IT Controls Flashcards

1
Q

Multi-Tiered Risk Management (3 tiers)

A

Tier 1: Organization
Tier 2: Mission/Business Processes
Tier 3: Information Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Addressing Tier 3 Risk

A
  1. Categorize
  2. Select
  3. Implement
  4. Assess
  5. Authorize
  6. Monitor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trustworthiness

A

Belief that a security-relevant entity will behave in a predictable manner when satisfying a defined set of security requirements under specified conditions/circumstances
Expresses the degree to which the systems can be expected to preserve the confidentiality, integrity, and availability of the information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security Functionality

A

Security features, functions, mechanisms, services, procedures, and architectures implemented within organizational information systems or the environments in which those systems operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Assurance

A

Measure of the confidence that the security functionality is implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 classes security controls are split into

A
  1. Management/Directive
  2. Operational/Physical
  3. Technical/Logical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Control Structure (5 sections)

A
  1. Control
  2. Supplemental Guidance
  3. Control Enhancements
  4. References
  5. Priority and Baseline Allocation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Baseline Controls

A

Starting point for the security control selection process and are chosen based on the security category and associated impact level of information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Control Designations include

A
  1. Common Controls
  2. System Specific Controls
  3. Hybrid Controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Common Controls

A

Inheritable by one or more organizational information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hybrid Controls

A

One part of the control is common and another part of the control is system-specific

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

6 Control Categories (Don’t Do Crack Riding Pregnant Cows)

A
  1. Deterrent
  2. Preventative
  3. Compensating
  4. Detective
  5. Corrective
  6. Recovery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Deterrent Controls

A

Designed to discourage people from violating security directives
Keeps some potential attackers from attempting to circumvent the control
Example: authorization needed to perform certain functions (action is monitored and recorded)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Preventative Controls

A

Implemented to prevent a security incident or information breach
Controls that keep a user from performing some activity or function
Not optional (like deterrent) and cannot be bypassed (the only way to bypass is finding a flaw in control’s implementation)
Example: segregation of duties (prevents certain users from performing certain tasks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Compensating Controls

A

Implemented to substitute for the loss of primary controls and mitigate risk down to an acceptable level
Introduced when the existing capabilities of a system do not support the requirement of a policy or when a primary control does not mitigate the risk to a level lower than the acceptable risk
Example:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Detective Controls

A

Warning when something has happened (security breach), and are the earliest point in the post-incident timeline
Example: Intrusion detection system

17
Q

Corrective Controls

A

Implemented to remedy circumstance, mitigate damage, or restore controls

18
Q

Recovery Controls

A

Implemented to restore conditions to normal after a security incident
Example:

19
Q

Directive Controls (Administrative)

A

Provide guidance to personnel as to the expected behavior with respect to security within the organization
Example: Personnel security, monitoring, security policies

20
Q

Physical Controls (Operational)

A

Protect organization’s people and physical environment

Example: Locks, guards

21
Q

Technical Controls (Logical)

A

Electronic hardware and software solutions implemented to control access to information and information networks
Examples: User controls, network access, remote access