Comprehensive Security Concepts and Controls for IT Professionals

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/475

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

476 Terms

1
New cards

Technical controls

Security measures implemented through hardware or software (e.g., firewalls, encryption, access control lists).

2
New cards

Managerial controls

Policies, procedures, and guidelines created by management to enforce security (e.g., risk assessments, training requirements).

3
New cards

Operational controls

Day-to-day processes and activities carried out by people to maintain security (e.g., incident response, change management).

4
New cards

Physical controls

Measures that physically restrict or detect access to resources (e.g., locks, fencing, guards, cameras).

5
New cards

Preventive

Aim to stop an incident before it occurs (e.g., firewalls, patching, strong authentication).

6
New cards

Deterrent

Discourage attackers from attempting an attack (e.g., warning signs, guards, security policies).

7
New cards

Detective

Identify and report security incidents after they occur (e.g., IDS, logs, video monitoring).

8
New cards

Corrective

Restore systems after an incident (e.g., backups, patches, system recovery).

9
New cards

Compensating

Alternate control used when the primary control is not possible (e.g., monitoring compensates for lack of encryption).

10
New cards

Directive

Provide instructions or rules for expected behavior (e.g., policies, security banners, acceptable use guidelines).

11
New cards

Confidentiality, Integrity, and Availability (CIA)

The foundational security triad.

12
New cards

Confidentiality

Prevent unauthorized access to data.

13
New cards

Integrity

Ensure data is accurate and unaltered.

14
New cards

Availability

Ensure resources are accessible when needed.

15
New cards

Non-repudiation

Assurance that someone cannot deny their actions (e.g., digital signatures prove the sender's identity).

16
New cards

Authentication, Authorization, and Accounting (AAA)

Framework for access control.

17
New cards

Authentication

Verifying identity (passwords, biometrics, MFA).

18
New cards

Authorization

Granting permissions based on identity (role-based access).

19
New cards

Accounting

Tracking user actions (audit logs).

20
New cards

Authenticating people

Verifying user identity (e.g., biometrics, passwords).

21
New cards

Authenticating systems

Ensuring systems trust each other (e.g., certificates, mutual TLS).

22
New cards

Authorization models

Approaches like role-based (RBAC), mandatory (MAC), discretionary (DAC), or attribute-based (ABAC).

23
New cards

Gap analysis

Comparing current security posture to required standards to identify weaknesses.

24
New cards

Zero Trust

Security model that assumes no implicit trust, requiring continuous verification.

25
New cards

Control Plane

Policies and decisions.

26
New cards

Adaptive identity

Dynamically adjusting authentication based on risk.

27
New cards

Threat scope reduction

Minimizing attack opportunities.

28
New cards

Policy-driven access control

Access rules defined centrally.

29
New cards

Policy Administrator

Manages enforcement rules.

30
New cards

Policy Engine

Evaluates requests against rules.

31
New cards

Data Plane

Where access enforcement occurs.

32
New cards

Implicit trust zones

Previously trusted areas (but reduced in Zero Trust).

33
New cards

Subject/System

Entity requesting access.

34
New cards

Policy Enforcement Point (PEP)

Component that enforces access rules (e.g., firewall, gateway).

35
New cards

Bollards

Barriers preventing vehicle access.

36
New cards

Access control vestibule

Two sets of doors creating a "mantrap" for controlled entry.

37
New cards

Fencing

Physical boundary to prevent unauthorized access.

38
New cards

Video surveillance

Cameras to monitor and record activity.

39
New cards

Security guard

Personnel monitoring access points.

40
New cards

Access badge

ID card or smartcard for authentication.

41
New cards

Lighting

Illumination to deter intruders and improve surveillance.

42
New cards

Sensors

Devices to detect physical presence/movement.

43
New cards

Honeypot

Decoy system to attract attackers and monitor their behavior.

44
New cards

Honeynet

Network of honeypots used to simulate a real environment.

45
New cards

Honeyfile

Fake file designed to detect unauthorized access.

46
New cards

Honeytoken

Decoy credentials or data used to detect malicious activity.

47
New cards

Change management

The structured process of planning, reviewing, approving, and documenting changes to IT systems or business processes in a way that reduces security risks, prevents disruptions, and ensures accountability.

48
New cards

Approval process

Formal review and authorization before implementing changes to ensure security and business alignment.

49
New cards

Ownership

Assigning responsibility for the change (ensures accountability).

50
New cards

Stakeholders

Individuals or groups affected by the change (users, IT, security teams, business units).

51
New cards

Impact analysis

Assessing the potential risks, benefits, and consequences of a change.

52
New cards

Test results

Verifying the change in a controlled environment to ensure it won't introduce new vulnerabilities.

53
New cards

Backout plan

A rollback strategy to restore previous conditions if the change fails or creates security issues.

54
New cards

Maintenance window

Scheduled time frame for applying changes to minimize business disruption.

55
New cards

Standard operating procedure (SOP)

Documented, repeatable steps to implement changes consistently and securely.

56
New cards

Allow lists/deny lists

Controlling what applications, services, or processes are permitted (or blocked).

57
New cards

Restricted activities

Limiting high-risk actions (e.g., disabling USB ports, restricting admin privileges).

58
New cards

Downtime

Period when systems are unavailable; needs to be minimized and communicated.

59
New cards

Service restart

Restarting services after a change, which may temporarily affect availability.

60
New cards

Application restart

Restarting applications as part of the change process, potentially impacting users.

61
New cards

Legacy applications

Older apps that may not support new security measures, requiring extra caution.

62
New cards

Dependencies

Other systems, services, or apps that rely on the system being changed (must be considered to avoid chain failures).

63
New cards

Updating diagrams

Revising system/network architecture diagrams to reflect changes.

64
New cards

Updating policies/procedures

Ensuring written policies and security procedures remain accurate.

65
New cards

Version control

Tracking and managing versions of software, configurations, and documentation to prevent confusion, ensure accountability, and allow rollback if needed.

66
New cards

Public Key Infrastructure (PKI)

A framework for managing digital keys and certificates.

67
New cards

Public key

Shared openly, used to encrypt data or verify signatures.

68
New cards

Private key

Secret key used for decryption or creating digital signatures.

69
New cards

Key escrow

Secure storage of encryption keys for recovery purposes.

70
New cards

Full-disk encryption

Encrypts entire storage drive.

71
New cards

Partition encryption

Encrypts only a partition.

72
New cards

File encryption

Encrypts individual files.

73
New cards

Volume encryption

Encrypts a logical storage volume.

74
New cards

Database encryption

Encrypts whole database contents.

75
New cards

Record encryption

Encrypts specific database records.

76
New cards

Transport/communication encryption

Protects data in transit (TLS, IPSec).

77
New cards

Asymmetric encryption

Uses public/private key pairs (RSA, ECC).

78
New cards

Symmetric encryption

Uses one shared key for encryption/decryption (AES).

79
New cards

Key exchange

Securely sharing encryption keys (Diffie-Hellman, ECDH).

80
New cards

Algorithms

Mathematical methods for encryption (AES, RSA, SHA).

81
New cards

Key length

Strength of encryption, measured in bits (longer = stronger).

82
New cards

Trusted Platform Module (TPM)

Hardware chip for secure key storage.

83
New cards

Hardware Security Module (HSM)

Dedicated device for cryptographic key management.

84
New cards

Key management system

Software to securely generate, store, and distribute keys.

85
New cards

Secure enclave

Isolated environment in CPUs for secure operations.

86
New cards

Steganography

Hiding data within another file (e.g., hidden in an image).

87
New cards

Tokenization

Replacing sensitive data with non-sensitive tokens.

88
New cards

Data masking

Hiding real data by altering its format (e.g., displaying only last 4 digits of a card).

89
New cards

Hashing

One-way function to verify data integrity.

90
New cards

Salting

Adding random data to passwords before hashing to prevent rainbow table attacks.

91
New cards

Digital signatures

Provide authenticity, integrity, and non-repudiation.

92
New cards

Key stretching

Strengthening weak keys by processing them multiple times (PBKDF2, bcrypt).

93
New cards

Blockchain

Decentralized ledger secured with cryptography.

94
New cards

Open public ledger

Transparent distributed record (e.g., cryptocurrencies).

95
New cards

Certificate authorities (CAs)

Trusted entities issuing digital certificates.

96
New cards

Certificate revocation lists (CRLs)

List of revoked certificates.

97
New cards

Online Certificate Status Protocol (OCSP)

Real-time certificate validity check.

98
New cards

Self-signed

Certificate signed by the entity itself (not trusted by default).

99
New cards

Third-party

Certificate issued by a trusted CA.

100
New cards

Root of trust

Foundational trusted certificate authority.