Cyber Security part 1

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

Technical Controls

Technical/logical controls are security controls put in place that are executed by technical systems. Technical controls include logical access control systems, security systems, encryption, and data classification solutions.

2
New cards

Managerial Controls

Managerial, or administrative, controls include business and organizational processes and procedures, such as security policies and procedures, personnel background checks, security awareness training, and formal change-management procedures.

3
New cards

Operational Controls

Operational controls encompass a range of procedures and actions carried out by personnel to enhance the security of individual and group systems. These controls include, but are not limited to, regular user training, implementation of fault tolerance measures, formulation of disaster recovery plans, and incident response coordination. Personnel responsible for these tasks must have the necessary technical skills and aligned their actions with the strategic security goals set by management.

4
New cards

Physical Controls

Physical controls are a category of security measures designed to prevent unauthorized physical access to an organization’s facilities and resources. They form a fundamental component of a layered defense strategy.

5
New cards

Preventive Controls

Preventive controls include security awareness, separation of duties, access control, security policies and intrusion prevention systems.

6
New cards

Deterrent Controls

are intended to discourage individuals from intentionally violating information security policies or procedures. Examples of deterrent controls include warnings indicating that systems are being monitored.

7
New cards

Detective Controls

Detective controls warn that physical security measures are being violated. Detective controls attempt to identify unwanted events after they have occurred. Common technical detective controls included audit trails, intrusion detection systems, system monitoring, checksums and anti-malware.

8
New cards

Corrective Controls

are reactive and provide measures to lessen harmful effects or restore the system being impacted. Examples of corrective controls includes operating systems upgrades data backup restores, vulnerability mitigation and anti-malware.

9
New cards

Compensating Controls

also known as alternative controls, are intended to reduce the risk of an existing or potential control weakness. They include audit trails and transaction logs that someone in a higher position reviews.

10
New cards

Directive Controls

security controls that provide guidance and set expectations to influence behavior within an organization. These controls, which can take the form of policies, procedures, or guidelines, dictate what actions should be taken to ensure security, and they establish rules for how specific situations should be handled.

11
New cards
12
New cards
13
New cards
14
New cards