Unit 3.1 Security Controls

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/22

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

23 Terms

1
New cards

Technical Controls

hardware/software mechanisms such as firewalls, ACLs, and encryption

2
New cards

Managerial Controls

policies, procedures, training, and audits

3
New cards

Physical Controls

environmental safeguards like locks, cameras, and restricted access

4
New cards

Preventive Controls

stop security events before they happen, such as access control

5
New cards

Detective Controls

identify and alert when security events occur, such as IDS and logs

6
New cards

Corrective Controls

respond to and recover from security events, such as backups and patches

7
New cards

Technical Controls Purpose

implemented through network devices and software to defend traffic and systems

8
New cards

Firewalls

filter traffic between trusted and untrusted zones

9
New cards

VLANs

segment LAN traffic to isolate users and devices and limit broadcast domains

10
New cards

IDS (Intrusion Detection System)

monitors network traffic and alerts administrators of suspicious behavior

11
New cards

IPS (Intrusion Prevention System)

actively blocks or prevents detected intrusions

12
New cards

IDS/IPS Deployment Models

inline for active blocking or passive for monitoring

13
New cards

SIEM (Security Information and Event Management)

collects and correlates logs to identify patterns and trigger alerts

14
New cards

NAC (Network Access Control)

ensures only authorized and compliant devices connect to the LAN

15
New cards

802.1X Authentication

verifies devices attempting to connect to the network

16
New cards

Endpoint Protection/EDR

monitors and protects endpoint devices like PCs, servers, and IoT

17
New cards

Patching

regular updates to mitigate known vulnerabilities

18
New cards

External Physical Security

lighting, fencing, security guards, and cameras

19
New cards

Internal Physical Security

server room locks, keycard access, and secured cable paths

20
New cards

Environmental Controls

UPS, fire suppression, and temperature control

21
New cards

Security Controls Key Idea

controls mitigate risk and increase LAN resilience

22
New cards

Integrated Security Approach

uses technical, managerial, and physical measures together

23
New cards

Ongoing Monitoring and Maintenance

continuous responsibility to ensure security effectiveness