Security Operations and Administration Flashcards
What does a business continuity plan do?
Provide strategic planning and direction to protect the business’s ability to function after a disruption
What is confidentiality?
Keeping sensitive, private, or proprietary data from being revealed to or accessed by an unauthorized subject
Describe the difference between confidentiality and privacy
Confidentiality is about keeping information secret
Privacy is about choosing who can enter into one’s life or property
What is due care?
Taking steps to ensure that all of your responsibilities can be accomplished satisfactorily
What is due diligence?
Checking to make sure that all of your due care tasks are actually getting the job done correctly and completely
What are mantraps?
Physical security controls that can restrict entry to a protected area
What are phishing attacks most often used to do?
Establish initial access to the target system?
Describe the difference between safety and reliability
Safety requires that when system fails, they do not harm other systems, people, or property. Reliability requires them to produce accurate, on time answers as and when required
Security for collaboration environments most depends on what?
Education and training
What kinds of risks can OT systems pose to IT systems, and vice versa?
Any interconnections provides a path across the security boundary between these systems
What are the different categories of security control functions?
- Directive
- Deterrent
- Preventative
- Detective
- Reactive
- Corrective
- Compensating
- Recovery
What is the difference between a corrective control and a compensating control?
Corrective controls restore or reset the system to its proper state
Compensating controls assist the actions controls, or acts as substitutes for those controls that cannot be directly implemented for various reasons
What is a zero-trust architecture as a security model?
A combination of microsegmentation of networks, stronger authorization tests for resource use, stronger identity management, and behavioral analytics
How do operational technologies (OT) differ from information technologies?
OT use information from physical sensors to make physical actions happen, like opening a valve or moving a mechanism. It can directly damage property or injure/kill people
IT systems move, shape, store, create, and share information. Does not directly interact with the physical world. It would need an OT endpoint system (ex. UAV, robots)