5.2 Security Program Elements Flashcards

Summarize security program elements (user awareness, training, and physical access control). (25 cards)

1
Q

Define:

security policy

A

A set of rules for safeguarding sensitive information.

Security policies include guidelines on password strength, data handling, and acceptable use of technology to ensure network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define:

security awareness training

A

Training to educate users on security threats and protective measures.

It aims to reduce human error by ensuring users understand risks like phishing, malware, and password management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List three types of user awareness activities in a security program.

A
  1. Security awareness campaigns
  2. Security newsletters
  3. Security posters or reminders

Security Awareness Campaigns: Initiatives to educate users about security risks and best practices.

Security Newsletters: Regular updates on security tips, threats, and precautions.

Security Posters or Reminders: Visual reminders about security policies and safe practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of user awareness in a security program?

A

To help users understand security risks and policies.

Awareness helps prevent user errors that could lead to breaches and encourages compliance with security protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the primary goal of security training for users?

A

To reduce human error that could lead to breaches.

Training ensures users are aware of security threats and best practices to protect systems and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are two examples of user awareness activities?

A
  1. Interactive security quizzes
  2. Security newsletters

Interactive Security Quizzes: Engaging tests to reinforce security knowledge.

Security Newsletters: Regular updates on security tips and threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is user training important in a security program?

A

It equips users with the knowledge to handle security threats.

Well-trained users are less likely to make mistakes that could compromise the organization’s security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why should security training be regularly updated?

A

To address new and evolving threats.

Cyber threats constantly change, and users must stay informed about the latest security practices to remain protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the role of physical access control in a security program?

A

It restricts unauthorized access to sensitive areas.

Physical security measures like keycards, locks, and biometric scanners prevent unauthorized entry and protect critical assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define:

Define two-factor authentication (2FA).

A

A security process requiring two verification methods.

2FA combines something the user knows (password) and something the user has (mobile device or token) to enhance security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False:

User awareness is only necessary for employees working in IT departments.

A

False

Security awareness is crucial for all employees, as any user could inadvertently introduce security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fill in the blank:

______ ______ is an example of a physical access control method used to secure sensitive areas.

A

Biometric scanning

Biometric methods, like fingerprint or iris scans, provide high security and are difficult to bypass.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List two methods of educating users on security threats.

A
  1. Phishing simulation exercises
  2. Security workshops

Phishing Simulation Exercises: Simulated attacks to teach users how to recognize phishing attempts.

Security Workshops: Interactive sessions to educate users about security threats and preventive measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of security policies in a security training program?

A

To provide rules for users to follow for organizational security.

Policies ensure that all users follow standardized security practices, minimizing risks from inconsistent behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False:

Physical security measures are less important than user awareness in a security program.

A

False

Both physical security and user awareness are critical to a comprehensive security program. One without the other creates gaps in protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define:

user authentication

A

Process of verifying the identity of individuals before granting access.

Authentication methods include PINs, passwords, security tokens, and biometric data, ensuring only authorized users can access secure areas.

17
Q

What is physical security?

A

The protection of hardware and network devices from physical threats.

Physical security involves measures like locks, surveillance, and access control to prevent tampering or theft of network equipment.

18
Q

List two types of physical access control methods.

A
  1. Keycards
  2. Biometric scanners

Keycards: Electronic access cards that grant entry to authorized users.

Biometric Scanners: Devices that use fingerprints, facial recognition, or other biological traits for secure access.

19
Q

Why is it important to secure both physical and digital assets?

A

Because both are vulnerable to theft or unauthorized access.

Securing physical and digital assets ensures that sensitive information is protected, whether it’s stored on a device or within physical infrastructure.

20
Q

True or False:

Security training is only necessary for new employees.

A

False

Ongoing training is essential to keep all employees updated on new threats and security practices.

21
Q

Fill in the blank:

The process of restricting access is known as ______ ______.

A

access control

Access control systems, such as keycards or ID badges, are crucial for preventing unauthorized physical access to secure areas.

22
Q

List three types of access control models used in physical security.

A
  1. Discretionary Access Control (DAC)
  2. Mandatory Access Control (MAC)
  3. Role-Based Access Control (RBAC)

Discretionary Access Control (DAC): Owners decide who can access specific areas or resources.

Mandatory Access Control (MAC): Access is strictly regulated based on security policies and classifications.

Role-Based Access Control (RBAC): Permissions are assigned based on a person’s role within an organization.

23
Q

How does security awareness prevent ransomware attacks?

A

It teaches users to identify phishing emails and malicious attachments.

Users who are aware of ransomware tactics are less likely to click on malicious links or download harmful files.

24
Q

Define

security breach

A

Unauthorized access to sensitive data or systems.

Breaches may occur through hacking, insider threats, or physical theft and can result in data loss or system compromise.

25
# True or False: A firewall is an **example** of physical access control.
False ## Footnote **Firewalls** protect digital networks by filtering traffic, while physical access control focuses on securing physical spaces.