Security + general concepts

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/44

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 8:48 PM on 5/17/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

45 Terms

1
New cards

technical controls

controls implemented using systems. Examples include firewalls, anti virus

2
New cards

Management controls

administrative controls associated with security design. Examples include security polices and standard operating policies

3
New cards

Operational controls

Implemented by people instead of systems. Examples include security guards and awareness programs

4
New cards

Physical controls

Limit physical access. Examples include fences, locks, and badge scanners.

5
New cards

Preventive

Block access to resource. Examples include firewall (technical), on-boarding policy (managerial), Guard shack (operational), and door lock (physical)

6
New cards

Deterrent

Discourage an intrusion attempt. Examples include Splash screen (technical), review logs (managerial), reception (operational) and motion detectors (physical)

7
New cards

Detective

Detecting intrusion attempt. Examples include system logs (technical), review logins (managerial), property patrols (operational), motion detectors (physical)

8
New cards

Corrective

Apply a control after an intrusion as been detected. Examples include backup recovery (corrective), policy for reporting intrusions (managerial), contact authorities (operational), fire extinguisher (physical)

9
New cards

Compensating

Control using other means when existing controls aren’t enough. Often temporary. Examples include block instead of patch (technical), separation of duties (managerial), require multiple security staff (operational), power generator (physical)

10
New cards

Directive

Direct a subject towards security compliance. Examples include file storage polices (technical), compliance polices (managerial), security policy training (operational), authorized staff only (physical)

11
New cards

CIA triad

Confidentiality, integrity and availability

12
New cards

Confidentiality

Prevent disclosure of information to unauthorized individuals

13
New cards

Integrity

Messages can’t be modified without detection

14
New cards

Availability

systems and networks must be up and running.

15
New cards

Non-repudiation

The author of a statement/transaction cannot deny their involvement

16
New cards

Proof of integrity

The data sent is accurate and consistent. Accomplished with Hashes

17
New cards

Hash

A mathematical function that converts any amount of data into a unique, fixed-length string of letters and numbers.

18
New cards

AAA framework

19
New cards

Authentication

Proves that a user or entity is who they claim to be

20
New cards

Authorization

Dictates what an authenticated user is permitted to do or access within the network

21
New cards

accounting

Records the actions taken by the user, tracking resources accessed and time spent

22
New cards

Gap analysis

The study of where your system is vs where you want to be.

23
New cards

Zero trust

A holistic process to security in which everything must be verified

24
New cards

Data plane

The plane of packets, frames and process. Examples include ports.

25
New cards

Control plane

Manges actions of data plane. Examples include config files.

26
New cards

adaptive identity

consider the source and the requested resources

27
New cards

Threat scope reduction

decreasing the number of possible entity points by an attacker.

28
New cards

policy driven access control

a dynamic security model that determines user access to resources based on centrally managed, real-time policies rather than static roles or identities

29
New cards

Policy enforcement point (PEP)

where the policy is enforced

30
New cards
31
New cards
32
New cards
33
New cards
34
New cards
35
New cards
36
New cards
37
New cards
38
New cards
39
New cards
40
New cards
41
New cards
42
New cards
43
New cards
44
New cards
45
New cards