Lesson 1 Flashcards
Compare/Contrast Various types of Security Controls
Threat
Potential Danger
Vulnerability
A weakness
Threat actor
adversary with malicious intent
Exploit
When a threat actor successfully takes advantage of a vulnerability
Controls
Tactics or mechanisms or strategies to proactively minimize risks
3 ways controls minimize risks
Reduce or eliminate
1) vulnerability
2) likelyhood a threat actor will be able to exploit a vulnerability
3) impact of an exploit
Countermeasures
controls implemented to adress a specific threat. Reactive and more effective, but less broadly efficient (example: block specific IP)
Functionality
what a control does
effectiveness
how well control works
Assurance
measure of confidence measured controls are effective
control objective
statement of desired result/purpose to be achieved by implementing a control or set of controls
Defense-in-Depth
(layered security)
design and implementation of multiple overlapping layers of diverse controls
security control baseline
minimum standards for a given environment
scoping
elimining unnecessary baseline recommendations
tailoring
customizing baseline recs to align with organizational requirements