Chapter9: Implementing controls to protect assets

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/31

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

32 Terms

1
New cards

Access badges

Provide secure access, used in M2F such as pin/password

2
New cards

Types of sensors

Motion detection

Noise detection

Infrared

Pressure

Microwave

3
New cards

Access control vistibule

two interlocking doors allow one person at a time to avoid tailgating

4
New cards

Asset management

Acquisition

Assignment

Monitoring

5
New cards

Hardware asset management

track servers, desktop pcs, laptops, routers, switches

6
New cards

software asset management

tracks software licenses, installations, and usage within an org

7
New cards

data asset management

focuses on org’s data assets, data bases, files and other info repositories

8
New cards

Platform diversity

Vendor diversity, tech diversity, and control diversity

Main purpose is to have defense in depth layers

9
New cards

Physical attacks

Card cloning

10
New cards

Brute force attacks

Breaking barriers

11
New cards

Single point of failure

component that if it fails, can cause the entire system to collapse

12
New cards

Disk redundancy

Redundancy array of inexpensive disks (RAID) provides fault tolerance

13
New cards

RAID-0

Striping , includes 2 or more disks files are stored and spread across each of the disks

14
New cards

RAID-1

Mirroring, Uses 2 disks, data is written to both disks

15
New cards

RAID- 5

3 or more disks striped together if 2 drives fail data is lost

16
New cards

RAID-6

3 o more disks striped together, continues even if 2 disks fail requires a minimum of 4 disks

17
New cards

RAID-10

Combines striping and mirroring requires 4 disks minimum

18
New cards

Active load balancer

Distribute data loads across multiple computers

19
New cards

Hardware based load balancer

Accepts traffic and directs it to servers

20
New cards

Software based load balancer

uses virtual ip address clients send requests to ip address and redirects requests to one of the servers

21
New cards

Backup media

Disks or usb drives

Network attached storage (NAS)

Storage area network

Cloud storage

22
New cards

Offline backups

tapes, disks, drives in a NAS

23
New cards

Online backups

Cloud storage

24
New cards

Backup types

Full

Differential

Incremental

Snapshot/Image

25
New cards

Incremental backups

Best for single day backup recovery

26
New cards

Differential backups

Best or recovering failed systems quickly

27
New cards

Testing backup purpose

It validates the backup and tests its restoration , it can then be verified for integrity

28
New cards

Business continuity plan (BCP)

Disaster recovery elements that provide steps to return critical functions to operation after an outage

29
New cards

Business impact analysis

Helps org identify critical systems and components for success 

30
New cards

Steps of disaster recovery plan

Activate DRP

implement contingencies

recover  critical systems

test recovered systems

after action review

31
New cards

Capacity planning

Process of determining the resources required to meet demands of an org’s ops and growth

32
New cards