General Security Concepts Flashcards
Technical Control Category
-Controls implemented using systems.
- Operating System controls
Examples of technical controls include firewall rules, intrusion prevention systems (IPSs) and intrusion detection systems (IDSs), and encryption standards, anti-virus
Managerial Control Category
-Admin controls associated with security design and implementation.
-Security Policies, Standard Operating Procedures
Examples of managerial controls include organization-wide security policies, organizational best practices, periodic risk assessments, and security-aware change management.
Operational Control Category
Operational controls focus on the day-to-day policies implemented by peopled instead of systems.
Examples of operational controls include security guards checking ID badges, user access reviews, and employee awareness training.
Physical Control Category
-Limit Physical Access
Physical controls include bollards, fencing, access control vestibules, video surveillance, security guards, access badge, lighting, sensors (pressure, microwave, infrared, ultrasonic)
Preventive Control Type
Block access to a resource.
-You shall not pass.
- For example, a firewall prevents access to a network by stopping suspicious traffic. Follow security policy, Guard shack checks all identification. Enable door locks.
Deterrent Control Type
-Discourage an intrusion attempt
-Does not directly prevent access.
- Make an attacker think twice. Application splash screens, threat demotion, front reception desk, posted warning signs.
Detective Control Type
-Identify and log an intrusion attempt
-May not prevent access
- Find the issue. Collect and review system logs, review login reports, regularly patrol the property, enable motion detectors.
Corrective Control Type
-Apply a control after an event has been detected
-Reverse the impact of an event
-continue operating with minimal downtime.
-Correct the problem. Restoring from backups can mitigate a ransomware infection. Created policies for reporting security issues. Contact law enforcement to manage criminal activity. Use a fire extinguisher.
Compensating Control Type
-Control using other means.
-Existing controls aren’t sufficient.
-May be temporary.
-Prevent the exploitation of a weakness.
-Firewall blocks a specific application instead of patching the app, Implement a separation of duties. Require simultaneous guard duties. Generator used after power outage.
Directive Control Type
-direct a subject towards security compliance.
-relatively weak security control
- Do this please:
Store all sensitive files in a protected folder
Create Compliance policies and procedures
Train users on proper security policy
Post a sign for “Authorized Personnel Only”
The CIA triad
Combination of principles.
-Fundamentals of of security.
(CIA)
Confidentiality
Prevent disclosure of info to unauthorized individuals or systems.
Certain info should only be known to certain people.
(CIA)
Integrity
Messages can’t be modified without detection
Data is stored and transferred and intended.
Integrity
Hashing
Map data of an arbitrary length to data of fixed length.
Integrity
Digital Signatures
Mathematical scheme to verify the integrity of data
Integrity
Certificates
combine with a digital signature to verify an individual
(CIA)
Availability
Systems and networks must be up and running.
Information is accessible to AUTHORIZED users.
Always at your fingertips.
Availability
Redundancy
Build services that will always be available.
Availability
Fault Tolerance
System will continue to run, even when a failure occurs.
Availability
Patching
Stability, Close security holes.
Confidentiality
Encryption
Encode messages so only certain people can read it.
Confidentiality
Access Controls
Selectively restrict access to a resource. Who has access to what.
Confidentiality
Two-factor Authentication
Additional confirmation before information is disclosed.
Integrity
Non-repudiation
provides proof of integrity (Verify data does not change), can be asserted to be genuine.
You can’t deny what you’ve said.