Security Controls Flashcards
Comparing and Contrast various types of controls
What are the three main security controls
Technical, Administrator, and Physical
Administrative Controls
are mainly written by managers to create organizational policies to reduce the risk within companies. Some administrative measures are Annual Security Awareness Training, Annual Risk Assessment, Penetration Testing/Vulnerability Scanning, and Change Management.
Technical Controls
Are those implemented by the IT team to reduce the risk to the business. These include Firewalls, Antivirus/Antimalware, Screen Savers, Screen Filters, IDS/IPS systems.
Physical Controls
Are controls that can be touched. These include cable locks, laptop safe, Biometric Locks, Fences/Gates, Burglar Alarm, Fire Alarms, and many more.
Preventative Controls
Are placed to deter any attack, examples are Disable User Accounts and Operating System Hardening.
Deterrent Controls
Could be CCTV and motion sensing. Tip CCTV and motion sensors as deterrents.
Detective Controls
Are used to investigate an incident that has happened and needs to be investigated; these are as follows CCTV and Log Files.
Corrective Controls
Are the actions you take to recover from an incident. An example Fire Suppression System.
Access Controls are
Identification, Authentication, Authorization
Discretionary Access Control
Involves New Technology File System (NTFS) file permission used in Microsoft operating system. The user is only given the access that he/she needs to perform their job.
Rule-Base Access Control means
A rule is applied to all people within a department.
Hashing
Is data that is hashed using an algorithm
Hashing the same data
two files containing the same data and if hashed with the same hashing algorithm, it will produce the same hash value.
Verifying Integrity
In forensics the file is hashed at the start and then compared the hash when complete to ensure the hashes match.
One-way function
Hashing is a one-way function and cannot be reversed