Security Controls Flashcards

Comparing and Contrast various types of controls

1
Q

What are the three main security controls

A

Technical, Administrator, and Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Administrative Controls

A

are mainly written by managers to create organizational policies to reduce the risk within companies. Some administrative measures are Annual Security Awareness Training, Annual Risk Assessment, Penetration Testing/Vulnerability Scanning, and Change Management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Technical Controls

A

Are those implemented by the IT team to reduce the risk to the business. These include Firewalls, Antivirus/Antimalware, Screen Savers, Screen Filters, IDS/IPS systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Physical Controls

A

Are controls that can be touched. These include cable locks, laptop safe, Biometric Locks, Fences/Gates, Burglar Alarm, Fire Alarms, and many more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Preventative Controls

A

Are placed to deter any attack, examples are Disable User Accounts and Operating System Hardening.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Deterrent Controls

A

Could be CCTV and motion sensing. Tip CCTV and motion sensors as deterrents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Detective Controls

A

Are used to investigate an incident that has happened and needs to be investigated; these are as follows CCTV and Log Files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Corrective Controls

A

Are the actions you take to recover from an incident. An example Fire Suppression System.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Access Controls are

A

Identification, Authentication, Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Discretionary Access Control

A

Involves New Technology File System (NTFS) file permission used in Microsoft operating system. The user is only given the access that he/she needs to perform their job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rule-Base Access Control means

A

A rule is applied to all people within a department.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hashing

A

Is data that is hashed using an algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hashing the same data

A

two files containing the same data and if hashed with the same hashing algorithm, it will produce the same hash value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Verifying Integrity

A

In forensics the file is hashed at the start and then compared the hash when complete to ensure the hashes match.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

One-way function

A

Hashing is a one-way function and cannot be reversed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hash-Based Message Authentication Code

A

Involves a cryptographic hash function and a secret cryptographic key.

17
Q

Defense in Depth Model

A

Is the concept of protecting a company’s data with a series of defensive layers so that if one layer fails another layer will be already in place to thwart an attack.