Security Controls Flashcards
Categories and types
Technical Security Controls
> Sometimes called logical security controls
Executed by computer systems (instead of people)
Implemented with technology
Examples of technical security controls
> Encryption
IDSs
Firewalls
Characteristics of managerial security controls
> Also known as administrative controls
Focused on reducing the risk of security incidents
Documented in written policies
Examples of managerial security controls
> Organizational security policies
Risk assessments
Security awareness training
Operational Security Controls
> Focus on the day-to-day procedures of an organization.
Used to ensure that the equipment continues to work as specified
Primarily implemented and executed by people
Examples of operational security controls
> Configuration management
Authentication Protocols
Patch management
Examples of physical security controls
> Lightning
Access control vestibules
Fencing/Bollards/Barricades
Security guards
Examples of PREVENTIVE security controls
Encryption, firewalls, AV software
Examples of DETERRENT security controls
Warning signs, lighting, fencings/bollards
Examples of DETECTIVE security controls
Log monitoring, security audits, CCTV, IDS, vulnerability scanning
Examples of CORRCETIVE security controls
> Recovering data from backup copies
Applying software patches and updates to fix vulnerabilities
Developing and implementing IRPs to respond and recover from security incidents
Activating and executing DRPs to restore operations after major incidents.
Examples of COMPENSATING security controls
Backup power systems, MFA, application sandboxing, and network segmentation
Define DIRECTIVE security controls
Refers to the category of security controls that are implemented through policies and procedures. Examples are AUP (Acceptable Use Policy) and IRP (Incident Response Plan).
Which term describes the basic principles of information security?
CIA (Confidentiality, Integrity, and Availability)
In the AAA security architecture, what is the process of granting or denying access to resources?
Authorization
In the AAA security architecture, the process of verifying the identity of a person or process is known as?
Authentication
In the AAA security architecture, the process of tracking accessed services and logging resource consumption is called?
Accounting
Name two solutions that provide the AAA functionality
> TACACS+
RADIUS
In the context of the AAA framework, name common methods of authenticating people
Usernames and passwords, biometrics, MFA.
In the context of the AAA framework, name common methods of authenticating devices
Digital certificates, IP address, and MAC address.