Chapter 1.1-1.3

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/31

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:33 PM on 1/16/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

32 Terms

1
New cards

What are the 4 Security Controls?

  • Technical

  • Managerial

  • Operational

  • Physical

2
New cards

What are technical controls?

  • controls that are implemented through a system

  • operational system controls, such as firewalls or anti-virus

3
New cards

What are managerial controls?

  • administrative controls associated with security design and implementation

  • security policies, standard operating procedures

4
New cards

What are operational controls?

  • controls implemented by people instead of systems

  • security guards, awareness control

5
New cards

What are physical controls?

  • controls that limit physical access

  • guard shack, fences, locks, badge readers

6
New cards

What are the different control types?

  • Preventative

  • Deterrent

  • Detective

  • Corrective

  • Compensating

  • Directive

7
New cards

What is preventative control?

  • blocks access to a resource

  • example: firewall, door lock, guard shack

8
New cards

What is deterrent control?

  • discourages an intrusion attempt, makes them think twice

  • example: front desk, warning signs, app splash screen

9
New cards

What is detective control?

  • identifies and logs an intrusion attempt, may no prevent access

  • finds the issue

  • examples: siem dashboard, system that collects/reviews logs, motion detectors

10
New cards

What is corrective control?

  • applies a control after the detection has been made known and corrects the issues

  • potentially reverses the impact of the event

  • continues operations with minimal downtime

  • examples: restoring backups to mitigate ransomware, using a fire extinguisher

11
New cards

What is compensating control?

  • control using other mean when existing controls aren’t sufficient

  • usually temporary

  • examples: generators after power outage, firewalls to path app

12
New cards

What is the CIA Triad?

  • Confidentiality

  • Integrity

  • Availability

13
New cards

What is confidentiality?

  • preventing access of information to unauthorized individuals/system

  • example: encryption of data, access control, multi0factor authentication

14
New cards

What is integrity?

  • data is accurate, not altered

  • examples: hashing, digital signatures, certificates, non-repudiation

15
New cards

What is availability?

  • information can be accessed by authorized users

  • examples: redundancy, fault tolerance, patching

16
New cards

What is non-repudiation?

  • the assurance that someone cannot deny the validity of their involvement in a digital action

  • example: digital transaction, agreement, contract, or communication such as an email

17
New cards

What is proof of integrity?

  • ensuring data doesn’t change

  • example: when data changes, so does the hash

18
New cards

What is proof of origin?

  • proving the source

  • example: digital signature, private/public keys

19
New cards

What is AAA?

  • authentication

  • authorization

  • accounting

20
New cards

What is authentication?

  • proving who you are

  • examples: usernames, passwords

21
New cards

What is authorization?

  • what do you have access to do?

  • examples: acls, group policy

22
New cards

What is accounting?

  • what did you do?

  • examples: login time, data sent/received, logout time

23
New cards

What is gap analysis?

  • comparison between current and future security

  • helps plan for future

24
New cards

What are the steps of gap analysis?

  • choose a framework

  • get a baseline from employees

  • examin current process

  • compare between baseline and current process

  • indentify weaknesses in an analysis

  • complete final comparison and create new framework

25
New cards

What is zero trust?

  • model that assumes no user/device should be trusted by default without the proper authentication

26
New cards

How is zero trust achived?

  • splitting network into planes of operations

  • controlling trust

  • security zones

  • policy enforcement point

27
New cards

What are some examples of physical security?

  • barricades/bollards

  • access control vestibules

  • fencing

  • access badge

28
New cards

What are examples of was to deceive attackers?

  • honeypot

  • honeyfiles

  • honeytokens

29
New cards

What is a honeypot?

  • attracts attackers to a machine that is not on the network

30
New cards

What are honeyfiles?

  • attracts attackers to a file that is filled with fake information

  • (password.txt)

  • bear traps are set to alert admins when honeyfiles are accessed

31
New cards

What are honeytokens?

  • adds traceable data to the honeynet, allows you to tell where data comes from

  • example: fake email addresses or credentials

32
New cards

What is change management?

  • process for making a change

  • common area for mistakes