Security Controls Flashcards

Week 4

1
Q

What are Security Controls?

A

Measures designed to protect systems, data, and networks from threats, ensuring confidentiality, integrity, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the categories of Security Controls?

A

Security controls fall into three categories: Managerial, Operational, and Physical, each addressing different security aspects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Managerial Control category?

A

Managerial controls include policies, risk assessments, and security frameworks to guide security strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Operational Control category?

A

Operational controls involve daily security procedures, incident response, and staff training to manage risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Physical Control category?

A

Physical controls protect physical assets, such as locks, surveillance cameras, fences, and access control systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Layering Security Controls (Defense-in-Depth)

A

A security strategy that layers multiple controls (technical, physical, and administrative) to provide robust protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the goals of Security Controls?

A

Security controls aim to prevent, detect, respond to, and recover from cyber threats and incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Security Incidents?

A

Events that compromise confidentiality, integrity, or availability, such as breaches, malware, or unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the difference between Risk, Threats, and Vulnerabilities?

A

Risk is potential harm, Threats are actors or events causing harm, and Vulnerabilities are weaknesses threats exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Risk Mitigation?

A

Risk mitigation involves reducing risks through security controls, policies, and proactive measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the Four Primary Risk Mitigation Strategies?

A

Avoidance – Eliminate the risk
Reduction – Minimize the risk impact
Transfer – Shift risk responsibility (e.g., insurance)
Acceptance – Acknowledge and monitor the risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Preventative Controls?

A

Security measures designed to stop threats before they occur, such as firewalls, encryption, and access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do Preventative and Detective Controls differ?

A

Preventative controls stop attacks, while Detective controls identify and alert on suspicious activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are Corrective Controls?

A

Actions taken to fix security issues after an incident, such as restoring systems and applying patches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Deterrent Controls?

A

Security measures that discourage attackers from targeting a system, such as warning signs and security cameras.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Directive Controls?

A

Policies and procedures that guide security behavior, such as security awareness training and acceptable use policies.

17
Q

What are Compensating Controls?

A

Alternative security measures used when primary controls are not feasible, such as multi-factor authentication when passwords are weak.

18
Q

What is Security Awareness Training?

A

Education for employees to recognize threats like phishing, social engineering, and malware.

19
Q

What is Change Management in security?

A

A structured approach to updating systems, policies, or configurations to reduce security risks.

20
Q

What is an Account Disablement Policy?

A

A policy that disables user accounts after termination or inactivity to prevent unauthorized access.

21
Q

What is Hardening?

A

Strengthening security by removing vulnerabilities, such as disabling unused services and updating software.

22
Q

What is an IPS?

A

A security tool that detects and blocks malicious activity in real time before it affects a system.

23
Q

What is SIEM?

A

A system that collects, analyzes, and alerts on security events to detect and respond to threats.

24
Q

What is Vulnerability Patching?

A

The process of fixing security flaws in software or hardware to prevent exploitation.

25
Q

What is the importance of Backup and System Recovery?

A

Ensures data can be restored after an attack, hardware failure, or accidental deletion.

26
Q

What are Cable Locks used for?

A

Physical security devices that secure laptops and hardware to prevent theft.

27
Q

What are Hardware Locks?

A

Physical security mechanisms like keyed locks, biometric scanners, and electronic access controls.

28
Q

How do Video Surveillance & Guards improve security?

A

Monitors and restricts access to protect facilities and deter unauthorized activities.

29
Q

What is a Security Control Assessment (SCA)?

A

A review process to ensure security controls are effective and properly implemented.

30
Q

What is a Risk Assessment?

A

The process of identifying, analyzing, and prioritizing security risks to minimize threats.

31
Q

What is a Vulnerability Assessment?

A

A security check to identify weaknesses in systems before they are exploited.

32
Q

What is Penetration Testing (Pen Testing)?

A

A simulated cyberattack used to test security defenses and find vulnerabilities before real hackers do.