1B: Compare and Contrast Security Control and Framework Types Flashcards

1
Q

After a poorly handled security breach, a company updates its security policy to include an improved incident response plan. Which of the following security controls does this update address?

A

Corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What cyber security framework (CSF) focuses exclusively on IT security, rather than IT service provisioning?

A

National Institute of Standards and Technology (NIST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The _____ requires federal agencies to develop security policies for computer systems that process confidential information.

A

Computer Security Act (1987)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The ____ mandates the implementation of risk assessments, internal controls and audit procedures. This act is not for any specific entity.

A

Sarbanes-Oxley Act (2002)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The _____ governs the security of data processed by federal government agencies. This act requires agencies to implement an information security program

A

Federal Information Security Management Act (2002)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The ______ is a United States federal law that requires financial institutions to explain how they share and protect their customers’ private information.

A

Gramm-Leach-Bliley Act (1999)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The IT department head returns from an industry conference feeling inspired by a presentation on the topic of cybersecurity frameworks. A meeting is scheduled with IT staff to brainstorm ideas for deploying security controls by category and function throughout the organization. What ideas are consistent with industry definitions?

A

-Deploy a technical control to enforce network access policies.
-Schedule quarterly security awareness workshops as a preventive control to prevent social engineering attacks.
-Deploy agents to file servers to perform continuous backups to cloud storage as a corrective control to mitigate the impact of malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a technical control?

A

A technical control is enforced by computer hardware and software, such as an access control list (ACL) configured on a network firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an Operational control?

A

Operational controls are categorized as those performed by people, such as security guards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a preventive control?

A

A preventive control such as user education and training is one that eliminates or reduces the likelihood of an attack before it can take place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a corrective control?

A

A corrective control such as backup is used following an attack to eliminate or mitigate its impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a managerial control?

A

Monitoring of risk and compliance is a type of managerial control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A company has an annual contract with an outside firm to perform a security audit on their network. The purpose of the annual audit is to determine if the company is in compliance with their internal directives and policies for security control. Which broad class of security control that accurately demonstrates the purpose of the audit?

A

Managerial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You have implemented a secure web gateway that blocks access to a social networking site. How would you categorize this type of security control?

A

It is a technical type of control (implemented in software) and acts as a preventive measure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A company has installed motion-activated floodlighting on the grounds around its premises. What class and function is this security control?

A

It would be classed as a physical control and its function is both detecting and deterring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A firewall appliance intercepts a packet that violates policy. It automatically updates its Access Control List to block all further packets from the source IP. What THREE functions are the security control performing?

A

Detective, corrective, and preventative.

17
Q

If a security control is described as operational and compensating, what can you determine about its nature and function?

A

That the control is enforced by a person rather than a technical system, and that the control has been developed to replicate the functionality of a primary control, as required by a security standard.

18
Q

What term is used to describe the property of a secure network where a sender cannot deny having sent a message?

A

Non-repudiation

19
Q

What is CIS?

A

Center for Internet Security

A not-for-profit organization (founded partly by SANS). It publishes the well-known “Top 20 Critical Security Controls” (or system design recommendations).

20
Q

What is Cloud Security Alliance?

A

Industry body providing security guidance to CSPs, including enterprise reference architecture and security controls matrix.

21
Q

What is a compensating control?

A

A security measure that takes on risk mitigation when a primary control fails or cannot completely meet expectations.

22
Q

What is a corrective control?

A

A type of security control that acts after an incident to eliminate or minimize its impact.

23
Q

What is a detective control?

A

A type of security control that acts during an incident to identify or record that it is happening.

24
Q

What is a deterrent control?

A

A type of security control that discourages intrusion attempts.

25
Q

What is the GDPR (General Data Protection Regulation)?

A

Provisions and requirements protecting the personal data of European Union (EU) citizens. Transfers of personal data outside the EU Single Market are restricted unless protected by like-for-like regulations, such as the US’s Privacy Shield requirements.

26
Q

What is the GLBA (Gramm-Leach-Bliley Act)?

A

A law enacted in 1999 that deregulated banks, but also instituted requirements that help protect the privacy of an individual’s financial information that is held by financial institutions.

27
Q

What is ISO/IEC 27K (International Organization for Standardization 27000 Series)?

A

A comprehensive set of standards for information security, including best practices for security and risk management, compliance, and technical implementation.

28
Q

What is ISO/IEC 31K (International Organization for Standardization 31000 Series)?

A

A comprehensive set of standards for enterprise risk management.

29
Q

What is OWASP (Open Web Application Security Project)?

A

A charity and community publishing a number of secure application development resources.

30
Q

What is PCI DSS (Payment Card Industry Data Security Standard)

A

Information security standard for organizations that process credit or bank card payments.?

31
Q

SSAE SOC (Statements on Standards for Attestation Engagements Service Organization Control)

A

Audit specifications designed to ensure that cloud/hosting providers meet professional standards

32
Q

What is a SOC2 Type II report for?

A

A SOC2 Type II report is created for a restricted audience

33
Q

What is a SOC3 report for?

A

SOC3 reports are provided for general consumption.

34
Q

What is SOX (Sarbanes-Oxley Act)?

A

A law enacted in 2002 that dictates requirements for the storage and retention of documents relating to an organization’s financial and business operations.

35
Q

What is a physical control?

A

A type of security control that acts against in-person intrusion attempts.

36
Q

What is a security control?

A

A technology or procedure put in place to mitigate vulnerabilities and risk and to ensure the confidentiality, integrity, and availability (CIA) of information.

37
Q

What is a technical control?

A

A category of security control that is implemented as a system (hardware, software, or firmware). Technical controls may also be described as logical controls.

38
Q

Explain how a client/server model works, and how it might be attacked?

A

This means that part of the application is a client software program, installed and run on separate hardware to the server application code. The client interacts with the server over a network.

Attacks can therefore be directed at the local client code, at the server application, or at the network channel between them.