Chapter 1.1-1.3

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/31

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

32 Terms

1
New cards

What are the 4 Security Controls?

  • Technical

  • Managerial

  • Operational

  • Physical

2
New cards

What are technical controls?

  • controls that are implemented through a system

  • operational system controls, such as firewalls or anti-virus

3
New cards

What are managerial controls?

  • administrative controls associated with security design and implementation

  • security policies, standard operating procedures

4
New cards

What are operational controls?

  • controls implemented by people instead of systems

  • security guards, awareness control

5
New cards

What are physical controls?

  • controls that limit physical access

  • guard shack, fences, locks, badge readers

6
New cards

What are the different control types?

  • Preventative

  • Deterrent

  • Detective

  • Corrective

  • Compensating

  • Directive

7
New cards

What is preventative control?

  • blocks access to a resource

  • example: firewall, door lock, guard shack

8
New cards

What is deterrent control?

  • discourages an intrusion attempt, makes them think twice

  • example: front desk, warning signs, app splash screen

9
New cards

What is detective control?

  • identifies and logs an intrusion attempt, may no prevent access

  • finds the issue

  • examples: siem dashboard, system that collects/reviews logs, motion detectors

10
New cards

What is corrective control?

  • applies a control after the detection has been made known and corrects the issues

  • potentially reverses the impact of the event

  • continues operations with minimal downtime

  • examples: restoring backups to mitigate ransomware, using a fire extinguisher

11
New cards

What is compensating control?

  • control using other mean when existing controls aren’t sufficient

  • usually temporary

  • examples: generators after power outage, firewalls to path app

12
New cards

What is the CIA Triad?

  • Confidentiality

  • Integrity

  • Availability

13
New cards

What is confidentiality?

  • preventing access of information to unauthorized individuals/system

  • example: encryption of data, access control, multi0factor authentication

14
New cards

What is integrity?

  • data is accurate, not altered

  • examples: hashing, digital signatures, certificates, non-repudiation

15
New cards

What is availability?

  • information can be accessed by authorized users

  • examples: redundancy, fault tolerance, patching

16
New cards

What is non-repudiation?

  • the assurance that someone cannot deny the validity of their involvement in a digital action

  • example: digital transaction, agreement, contract, or communication such as an email

17
New cards

What is proof of integrity?

  • ensuring data doesn’t change

  • example: when data changes, so does the hash

18
New cards

What is proof of origin?

  • proving the source

  • example: digital signature, private/public keys

19
New cards

What is AAA?

  • authentication

  • authorization

  • accounting

20
New cards

What is authentication?

  • proving who you are

  • examples: usernames, passwords

21
New cards

What is authorization?

  • what do you have access to do?

  • examples: acls, group policy

22
New cards

What is accounting?

  • what did you do?

  • examples: login time, data sent/received, logout time

23
New cards

What is gap analysis?

  • comparison between current and future security

  • helps plan for future

24
New cards

What are the steps of gap analysis?

  • choose a framework

  • get a baseline from employees

  • examin current process

  • compare between baseline and current process

  • indentify weaknesses in an analysis

  • complete final comparison and create new framework

25
New cards

What is zero trust?

  • model that assumes no user/device should be trusted by default without the proper authentication

26
New cards

How is zero trust achived?

  • splitting network into planes of operations

  • controlling trust

  • security zones

  • policy enforcement point

27
New cards

What are some examples of physical security?

  • barricades/bollards

  • access control vestibules

  • fencing

  • access badge

28
New cards

What are examples of was to deceive attackers?

  • honeypot

  • honeyfiles

  • honeytokens

29
New cards

What is a honeypot?

  • attracts attackers to a machine that is not on the network

30
New cards

What are honeyfiles?

  • attracts attackers to a file that is filled with fake information

  • (password.txt)

  • bear traps are set to alert admins when honeyfiles are accessed

31
New cards

What are honeytokens?

  • adds traceable data to the honeynet, allows you to tell where data comes from

  • example: fake email addresses or credentials

32
New cards

What is change management?

  • process for making a change

  • common area for mistakes