SG#1 Flashcards
Deterrent Control
A Deterrent Control serves to inhibit the attacker by reducing the possibility of success from the viewpoint of the attacker.
Preventive Control
Preventive Controlrefers to the prevention of specific action from occurring. For example, Firewall
Corrective Control
Corrective Control is an attempt to reduce the amount of damage and is used after an event. For example, ‘Backup’ helps the rapid restoration of operation.
Compensating Control
To directly address the threat when there is no control available, one thing needed to meet the requirement is ‘Compensating Control.’ For example, the ‘Fire suppression System’ that do not stop fire damage but can limit fire damage
Technical Control
When some form of technology is used to address the physical security issue, it is referred to as a ‘Technical Control.’ For example, Biometrics.
Administrative Control
Limiting the security risks through policies and procedures is known as ‘Administrative Control.’ For example: Giving instructions to a security guard.
Data Owner
The data owner is accountable for specific data, and is often a senior officer of the organization.
Data Protection Officer (DPO)
The data protection officer (DPO) is responsible for the organization’s data privacy. The DPO commonly sets processes and procedures for maintaining the privacy of data.
Data Steward
Manages access rights to the data. Example the IT Team.
Data Processor
Is often a third party that processes data on behalf of the data controller
Data Controllers
Are people in charge of the data’s processing purposes and methods.
OSINT
Open Source Intelligence
Is the process of obtaining information from open sources, such as social media sites, corporate websites, online forums, and other publicly available locations
Wireshark
Is protocol analyzer and it can provide information about every frame that traverses the network. it can show process and details about the payloads used during the attempt.
Netstat
Command to display connectivity information about a device.
Nmap
A tool for understanding the potential exploit vectors device, but it wont show information about an active exploitation attempt.
Jump Server
A Jump server is a highly secured device commonly used to access secure areas of another network.
It usually connects to the jump server using the SSH or VPN tunnel and then jumps to another devices on the inside of the protected Network.
MSP`
Manages Service Provider
Provides outsourced monitoring and administration of security devices and systems.
It usually manages firewalls, intrusion detection , virtual private networks
HSM
Hardware Security Module
Provides a way for Cryptographic functions like hashing, encryption etc. it manages and stores keys in a secure location by keeping the back up of the key.
NAC
Network Access Control
With NAC, the traffic flow from inside or outside the network is controlled.
It can be enable or disabled easily.
Airgap
Logical or physical separation of a network from all other networks.
RADIUS
Remote Authentication Dial-In User Service
Is a common authentication Method of centralizing authentication for users.
This avoids the need to have separate local accounts on different devices.
PAP
Password Authentication Protocol
Is an authentication method that can validate a username and password.
It does not provide centralized authentication database.
IPSec
Its primary goal is to offer CIA (Confidentiality, integrity and Authentication)
It is commonly used as an encrypted tunnel between sites or endpoints.
It is useful for protecting data sent over the network.
Least Privilege
It limits the rights and permission of a user account to only the access required to accomplish their objectives.
This policy would limit the scope of an attack originating from a user in the IT department.
Separation of Duties
It ensures that multiple users are required to complete a single business process.
DAC
Discretionary Access Control
With this, access and permission are determined by the owner or originator of the files or resources.
WPS
Wifi Protected Setup
Provides simplified mechanisms to configure secure wireless networks.
The External registrar PIN exchange mechanism is susceptible to bruteforce attacks.
Acceptance
Risk acceptance is a business decision that places the responsibility of the risky activity on the organization itself.
Mitigation
Strategies to limit the impact of threat against data in custody.
Transference
The act of shifting risks from one area (or organization) to another.
Risk-avoidance
The elimination of hazards, activities and exposures that can negatively affect an organization and its assets.
Sideloading
The installation of software from a third party rather than an approved source.