Acronyms 2 Flashcards
(602 cards)
Control Plane
used to achieve zero trust
includes adaptive identity, threat scope reduction and secured zones
Data Plane
subject/system, policy engine, policy admin, and enforcement point
ensures policies are properly executed
Threat
anything that could cause harm, loss damage or compromise to our info tech systems
Vulnerability
any weakness in system design
- Software bugs
● Misconfigured software
● Improperly protected network devices
● Missing security patches
● Lack of physical security
Risk Management
Finding different ways to minimize the likelihood of an outcome and achieve the
desired outcome
Confidentiality
Refers to the protection of information from unauthorized access and disclosure
■ Ensure that private or sensitive information is not available or disclosed to
unauthorized individuals, entities, or processes
reasons for it
-maintain a business advantage
- achieve compliance
- protect personal privacy
Ways to ensure confidentiality
data masking, physical security, training, encryption and access controls
Integrity
Helps ensure that information and data remain accurate and unchanged from its
original state unless intentionally modified by an authorized individuals
Hashing
checksums
digital signatures
access controls
regular audits
Availability
Ensure that information, systems, and resources are accessible and operational
when needed by authorized user
authentication
Security measure that ensures individuals or entities are who they claim to be
during a communication or transactio
Syslog Server
used to achiev accounting
it aggregates logs from various network devices
SIEM
Security Information and Event Management Systems
Provides us with a real-time analysis of security alerts generated by
various hardware and software infrastructure in an organization
Technical Controls
Technologies, hardware, and software mechanisms that are implemented
to manage and reduce risks
Managerial Controls
Sometimes also referred to as administrative controls
● Involve the strategic planning and governance side of security
Operational controls
Procedures and measures that are designed to protect data on a
day-to-day basis
● Are mainly governed by internal processes and human actions
Physical Controls
Tangible, real-world measures taken to protect assets
Preventative Controls
Proactive measures implemented to thwart potential security threats or
breaches
Deterrent Controls
Discourage potential attackers by making the effort seem less appealing or more challenging
Detective Control
Monitor and alert organizations to malicious activities as they occur or
Corrective Controls
Mitigate any potential damage and restore our systems to their normal state
Compensating Controls
Alternative measures that are implemented when primary security controls are not feasible or effective
Directive Controls
Guide, inform, or mandate actions
● Often rooted in policy or documentation and set the standards for
behavior within an organization
Gap Analysis
Process of evaluating the differences between an organization’s current
performance and its desired performance
Technical Gap Analysis
infrastructure