22.3.1. Security Controls

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/14

flashcard set

Earn XP

Description and Tags

22.3 Governance Risk and Compliance

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

15 Terms

1
New cards

security control

anything you put in place to reduce risk.

It's like a safeguard that helps stop bad things from happening to your valuable stuff (like your data or devices).

2
New cards

Technical Security Controls

(implemented by technology, e.g. firewalls, antivirus)

3
New cards

Administrative Security Controls

(policies, procedures, and guidelines established by management to govern how an organization manages risk and maintains security.

4
New cards

Physical Security Controls

(hardware or environmental, e.g. locks, badge access)

5
New cards

Preventive Control Functions

These controls stop an attack or incident before it happens. They are proactive measures.

  • Examples: Security awareness training, firewalls, and strong account policies.

6
New cards

Detective Control Functions

find out if an attack has happened or is in progress. They identify an incident.

  • Examples: Reviewing system logs, video surveillance, and Security Information and Event Management (SIEM) systems.

7
New cards

Corrective Control Functions

fix issues after an attack occurs. Their purpose is to minimize damage and restore systems.

  • Examples: Data backups for recovery, system recovery procedures, and Intrusion Prevention Systems (IPS) that block detected threats.

8
New cards

Deterrent Control Functions

discourage potential attackers from even trying. They aim to make the target seem too risky or difficult.

  • Examples: Visible warning signs, security guards, and physical cable locks on equipment.

9
New cards

Compensating Control Functions

fill a gap when a primary control isn't feasible. They provide an alternative way to maintain security.

  • Examples: Using Time-Based One-Time Passwords (TOTP) when a more preferred authentication method isn't possible, or using strong encryption for data when physical security is limited.

10
New cards

Risk

Likelihood that a threat exploits a vulnerability

11
New cards

Threat

Something that could harm CIA (confidentiality, integrity, availability)

12
New cards

Vulnerability

Weakness that can be exploited

13
New cards

Security Incident

A breach of policy or system that harms CIA

14
New cards

Risk Assessment

Identify assets & what risks could affect them

15
New cards

Vulnerability Assessment

Use scanners/tools to find flaws