1.0 (43/46) OF TERMS

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/42

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

43 Terms

1
New cards

Technical Security Controls

These are robust hardware or software systems specifically designed to monitor, manage, and enforce security policies throughout an organization. Examples include firewalls, intrusion detection systems, and antivirus software, which work to prevent unauthorized access, detect breaches, and ensure the integrity of sensitive data.

2
New cards

Administrative Security Controls

This encompasses a comprehensive set of policies, procedures, and guidelines established to effectively manage and oversee an organization’s security posture. Key components include mandatory security awareness training for staff, clearly defined incident response plans for addressing security breaches, and ongoing compliance checks to ensure adherence to security protocols.

3
New cards

Operational Security Controls

These are critical security measures that focus on the human element and procedures guiding personnel in safeguarding information systems. An important example is cybersecurity training that equips employees to recognize and respond to potential security threats proactively.

4
New cards

Physical Security Controls

These include an array of measures designed to manage access to physical facilities and hardware, protecting them from various threats. Examples include the use of surveillance cameras to monitor entrances and exits, and building access control systems that utilize ID badges or biometric scans to restrict entry to authorized personnel.

5
New cards

Preventive Controls

Implemented measures aimed at preventing unauthorized access or actions by limiting access either physically or logically. Common examples include system passwords, data encryption techniques, and network firewalls that block unauthorized users from gaining entry into secure systems.

6
New cards

Deterrent Controls

These security mechanisms are specifically designed to discourage potential attackers from even attempting to breach security systems. Effective examples include visible deterrents such as surveillance cameras, the presence of security personnel, and warning signs that alert would-be intruders that security measures are actively in place.

7
New cards

Detective Controls

Controls implemented to identify, monitor, and record attempted or successful security breaches, allowing organizations to respond effectively to incidents. Examples include intrusion detection systems that analyze network traffic for suspicious activities and alert security teams to potential threats.

8
New cards

Corrective Controls

These measures are initiated in response to security incidents to address and rectify the effects of breaches. Examples include antivirus software that removes malware from infected systems and patch management processes that apply security updates to fix vulnerabilities.

9
New cards

Compensating Controls

Alternative security measures implemented when primary controls are insufficient or unavailable. For instance, deploying multifactor authentication can serve as a compensating control when biometric authentication systems are compromised.

10
New cards

Directive Controls

These controls come in the form of guidelines or policies that instruct and direct employee behavior to ensure compliance with security protocols. This includes formal security policies that outline acceptable behavior and incident reporting protocols.

11
New cards

Managerial Security Controls

Controls that focus on the overarching policies, procedures, and organizational frameworks required to ensure security. Examples include conducting regular risk assessments, establishing governance policies for security, and developing incident response plans to prepare for potential threats.

12
New cards

CIA Triad

A foundational model in information security, consisting of three core principles: Confidentiality (protecting information from unauthorized access), Integrity (ensuring the accuracy and consistency of data over time), and Availability (ensuring that authorized users have timely access to information and systems when needed).

13
New cards

Confidentiality

This security principle ensures that sensitive data is only accessible to authorized personnel, thereby protecting it from unauthorized access, breaches, and theft.

14
New cards

Integrity

Integrity involves the assurance that data is accurate, consistent, and unaltered throughout its lifecycle, which is essential for maintaining trustworthiness during storage and transmission of information.

15
New cards

Availability

Availability guarantees that authorized users can access information and systems whenever required, preventing downtimes that could disrupt operations and ensuring continuous service delivery.

16
New cards

Non-repudiation

A principle ensuring that the authenticity of data cannot be denied by the sender; often achieved by utilizing digital signatures that provide verifiable proof of data origin and integrity.

17
New cards

AAA

A crucial framework in security management, encompassing three key components: Authentication (the process of verifying a user's identity), Authorization (granting specific access rights based on identification), and Accounting (tracking and recording user activity for compliance and auditing purposes).

18
New cards

Zero Trust

A progressive security model built on the principle of 'never trust, always verify.' It asserts that no user, device, or network is trusted by default and demands continuous verification to maintain a secure environment.

19
New cards

Adaptive Identity

This approach to security dynamically adjusts user access levels based on their behavior, risk factors, and context, aiming to ensure that access is proportionate to the perceived level of risk associated with user actions.

20
New cards

Policy-driven Access Control

An access control strategy leveraging predefined security policies to govern user permissions, ensuring that access to systems and data is managed according to established guidelines and protocols.

21
New cards

Approval Process in Change Management

A systematic procedure that evaluates, authorizes, and documents changes made to security operations. It ensures that modifications are thoroughly considered and sanctioned by relevant stakeholders before implementation.

22
New cards

Ownership in Change Management

This denotes specific individuals or teams designated with the responsibility of overseeing and managing changes within an organization's security framework, thus ensuring accountability and thorough review during the change process.

23
New cards

Configuration Management

A methodical approach that tracks and controls changes made to an organization's systems and configurations, aiming to maintain integrity, consistency, and compliance with established security standards.

24
New cards

Public Key Infrastructure (PKI)

A robust framework designed for the management of digital certificates and encryption keys that facilitates secure communications and transactions over the internet by ensuring the authenticity of the involved parties.

25
New cards

Data at Rest Encryption

Techniques and protocols used to secure data stored on hard drives, databases, or other storage media against unauthorized access. Examples include full-disk encryption and database encryption methodologies.

26
New cards

Data in Transit Encryption

This involves protecting data while it is being transmitted between systems or over a network; commonly implemented using protocols like TLS (Transport Layer Security) and VPNs (Virtual Private Networks) to safeguard data from interception.

27
New cards

Symmetric Encryption

An encryption method that employs a single shared key for both the encryption and decryption processes, requiring that the same key remains confidential between the communicating parties.

28
New cards

Asymmetric Encryption

An encryption technique utilizing a pair of keys: a public key for encryption and a private key for decryption, which provides a secure means for exchanging sensitive information over potentially insecure channels.

29
New cards

Hashing

A cryptographic function that converts data into a fixed-length string, ensuring integrity by producing a unique output for each unique input. Common hashing algorithms include MD5 and SHA-256, utilized for verifying data authenticity.

30
New cards

Honeypot

A deliberately created decoy system designed to mimic real systems, aiming to attract potential attackers to study their tactics and strengthen overall security measures by learning from their methods.

31
New cards

Honeytoken

A deceptive credential or identifier intentionally designed to lure intruders and trigger alerts when accessed, aiding in the detection of unauthorized access attempts and bolstering security measures.

32
New cards

Hardware Security Module (HSM)

A specialized physical device providing secure key storage and cryptographic processing, ensuring sensitive data and cryptographic keys are protected from unauthorized access and manipulation.

33
New cards

Trusted Platform Module (TPM)

A dedicated chip embedded on computer motherboards that provides hardware-level encryption and secure storage of cryptographic keys, significantly enhancing system security and integrity.

34
New cards

Backout Plan in Change Management

A predefined strategy that allows for the safe restoration of systems to a previous state in case a change fails or introduces complications, ensuring quick recovery and minimal operational disruption.

35
New cards

Stakeholders in Change Management

The various individuals or groups impacted by changes in the security landscape, including end-users, IT personnel, and management, who must be informed and actively involved in the change process to ensure smooth transitions.

36
New cards

Bollards

Sturdy physical barriers designed to protect against vehicular threats, often deployed around sensitive facilities to deter unauthorized access and safeguard people and property.

37
New cards

Access Control Vestibule (Mantrap)

A controlled entry system that requires individuals to authenticate themselves before entering or exiting a secured area, enhancing security by preventing unauthorized access.

38
New cards

Lighting as a Physical Control

The strategic use of lighting to enhance visibility and deter intrusions in sensitive or restricted areas, making potential intruders more visible to security personnel and thus discouraging unauthorized entry.

39
New cards

Video Surveillance

A critical security component that employs cameras to monitor and record activity within secure areas, providing vital evidence in the event of an incident and assisting in response and investigation efforts.

40
New cards

Allow/Deny Lists in Technical Controls

Controlled lists that specify users, IP addresses, or domains permitted or denied access to networks, effectively managing who can interact with systems and protecting sensitive data from unauthorized access.

41
New cards

Patch Management

The systematic process of applying updates to software or hardware aimed at addressing identified security vulnerabilities, ensuring that systems remain fortified against known threats.

42
New cards

Security Awareness Training

Educational programs designed to inform employees about identifying and mitigating security threats, fostering a proactive culture of security awareness and responsibility within the organization.

43
New cards

Authentication Factors (Multifactor Authentication)

A comprehensive security approach that employs multiple verification methods for access, including something you know (password), something you have (security token), and something you are (biometric scan), strengthening access security by minimizing risks