Security Controls and stuff Flashcards

1
Q

What is a security control?

A

Something designed to give a system or data asset the properties of confidentiality, integrity, availability, and non-repudiation. Controls can be divided into three broad categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Technical Control?

A

the control is implemented as a system (hardware, software, or firmware). For example, firewalls, antivirus software, and OS access control models are technical controls. Technical controls may also be described as logical controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an Operational control?

A

the control is implemented primarily by people rather than systems. For example, security guards and training programs are operational controls rather than technical controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Managerial Control?

A

the control gives oversight of the information system. Examples could include risk identification or a tool allowing the evaluation and selection of other security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Preventive Control Function type

A

the control acts to eliminate or reduce the likelihood that an attack can succeed. A preventative control operates before an attack can take place. Access control lists (ACL) configured on firewalls and file system objects are preventative-type controls. Anti-malware software also acts as a preventative control, by blocking processes identified as malicious from executing. Directives and standard operating procedures (SOPs) can be thought of as administrative versions of preventative controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Detective Security Control Functional type

A

the control may not prevent or deter access, but it will identify and record any attempted or successful intrusion. A detective control operates during the progress of an attack. Logs provide one of the best examples of detective-type controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Corrective control

A

the control acts to eliminate or reduce the impact of an intrusion event. A corrective control is used after an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Physical control

A

controls such as alarms, gateways, locks, lighting, security cameras, and guards that deter and detect access to premises and hardware are often classed separately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a deterrent function?

A

the control may not physically or logically prevent access, but psychologically discourages an attacker from attempting an intrusion. This could include signs and warnings of legal penalties against trespass or intrusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Compensating function

A

the control serves as a substitute for a principal control, as recommended by a security standard, and affords the same (or better) level of protection but uses a different methodology or technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the cloud controls matrix

A

Lists specific controls and assesment guidelines that should be implemented by CSPs,the matrix acts as a starting point for cloud contracts and agreements as it provides a baseline level of security competency that the CSP should meet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is security guidance

A

A best practice summary analyzing the unique challenges of cloud environments and how on-premises controls can be adapted to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is enterprise reference architecture

A

Best practice methodology and tools for CSPs to use in architecting cloud solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The statements on standards for Attestation Engagements (SSAE)

A

audit specifications developed by the American Institute of Certified Public Accountants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What Archives

A

refer to sets of data. Since data retention is a high-priority, the systems admin should establish and/or review an archive plan to ensure data sets are held for the appropriate length of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a workflow?

A

An onboarding process that involves identifying the roles and permissions users need. A workflow is often a visual representation of an organization, organized by permissions and account types.

17
Q

What is Privilege bracketing?

A

An account management practice that involves giving users permission to a resource for the duration of a specific project or a need-to-know situation

18
Q

What is User Account Control (UAC)?

A

A windows-specific function that prevents users from invoking administrative privileges without specific authorization

19
Q

What is a Memorandum of Understanding (MOU)?

A

a preliminary or exploratory agreement to express an intent to work together. MOUs usually tend to be relatively informal and do not act as binding contracts

20
Q

What is a Memorandum of Agreement (MOA)?

A

a formal agreement or contract that contains specific obligations rather than a broad understanding.

21
Q

What is a Business Partners Agreement (BPA)?

A

a type of partner agreement that large IT companies, such as Microsoft and Cisco, set up with resellers and solution providers.

22
Q

What is Training Diversity?

A

a mix of training techniques in the form of workshops, seminars, gamification, etc. to foster user engagement and retention.

23
Q

What is Gamification?

A

a training technique to engage users by adding game-like elements to content to encourage participation.

24
Q

What is Vendor diversity?

A

a “defense in depth” practice of implementing security controls from different vendors.

25
Q

What is table-top excersize?

A

when a group of employees get together and run through various scenarios as if they were happening. Each employee discusses what they would do in their role.