Objective 1.1 Flashcards

Compare and contrast various types of security controls

1
Q

Security Controls Categories

A
  • Technical Controls
  • Managerial Controls
  • Operational Controls
  • Physical Controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TMOP

A
  • Technical Controls
  • Managerial Controls
  • Operational Controls
  • Physical Controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The technologies, hardware and software mechanisms that are implemented to manage and reduce risks.

A

Technical Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Examples of technical controls

A
  1. Antivirus
  2. Firewalls
  3. Encryption Processes
  4. Intrusion Detection Systems (IDS like SNORT)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Involve the strategic planning and governance side of security.

Is about making informed decisions and ensure that the organization is on the same security page.

A

Managerial Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Example of Managerial Control

A
  1. Conduct a risk assesment to understand the potential risks and vulnerabilities and assess if a tool implementation or a new network archtecture will align with the company’s broader risk strategy.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Managerial Contols encompass:

A
  • Risk Assessment
  • Security Policies
  • Training Programs
  • Incident Response Strategies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

[Managerial Contols]
RiskAss
SecPo
TaingPo
IncResp

A
  • Risk Assessment
  • Security Policies
  • Training Programs
  • Incident Response Strategies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Procedures and measures that are designed to protect data on a day-to-day basis and are mainly governed by internal processes and human actions.

A

Operational Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Examples of Operational Controls:

A
  • Organization requires that you change your password every 90 days.
  • Backup Procedures
  • Account Reviews
  • User Training Programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Tangible, real-world measures taken to protect assets.

A

Physical Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Example of physical controls:

A
  • Shredding of sensitive documents
  • Security guards
  • Locking the doors
  • Cameras
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Control Types

A
  • Preventive Controls
  • Deterrent Controls
  • Detective Controls
  • Corrective Controls
  • Compensating Controls
  • Directive Controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Proactive mesaures implemented to thwart potential security threats or breaches

A

Preventive Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Aim to discourage potential attackers by making the effort seem less appealing or more challenging.

A

Deterrent Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Monitor and alert organizations to malicious activities as they occur or shortly thereafter.

A

Detective Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Mitigate any potential damage and restore the systems to their normal state.

A

Corrective Controls

18
Q

Alternative measures that area implemented when primary security controls are not feasible or effective.

A

Compensating Control

19
Q

Often rooted in policy or documentation and set the standards for behavior within an organization.

A

Directive Controls

20
Q

Is a cybersecurity approach that assumes no user or system is trusted by default and requires continuous verification for access to organizational resources.

A

Zero Trust

21
Q

Demands verification for every device, user, and transaction within the network, regardless of its origin.

A

Zero Trust

22
Q

Zero Trust Planes

A

Control Plane
Data Plane

23
Q

[Zero Trust] The overarching framework and set of components responsible for defining, managing, and enforcing the policies related to user and system access within an organization.

A

Control Plane

24
Q

[Zero Trust-CoP] Control Plane encompass…

A
  • Adaptative Identity
  • Threat Scope Reduction
  • Policy-driven Access Control
  • Secured Zones
25
Q

[Zero Trust-CoP] Adaptative Identity

A

Use adaptative identity that rely on real-time identity validation that takes into account the user’s behavior, device, location, and more.

26
Q

[Zero Trust-CoP] Threat Scope Reduction

A

Limit the users’ access to only what they need for their work tasks because ths drastically reduces the network’s potential attack surface.

27
Q

[Zero Trust-CoP] Policy-Driven Access Control

A

Entails developing, managing, and enforcing user access policies based on their roles and responsabilities.

28
Q

[Zero Trust-CoP] Secured Zones

A

Isolated environments within a network that are designed to house sensitive data.

29
Q

[Zero Trust-CoP] Control Plane uses:

Policy ……..
Policy ……..

A

[Zero Trust-CoP] Control Plane uses:

Policy Engine
Policy Administrator

30
Q

[Zero Trust-CoP] Policy Engine

A

Cross-references the access request with its predefined policies (like a rule book).

31
Q

[Zero Trust-CoP] Policy Administrator

A

Used to establish and manage the access policies.

32
Q

[Zero Trust] Data Plane

A
  • Subject/System
  • Policy Enforcement Point
33
Q

[Zero Trust-DP] Subject/System

A

Refers to the individual or entity attempting to gain access.

34
Q

[Zero Trust-DP] Policy Enforcement Point

A

Allow or restrict access, and it will effectively act as a gatekeeper to the sensitive areas of the systems or networks.

35
Q

Process of evaluating the differences between an oganization’s current performance and its desired performance.

A

Gap Analysis

36
Q

Gap Analysis Steps

A
  1. Define the scope of the analysis
  2. Gather data on the current state of the organization
  3. Analyze the data to indentify the gaps
  4. Develop a plan to bridge the gap
37
Q

2 types of gap analysis:

A

Technical Gap Analysis
Business Gap Analysis

38
Q

Technical Gap Analysis

A

Involves evaluating an organization’s current technical infrastructure and indetifying any areas where it falls short of the technical capablities required to fully utilize their security solutions.

39
Q

Business Gap Analysis

A

Involves evaluating and organization’s current business processes and identifying any areas where they fall short of the capabilities required to fully utilize cloud-based solutions.

40
Q

Outlines the specific measures to address each vulnerability, allocate resources, and set up timelines for each remediation task that is needed.

A

POA&M - Plan of Action and Milestones

41
Q

Is a powerful tool that can help organizations to improve their security and their performance by identifying areas where improvements can be made.

A

Gap Analysis