domain 1

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/109

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

110 Terms

1
New cards

Security Control Categories

Technical, managerial, operational, and physical controls

2
New cards

Technical Control

Uses technology to protect systems such as firewalls and encryption

3
New cards

Managerial Control

Administrative and policy-based security decisions

4
New cards

Operational Control

Human-based processes such as training and procedures

5
New cards

Physical Control

Protects facilities and hardware using locks, guards, and barriers

6
New cards

Preventive Control

Stops security incidents before they occur

7
New cards

Deterrent Control

Discourages attackers

8
New cards

Detective Control

Identifies and records security events

9
New cards

Corrective Control

Fixes systems after an incident

10
New cards

Compensating Control

Alternative control when primary control is not possible

11
New cards

Directive Control

Guides behavior through policies and procedures

12
New cards

Confidentiality

Prevents unauthorized access to data

13
New cards

Integrity

Prevents unauthorized modification of data

14
New cards

Availability

Ensures systems and data are accessible when needed

15
New cards

Non-repudiation

Ensures actions cannot be denied

16
New cards

AAA

Authentication, authorization, and accounting

17
New cards

Authentication

Verifying identity

18
New cards

Authorization

Determining allowed actions

19
New cards

Accounting

Logging and tracking user activity

20
New cards

Authenticating People

Verifying human users

21
New cards

Authenticating Systems

Verifying devices or services

22
New cards

Discretionary Access Control (DAC)

Data owner decides access permissions

23
New cards

Mandatory Access Control (MAC)

Central authority enforces access rules

24
New cards

Role-Based Access Control (RBAC)

Access based on job role

25
New cards

Rule-Based Access Control

Access based on predefined rules

26
New cards

Attribute-Based Access Control (ABAC)

Access based on attributes like user, device, or location

27
New cards

Gap Analysis

Comparison of current security posture to desired state

28
New cards

Zero Trust

Never trust always verify

29
New cards

Control Plane

Makes access decisions in zero trust architecture

30
New cards

Policy Engine

Evaluates access requests

31
New cards

Policy Administrator

Communicates access decisions to enforcement points

32
New cards

Adaptive Identity

Adjusts access based on risk

33
New cards

Threat Scope Reduction

Limits lateral movement in a network

34
New cards

Policy-Driven Access Control

Access enforced by defined policies

35
New cards

Data Plane

Enforces access decisions

36
New cards

Policy Enforcement Point

Allows or denies access based on policy

37
New cards

Implicit Trust Zones

Areas where trust is assumed

38
New cards

Subject/System

Entity requesting access

39
New cards

Bollards

Physical barriers that stop vehicles

40
New cards

Access Control Vestibule

Prevents tailgating

41
New cards

Fencing

Defines and protects perimeters

42
New cards

Video Surveillance

Monitors and records activity

43
New cards

Security Guard

Human deterrence and response

44
New cards

Access Badge

Provides identity-based physical access

45
New cards

Lighting

Improves visibility and deters attackers

46
New cards

Infrared Sensor

Detects heat or motion

47
New cards

Pressure Sensor

Detects weight or force

48
New cards

Microwave Sensor

Detects motion through signal disruption

49
New cards

Ultrasonic Sensor

Detects motion using sound waves

50
New cards

Honeypot

Fake system used to attract attackers

51
New cards

Honeynet

Group of honeypots in a network

52
New cards

Honeyfile

Fake file that triggers alerts when accessed

53
New cards

Honeytoken

Fake data that alerts when used

54
New cards

Deception Technology Purpose

Early detection and attacker analysis

55
New cards

Public Key Infrastructure (PKI)

Framework that manages keys and certificates

56
New cards

Public Key

Shared key used in asymmetric encryption

57
New cards

Private Key

Secret key used in asymmetric encryption

58
New cards

Key Escrow

Third party storage of encryption keys

59
New cards

Symmetric Encryption

Same key used to encrypt and decrypt data

60
New cards

Asymmetric Encryption

Uses public and private key pairs

61
New cards

Key Exchange

Secure method of sharing encryption keys

62
New cards

Encryption Algorithm

Mathematical method used to encrypt data

63
New cards

Key Length

Determines encryption strength

64
New cards

Transport Encryption

Protects data in transit

65
New cards

Full Disk Encryption

Encrypts an entire drive

66
New cards

Partition Encryption

Encrypts a disk partition

67
New cards

Volume Encryption

Encrypts a logical volume

68
New cards

File Encryption

Encrypts individual files

69
New cards

Database Encryption

Encrypts database contents

70
New cards

Record Encryption

Encrypts individual records

71
New cards

Trusted Platform Module (TPM)

Hardware chip that securely stores keys

72
New cards

Hardware Security Module (HSM)

Dedicated device for cryptographic operations

73
New cards

Key Management System

Manages key creation storage and rotation

74
New cards

Secure Enclave

Isolated secure memory area

75
New cards

Steganography

Hiding data within other data

76
New cards

Tokenization

Replacing sensitive data with non-sensitive tokens

77
New cards

Data Masking

Obscures sensitive data

78
New cards

Hashing

One-way function for data integrity

79
New cards

Salting

Adds randomness to hashes

80
New cards

Key Stretching

Makes brute force attacks harder

81
New cards

Digital Signature

Verifies sender and message integrity

82
New cards

Blockchain

Distributed tamper-resistant ledger

83
New cards

Open Public Ledger

Blockchain visible to all participants

84
New cards

Certificate Authority (CA)

Trusted entity that issues certificates

85
New cards

Certificate Revocation List (CRL)

List of revoked certificates

86
New cards

Online Certificate Status Protocol (OCSP)

Real-time certificate status checking

87
New cards

Self-Signed Certificate

Certificate signed by itself

88
New cards

Third-Party Certificate

Certificate issued by a trusted CA

89
New cards

Root of Trust

Trusted starting point for verification

90
New cards

Certificate Signing Request (CSR)

Request to generate a certificate

91
New cards

Wildcard Certificate

Secures multiple subdomains

92
New cards

Change Management

Process for controlling system changes

93
New cards

Approval

Process that authorizes changes

94
New cards

Ownership

Accountability for a change

95
New cards

Stakeholders

Individuals affected by a change

96
New cards

Impact Analysis

Evaluates effects of a change

97
New cards

Test Results

Verify change functionality and security

98
New cards

Backout Plan

Steps to undo a failed change

99
New cards

Maintenance Window

Approved time for system changes

100
New cards

Standard Operating Procedure (SOP)

Step-by-step approved process