General Security Concept Acronym

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/64

flashcard set

Earn XP

Description and Tags

The First Domain Acronmy, I got this.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

65 Terms

1
New cards
<p>Security Control</p>

Security Control

Prevent Security Event, Reduce the impact and limit damageby implementing measures to detect, respond to, and recover from security incidents.

2
New cards
<p>Technical Control</p>

Technical Control

Are Controls that are implemented using Technology, like NGFW, IDS, IPS

3
New cards
<p>Managerial Control</p>

Managerial Control

Are Administrative Control, that focus on policies, procedures, and governance to manage security risks and ensure compliance.

4
New cards
<p>Operation Control</p>

Operation Control

Controls that are implemented by People and awareness program

5
New cards
<p>Physical Control</p>

Physical Control

Limit physical access, Like Security Fences, CCTV, Control Vestibles, etc.

6
New cards

Preventive Control

Block access to a resources

7
New cards

Deterrent Control

Discourage an intrusion attempt

8
New cards

Detective Control

Identified and log an Intrusion attempt

9
New cards

Corrective Control

Apply a control type, after an event, Reverse the impact of an event

10
New cards

Compensating Control

Are control using other means, when the primary control is not enough

11
New cards

Dirrective Control

Guide subject towards Security Compliance

12
New cards

CIA Triad

The fundamental of Security (Confidentiality, Integrity, and Availability)

13
New cards

C

Confidentiality, Prevent disclosure of information to unauthorized individuals or systems

14
New cards

I

Integrity, Message can’t be modified without detection

15
New cards

A

Availability, System and networks must be up and running

16
New cards

Confidentiality

Certain Information should only be known to certain people

17
New cards

Encryption

Encode message so only certain people can read it

18
New cards

Access Controls

Selectively Restrict access to a resource

19
New cards

Two-Factor Authentication

Additional confirmation before information is disclosed

20
New cards

Integrity

Any modification to the data would be identified

21
New cards

Hashing

It turns data (like a password) into a fixed-length scrambled value.

22
New cards

Digital Signature

It’s a way to prove who sent a message and that it wasn’t changed, using cryptography.

23
New cards

Digital Certificates

It’s a digital ID that proves a person or website is real and trusted, issued by a trusted authority.

24
New cards

Non-repudiation

It means someone cannot deny that they sent a message or performed an action.

25
New cards

Redundancy

Build services that will always be available

26
New cards

Fault tolerance

System will continue to run, even when a failure occurs

27
New cards

Patching

It means updating software to fix security flaws and bugs. Closed security hole

28
New cards

Non-Repudiation Systems

Proof of Origin, Proof of Integrity, Proof of Origin

29
New cards

PKI

Public Key Infrastructure

30
New cards

Cryptohgraphy

In Cryptography, we used hash

31
New cards

AAA Framework

Used to control and monitor access to systems.

32
New cards

Authentication

Based on your ID, prove you are who you say you are

33
New cards

Authorization

Based on your Authentication, what access do you have?

34
New cards

Accounting

Recorded Resources, like login time, data sente and received, and logout time

35
New cards

Digital Certificate

An authentication factor for Systems and people

36
New cards

CA

Certificate Authority, is the organization that issued the System a Digitally Signed Certificate

37
New cards

Authorization Models

Users and Services → Data and Applications

Put Authorization model In the middle, Define by roles, organizations and Attributes, etc.

No Authorization model → A simple relationship to user → Resource

38
New cards

Gap Analysis

Where you are compared with where you want to be

“The gap between the two”

39
New cards

NIST Special Publication 800-171 Revision 2

Tells non-government companies how to protect sensitive government information called CUI- Controlled Unclassified Information

40
New cards

ISO/IEC 27001

International Standards on how to manage and protect Information Securely

41
New cards

Zero Trust

A holistic approach to network security, Every time you have to proved you are who you say you are, every time time

42
New cards

Plane of Operation

Split Network into functional planes

43
New cards

Data Plane

Process the frame, Packets and network data

44
New cards

Control Plane

Manage the action of the data Plane

45
New cards

Adaptive Identity

Consider the source and the requested resources

46
New cards

Threat Scope Deduction

Decrease the number of possible entry points.

47
New cards

Policy Driven Access Control

Combine the adaptive identity what a predefined set of rules

48
New cards

Security Zones

Where are you coming from and where are you going

49
New cards

PEP

Policy Enforcement Point, Follow the rule, the gatekeeper

50
New cards

PDP

Policy Decision Point, Evaluates each access decision based on policy and other information

51
New cards

PE

Policy Engine, Evaluates each access decision based on Policy and other information

52
New cards

PA

Policy Administrator, Manage the Policy and process

53
New cards

Physical Security

Prevent Access, limit physical access

54
New cards

Access Control Vestibules

Opening one door causes others to lock

55
New cards

Fencing

Build a perimeter

56
New cards

CCTV

Closed Circuit Television, that monitored and recognized security event

57
New cards

Guards and access badges

Guards provide physical security, Access badges provide authentication factors

58
New cards

Two-Person Integrity/Control

Minimized exposure to an attack, No single person has access to a physical asset

59
New cards

Lighting

More light means more security

60
New cards

Sensors

Detects, Like Infrared, Pressure, Microwave, Ultrasonic

61
New cards

Deception and Disruption

Attract and traps attackers, by using Honeypots, honeynets, Honey file, Honeytoken

62
New cards

Honey pot

Created a virtual world, attack and trap tracker

63
New cards

Honey nets

Created a large network with multiple devices like computer, workstation etc, and attract and trap attacker

64
New cards

Hone File

Created fake information in file, to attract and trap attackers

65
New cards

Honey token

Add traceable data to the honeynet, if data is stolen, you’ll know where it came from