General Security Concepts Flashcards

1
Q

Technical Controls

A

Controls implemented using hardware, software, and/or firmware.
Examples: Firewalls, anti-virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Managerial Controls

A

Relate to risk management, governance, oversight, strategic alignment and decision making Examples: risk assessments, project management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Operational Controls

A

Aligned with a processes that are primarily implemented and executed by people.
Examples: change management, training, testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Physical Controls

A

Designed to address physical interactions like connected to buildings.
Examples: gates, barricades, fences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Preventive Control

A

Stop a threat agent from being successful
Examples: Firewall rules, security policy, security guard, door locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Deterrent Control

A

Discourage a threat agent from acting
Examples: posted warning signs, threat of demotion, splash screen, reception desk,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Detective Control

A

Identify and report a threat agent or action
Examples: System logs, review login reports, patrol the property, motion detectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Corrective Control

A

Minimize the impact of a threat agent or modify or fix a situation
Examples: Backups, fire extinguisher, policies for reporting issues, contact authorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Compensating Control

A

Controls implemented in lieu of a recommended control that provides comparable protection
Examples: Block instead of patch, separation of duties, require multiple security staff, power generator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Directive Control

A

Proactive actions taken to cause/encourage a desirable event or outcome to occur
Examples: Trainings, policies, and authorized personnel only sign

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CIA Traid

A

Fundamentals of security
Confidentiality: prevents disclosure of information to unauthorized people or systems
Integrity: Information can’t be modified
Availability: Systems and networks must be up and running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Access Controls

A

Selectively restrict access to a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hashing

A

Map data of a length to data of a fixed length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Digital signatures

A

Math scheme to verify the integrity of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Certificates

A

Combine with a digital signature to verify an individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Non-Repuditation

A

Provides proof of integrity, can be asserted to be genuine.

17
Q

Redundancy

A

Build services that will always be available

18
Q

Fault tolerance

A

system will continue to run, even when a failure occurs.

19
Q

AAA

A

Authentication: Verifies a user and who they claim to be
Authorization: Determines if the user has permission to use a resource or access a file.
Accounting: Keeps track of a user’s activity on the system or network.

20
Q

Certificate Authority (CA)

A

Stores, signs, and issues digital certificates.

21
Q

Registration Authority (RA)

A

Verifies user requests for a digital certificate and tells the CA to issue it.

22
Q

Honeypot

A

Decoy server set up to trick an attacker

23
Q

Honeyfile

A

A decoy file deceptively named so it attracts the attention of an attacker

24
Q

Honeynet

A

A network of honeypots.

25
Q

Honeytoken

A

A beacon embedded somewhere that can bait and track an attacker

26
Q

Gap Analysis

A

The process of evaluating your organization’s current security posture and security framework

27
Q
A