Identifies Security Requirements Flashcards
Deterrent Controls
It is security measures designed to discourage potential attackers or intruders from attempting to breach security
ex: Intalling Security Cameras and alarm systems to deter burglars from breaking in
remembering: Discourage (warn off) aka see cop // Keep Out Signs
Detective Controls
They are security measures implemented to identify and detect security incidents or breaches after they have occurred
ex: Logging and reviewing access logs to identify unauthorized access attempts
remembering: Detect (find out) aka cop investigates // Security Sleuths
Preventive Controls
They are security measures implemented to stop security incidents or breaches from occuring.
ex: Installing firewalls and antivirus software to block malicious software and prevent cyberattacks
remembering: Prevent (stop it) aka roadblocks // Security Barriers
Proactive Controls
It is a preemptive security measure implemented to prevent or mitigate potential risks before they occur.
ex: Conducting security awareness training for employees to educate them about potential threast and how to recongize and report them
remembering: Ahead of the Game
Physical Access Control
They are security measures designed to restrict and manage physical access to building , rooms, and assets
ex: Locked Doors - Using Key ; Security Guards - Personnel Stationed around ; Surveillance Cameras - Monitoring and Recording Devices
remembering Guardians of the Gate
Interception
It refers to the unauthorized capture and access of data as it being transmitted over a network.
ex: a hacker would use a packet sniffer to capture and analyze network traffic
usually goes with Confidentiality
remembering: Catching something in transit
Interruption
It refers to the disruption of the normal functioning of a system, service, or network.
ex: A power outage interrupts the operations of a data center
goes with Intergrity and Availability
remembering: Stopping the flow of something
Modification
It refers to the unauthorized alteration of data, information of system settings
ex: A hacker alters financial records in a company’s database to commit fruad or hide illegal activites
goes with Intergrity and Availability
remembering: Changing info
Fabrication
It refers to the act of creating false data, information or events with intent to deceive or mislead
ex: An attacker creates fake log entries in a security system to cover their tracks and avoid detection
goes with Intergrity and Availability
remembering: Making up fake info
Confidentiality
Protects information from unauthorized access
remembering: Only right people can see it
Integrity
Ensures data remains accurate and unaltered
remembering: No tampering or corruption
Availability
Ensures authorized users have reliable access to information
remembering: Available when needed
Possession/Control
Ensuring that an entity has control or ownership of the information
remembering: If it’s in their hands it’s in their command
Authenticity
Ensurign that the data, user, or system is genuine and can be verified
remembering: Real of fake???
Utility
Ensuring that information is useful for its intended purpose
remembering: Useless data helps nada
Non-repudiation
q
Ensures that actions, transactions, or communications cannot be denied
remembering: Resistance is futile
Redundancy
It refers to the duplication of critical components, systems or processes within a system or organization to ensure continuous op[eration and fault tolerance
ex: An organization implements redundanct network links and routers to ensure you’re connectivity and minimize downtime in the event of network failures
remembering: Backup Plan B
Residual Data
It refers to traces or remmants of digital information that remain on storage devices or systems even after attempts have been made to delete or erase them.
ex: Even after formatting a USB driver, residual data may remain in unallocated space, posing a security risk if not properly erased
remembering: Ghost Files
Residual Vulnerability
It refers to the remaining susceplibility to potential threats or risks that persit after implementing security controls or mitigation mearsures.
ex: After implemnting access controls, the residual vulnerability of social engineering attacks persists, as attackers may still exploit human erro to bypass security measures
remembering: Lingering Weakness
Residual Risk
It refers to the level of risk that remains after risk mitigation strategies have been implemented.
ex: After implementing safety protocols, the residual risk of workplace accidents still exists, at a residual level
remembering: Leftover Danger
Residual Impact
It refers to the lingering consequences of effects of a risk even that remain after risk mitigation measures have been implemented.
ex: Following the implementation of a disater recovery plan, the residual impact of a natural disater may include temporary business disruptions and loss of productivity
remembering: Aftermath Residue
Principle of Least Privilege
It is a security concept that advocates granting users only the minimum levels of access or permissions necessary to perform their job functions.
ex: An IT admin is granted eveated privileges to manage network resources and systems, but access is restricted to specific task essential for their role
remembering: Just Enough Access
Data at Rest
It is data that is stored but not being used at the moment
remembering: Stored Files
Data in Motion
It is data that is being sent through emails or somewhere over the network basically moving
remembering: Data Moving