Security Controls Flashcards

1
Q

What are Security Controls?

A

They are measures put in place to safeguard systems, data, and information from various threats and risks. They act as barriers or countermeasures to protect assets and reduce vulnerabilities. These controls can be technical, physical, or administrative in nature, such as firewalls, policies, and security cameras.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the differences between security control categories vs. types?

A

Control categories are about the nature or domain of the control (technical, managerial, etc.), whereas control types refer to the function or purpose of the control (preventive, detective, etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of a preventive security control type? EX: Access control systems, security training, antivirus software

A

To prevent security incidents before they occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of a deterrent security control type? EX: Security signage, visible surveillance cameras, security awareness

A

To discourage security violations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of a detective security control type? EX: Intrusion detection systems, log monitoring, audits

A

To detect and identify security breaches that occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of a corrective security control type? EX: Patch management, incident response plans, system backups

A

To correct and restore systems after a security breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of a compensating security control type? EX: Additional monitoring, manual processes in case of automated failure

A

To provide alternatives when existing controls are not feasible or effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of a directive security control type? EX: Security policies, procedures, standards mandating specific behaviors

A

To direct, confine, or control actions of individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are technical security controls?

A

Technical security controls are measures implemented within hardware or software systems to mitigate vulnerabilities and protect against various cyber threats. These controls use logic, algorithms, or software-based solutions to enforce security policies, monitor activities, and prevent or detect unauthorized access or malicious activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of technical controls?

A

The primary goal of technical controls is to defend against unauthorized access and cyber threats, ensure the confidentiality, integrity, and availability of data, and support the secure operation of applications and computing systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are managerial controls?

A

Managerial controls are high-level security measures that focus on strategic planning, governance, and oversight of security policies and procedures. They are established by senior management to ensure that security objectives align with the organization’s overall goals and objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of managerial controls?

A

The purpose of managerial controls is to ensure that the organization’s security policies are being effectively implemented and adhered to. They aim to manage risk, ensure compliance with legal and regulatory requirements, and foster a culture of security within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are operational controls?

A

Operational controls are detailed procedures and practices executed by people and implemented to support and enforce the security policies established by management. They are the day-to-day activities and processes designed to implement, monitor, and maintain security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of operational controls?

A

The primary purpose of operational controls is to ensure that the day-to-day operations of an organization align with its overall security strategy. They are designed to mitigate risks through regular, routine activities and actions carried out by staff members. These controls are essential in bridging the gap between strategic security policies (managerial controls) and the technical safeguards (technical controls) put in place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are physical controls?

A

Physical controls are the tangible and concrete measures we take to protect our organization’s facilities, hardware, and sensitive information from unauthorized physical access, damage, and environmental threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of physical controls?

A

The primary aim of physical controls is to prevent direct physical access to sensitive areas and assets, such as data centers, server rooms, and network hardware. These controls are vital for preventing damage to, or theft of, physical devices and for ensuring that the physical components of an organization’s IT infrastructure are secure from both internal and external threats.

17
Q

What is a threat? EX: Hackers attempting to gain unauthorized access to a system, malware infections, or physical break-ins are all considered threats.

A

A threat refers to any potential danger or harmful event that can exploit a vulnerability. It could be a malicious actor, a piece of malware, a natural disaster, or any circumstance that has the potential to cause harm.

18
Q

What is a vulnerability? EX: Unpatched software, misconfigured permissions, weak passwords, or lack of encryption are common vulnerabilities that attackers exploit

A

A vulnerability is a weakness or gap in a system’s security posture that could be exploited by a threat. It’s a flaw or an oversight that might allow an attacker to compromise the confidentiality, integrity, or availability of a system or data.

19
Q

What is Risk? EX: The risk of a data breach occurring due to a vulnerability in a poorly secured database is the combination of the likelihood of a hacker attempting to exploit it (threat) and the ease with which they can exploit the vulnerability (vulnerability).

A

Risk is the likelihood or probability that a threat will exploit a vulnerability, leading to harm or damage to an organization’s assets, systems, or data. It’s the potential impact or loss resulting from the intersection of a threat exploiting a vulnerability.

20
Q

What are the four primary strategies of risk mitigation?

A

Accept, Avoid, Transfer, Reduce

21
Q

In risk mitigation, what is Acceptance?

A

Acceptance involves acknowledging the existence of a risk and choosing not to take any specific action to address it actively.

22
Q

In risk mitigation, what is avoidance?

A

Avoidance refers to eliminating the risk entirely by not engaging in the activity or situation that could lead to it.

23
Q

In risk mitigation, what is transfer?

A

Transfer involves shifting the risk to another party, typically through contractual agreements, insurance, or outsourcing.

24
Q

In risk mitigation, what is reduction?

A

Reduction focuses on minimizing the impact or probability of a risk by implementing preventive measures or controls.