What is non-repudiation?
Non-repudiation prevents denial of actions, ensuring accountability and reliability in electronic transactions and communications.
Digital signatures
Audit trails
Access controls
* Identification
* Authentication
* Authorization
REMINDER:Non-repudiation prevents denial of carrying out an action. A digital signature on an email proves that you sent the email; you cannot deny that you sent the email.
Chapter 2
What is an AAA server?
AAA server is responsible for three important tasks: authentication, authorization, and accounting.
Authenticating people: This pivotal process revolves around the meticulous verification of the identities of individuals endeavoring to gain entry into a network or system. Through this authentication procedure, the assurance that solely authorized users are endowed with access privileges is solidified, effectively neutralizing the prospect of potential security breaches. An AAA server collaborates with various authentication methods, including contacting a domain controller in the context of Windows-based networks. When a user initiates an authentication request, the AAA server interfaces with the domain controller, a specialized server responsible for managing user accounts and authentication within a Windows domain environment.
Authenticating systems: At the forefront of modern authentication strategies stand the AAA framework and the 802.1X protocol. This partnership empowers network security by seamlessly integrating a robust authentication process. 802.1X takes the lead in authenticating devices seeking access to a network, and each device must have a valid
certificate on its endpoint.
Authorization models: Controls access permissions. Once a user or system is authenticated, the next layer involves determining what actions they are allowed to perform within the network. Authorization models define the scope of permissible activities.
Accounting: This process involves capturing essential details such as usernames, timestamps, IP addresses, accessed resources, and actions performed. This data is then stored securely, ensuring its integrity and confidentiality. The accounting information can be used for real-time monitoring, historical analysis, and generating reports for compliance or troubleshooting purposes.
Chapter 2
Define Gap Analysis.
Helps you achieve the desired state security.
Gap analysis is a strategic process that evaluates an organization’s security practices against established security standards, regulations, and industry best practices. This assessment identifies discrepancies or “gaps” between the current security posture and the desired state of security.
Chapter 2
What is Zero Trust?
Principle of “never trust, always verify”
The underlying principle is to minimize assumptions and maximize validation. The separation of data and control planes recognizes that efficient and secure networking demands distinct roles. The data plane ensures the efficient movement of information, while the control plane manages the intelligence behind data routing, network health, and device coordination.
Chapter 2
Describe the function of the Control Plane.
Manages and configures network devices and resources
* Adaptive identity:Flexible approach to identity management
* Threat scope reduction:Reducing the attack surface
* Policy engine:Enforces rules and policies
* Policy administrator:Executes the policy engine’s decisions
* Policy-driven access control: Automating the enforcement of directives
REMINDER: The policy engine looks at company policies coupled with threat intelligence data to control access to the network on a per-user basis.
Chapter 2
Describe the function of the Data Plane.
The data plane in cybersecurity is the operational core responsible for the actual movement and forwarding of data packets within a network. It focuses on executing tasks such as securely routing, switching, and packet forwarding based on predefined rules and policies.
- Implicit trust zones:Trusted areas holding resources
- Subject/system:Identifies people/devices
- Policy enforcement point: Monitors and enforces policies within the data plane
Chapter 2
What are some types of physical security controls?
There are 12
Protects people, assets, and infrastructure from threats:
* Bollards: A barrier against vehicular threats
* Access control vestibule: A controlled space for individuals to pass through
* Fencing:Secures the perimeter against intrusions
* Video surveillance:Visual monitoring using cameras for security and surveillance purposes
* Security guard:Acts as a deterrent and responds to security threats
* Access badge:Grants authorized individuals entry to specific areas, enhancing security and restricting unauthorized access
* Lighting: Illuminates areas to deter intruders, and enhances surveillance
* Sensors: Detects intrusions and disturbances to fortify physical security
* Infrared:Detects heat signature changes, identifying human presence
* Pressure: Senses changes in force and translating them into electronic signals
* Microwave: Emits microwave pulses and detects frequency alterations caused by moving objects
* Ultrasonic: Sends out pulses of sound waves and measuring the time it takes for them to return
Chapter 2
What are the four types of deception and disruption technology?
Honeypot: Lures attackers so that we can monitor the latest attack methods
Honeynet: A network of honeypots
Honeyfile: Bait file designed to detect and track unauthorized access attempts discreetly
Honeytoken: Fictitious data or credentials placed as a trap to detect unauthorized access
Chapter 2
What is a Change Advisory Board’s (CAB) responsibility?
Business processes impacting security operation
Responsible for evaluating, prioritizing, and sanctioning changes. The CAB helps prioritize changes and evaluates their financial impact on a company. They decide whether to approve or reject proposed changes that can affect business processes and security operations. It starts with the approval process and the clear clarification of ownership to engaging stakeholders, conducting impact analyses, assessing test results, devising backout plans, orchestrating maintenance windows, and adhering to standard
operating procedures.
Chapter 3
What is the purpose of the approval process in regards to a CAB?
Having the project and budget authorized
The approval process looks at the proposed change and the reasons behind it (for example, due to new technology or more stringent regulations). This change is sent to any affected stakeholders for input. This way, the approval process ensures that the project’s direction aligns with the organization’s goals. Following approval, those changes are thoroughly documented so that they can be tracked once completed.
REMINDER: Before a network administrator can make changes to any network device, they must seek approval from the CAB to ensure the changes are aligned with the organization’s goals.
Chapter 3
In change management, what is Ownership?
Someone who is responsible for a security task
Ownership in change management refers to a person within a department who has asked for a change and will be responsible for ensuring that it is carried out effectively.
Chapter 3