Security Controls Flashcards

Categories and types

1
Q

Technical Security Controls

A

> Sometimes called logical security controls
Executed by computer systems (instead of people)
Implemented with technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Examples of technical security controls

A

> Encryption
IDSs
Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Characteristics of managerial security controls

A

> Also known as administrative controls
Focused on reducing the risk of security incidents
Documented in written policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Examples of managerial security controls

A

> Organizational security policies
Risk assessments
Security awareness training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Operational Security Controls

A

> Focus on the day-to-day procedures of an organization.
Used to ensure that the equipment continues to work as specified
Primarily implemented and executed by people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Examples of operational security controls

A

> Configuration management
Authentication Protocols
Patch management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Examples of physical security controls

A

> Lightning
Access control vestibules
Fencing/Bollards/Barricades
Security guards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Examples of PREVENTIVE security controls

A

Encryption, firewalls, AV software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Examples of DETERRENT security controls

A

Warning signs, lighting, fencings/bollards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Examples of DETECTIVE security controls

A

Log monitoring, security audits, CCTV, IDS, vulnerability scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Examples of CORRCETIVE security controls

A

> Recovering data from backup copies
Applying software patches and updates to fix vulnerabilities
Developing and implementing IRPs to respond and recover from security incidents
Activating and executing DRPs to restore operations after major incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Examples of COMPENSATING security controls

A

Backup power systems, MFA, application sandboxing, and network segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define DIRECTIVE security controls

A

Refers to the category of security controls that are implemented through policies and procedures. Examples are AUP (Acceptable Use Policy) and IRP (Incident Response Plan).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which term describes the basic principles of information security?

A

CIA (Confidentiality, Integrity, and Availability)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In the AAA security architecture, what is the process of granting or denying access to resources?

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In the AAA security architecture, the process of verifying the identity of a person or process is known as?

A

Authentication

17
Q

In the AAA security architecture, the process of tracking accessed services and logging resource consumption is called?

A

Accounting

18
Q

Name two solutions that provide the AAA functionality

A

> TACACS+
RADIUS

19
Q

In the context of the AAA framework, name common methods of authenticating people

A

Usernames and passwords, biometrics, MFA.

20
Q

In the context of the AAA framework, name common methods of authenticating devices

A

Digital certificates, IP address, and MAC address.