1.0l

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 28

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

29 Terms

1

Technical Controls

Hardware or software systems specifically designed to monitor and control security, such as Network IDS or biometric security devices.

New cards
2

Managerial Controls

Controls that oversee information systems and aid in selecting and implementing other security controls, like risk identification tools.

New cards
3

Operational Controls

Human-centric controls focusing on procedures and responsibilities to maintain organizational security, such as cybersecurity training and password policies.

New cards
4

Physical Controls

Controls that manage access to premises and hardware, usually more expensive than technical controls, examples include building access control systems and security cameras.

New cards
5

Preventive Control

Controls that restrict unauthorized access physically or logically, examples include system passwords and physical door locks.

New cards
6

Deterrent Control

Controls that discourage attacks psychologically rather than physically preventing them, such as warning signs.

New cards
7

Detective Control

Controls that identify and record attempted or successful intrusions, like security camera systems.

New cards
8

Corrective Control

Controls that respond to and fix incidents, preventing their recurrence, such as antivirus software.

New cards
9

Compensating Controls

Using alternative means to address security events when current controls are insufficient.

New cards
10

Directive Control

Controls designed to guide and manage individual behavior within an organization, often through policies and guidelines.

New cards
11

Confidentiality

Ensures that data is accessible only to authorized personnel.

New cards
12

Integrity

Ensures that data remains unaltered during storage and transfer.

New cards
13

Availability

Guarantees that data is always accessible.

New cards
14

Non-repudiation

Ensures that neither party can deny the authenticity of the data.

New cards
15

Public Key Infrastructure (PKI)

Framework responsible for creating, distributing, managing, and storing digital certificates.

New cards
16

Hybrid Encryption

Combines the benefits of symmetric and asymmetric encryption.

New cards
17

Key Escrow

A third party holds the decryption key for convenient access in a large-scale organization.

New cards
18

Steganography

Embedding information within an unexpected source to disguise its true appearance.

New cards
19

Access Badge

Identification cards issued to authorized individuals, often with magnetic stripes or RFID technology.

New cards
20

Honeypot

A decoy system that mimics real systems to monitor attacker activity.

New cards
21

Digital Signature

A cryptographic mechanism that verifies the authenticity and integrity of a message.

New cards
22

Policy Enforcement Point

Enforces decisions about granting access to requested resources.

New cards
23

Standard Operating Procedure (SOP)

Defines routine operations or changes and provides detailed implementation instructions.

New cards
24

Approval Process

Formal procedure for evaluating and authorizing proposed changes before implementation.

New cards
25

Key Management System

System for managing cryptographic keys.

New cards
26

Wild Card Certificates

SSL/TLS certificates that can secure multiple subdomains under a single certificate.

New cards
27

Version Control

Method to track and manage changes in critical documents, configurations, and code.

New cards
28

Access Control Vestibule

A small enclosed space with interlocking doors regulating entry into secure areas.

New cards
29

Threat Scope Reduction

A process to minimize possible attack vectors and surfaces to reduce exposure.

New cards
robot