Methodologies and Security Controls Flashcards

1
Q

What is the purpose of a Security Assessment?

A

To check the organizations security and make sure its configured properly to thwart attacks and threats.

Note:  
Vulnerability Assessments
Penetration Testing
Internal and External Audits
Self Assessments 
Password Analysis
And More
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Are these assessments required?

A

They may be in order to fulfill a contract, regulations, or legal requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two main methodologies to conduct an assessment?

A

Active and Passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an active assessment?

A

These are more intrusive techniques. Scanning, hands-on testing, probing the network to find vulnerabilities. These types of assessments have the potential to bring down the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a passive assessment?

A

These use passive collection and analysis of network data. Looking for open source information, and anything that may find information without direct contact with the targeted systems.

Note: Passive techniques are limited in scope.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the first three types of security controls?

A

Physical, Technical, and Administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a physical control?

A

Security measure that physically prevent access to sensitive information or the systems that contain it.

Note: This literally means fences, door locks, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a technical control?

A

These are safeguards and countermeasures to avoid, detect, counteract, minimize security risks to our systems and information.

Note: These are things like passwords and encryption etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an administrative control?

A

These are things to change the behavior of people such as setting a company policy or procedure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What 3 other categories does National Institute of Standards and Technology (NIST) use?

A

Management, Operational, and Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are management controls?

A

Security controls that focus on decision-making and management of risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are operational controls?

A

Focused on things done by people.

User training, testing, disaster recovery, configuration management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are technical controls?

A

Logical controls put into a system to help secure it.

Encryption, AAA, Passwords, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is ANOTHER set of 3 security controls?

A

Preventative, Detective, and Corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are preventative controls?

A

Preventive control: It prevents any security breach from occurring. Aimed at preventing an incident from occurring.

Example

Security guards at door,
Proximity cards or bio-metrics at the entrance to the building,
Change management policy, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are detective controls?

A

Detective controls: Detective controls attempt to detect any break-in that has already happened. Aimed at detecting incidents after they have occurred.

Example

Log monitoring,
Trend analysis,
Security audit
video surveillance systems
motion detection systems.
17
Q

What is a corrective control?

A

Corrective controls: Corrective controls attempt to reverse the impact of an incident or problem after it has occurred. Aimed at reversing the impact of an incident.

Example:

Active IDS. Active intrusion detection systems (IDSs) - IDS detects an intruder and engage systems that block the progression of intrusion.
Backups and system recovery.

18
Q

What is the last security control and why use it?

A

Compensating control - Used whenever you cant meet the requirements for a normal control.

19
Q

Note for exam:

A

Security controls be categorized into multiple types of categories and expect to have to do this on the test.