Chapter 1 - Compare and contrast various types of security controls Flashcards

(29 cards)

1
Q

Control Objective

A

is a statement of desired results or purpose to be achieved by implementing a control or set of controls.

Purpose: Protect hosts from malware.
Set of controls: AV, Host firewall, URL filtering, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Proportionality

A

is the Principle of balance: it is where you consider the costs of security, the security’s impact on usability and user experience, the security’s efficacy in furthering the mission, and any other competing factors, and combine these considerations to determine what and how much security will be the best fit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Defense in depth

A

(also known as layered security) is the design and implementation of multiple overlapping layers of diverse controls.
Controls should not be subject to a cascade effect and should maintain independence.
Diversity of type of control and associated vendor should be considered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cost Benifit Analysis

A

Process of comparing esitmated costs and benifits to determine whether it makes sense to proceed form a business prospective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Controls

A

Controls – tactics, mechanisms, or strategies that proactively minimize risk in one or more of the following ways.
Reduces or eliminates a vulnerability
Reduces or eliminates the likelihood that a threat actor will be able to exploit a vulnerability.
Reduces or eliminates the impact of an exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fine Tuning Controls - Scoping

A

Eliminating unnecessary baseline recommandations that are not applicable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fine Tuning Controls - Tailoring

A

Customizing baseline recommendations to align with organizational requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fine Tuning Controls - Compensating

A

Substituting a recommended baseline control with a similar control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fine Tuning Controls - Supplementing

A

Augmenting (adding to) the baseline recommendations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Control Baseline

A

express minimum standards for a given environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Countermeasures

A

controls implemented to address a specific threat.
Countermeasures are generally reactive
Countermeasures may be more effective but less broadly efficient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Exploit

A

when a threat actor successfully takes advantage of a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Assurance

A

Measure of confidence that the security features, practices, procedures, and architecture of an information system accurately mediates and enforces the security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Effectiveness

A

he measure of correctness of implementation (i.e., how consistently the control implementation complies with the security plan) and how well the security plan meets organizational needs in accordance with current risk tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Statement of desired result to be achieved by implementing a control?

A

Control objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Term used to describe multiple layers of diverse controls?

A

Defense-in-Depth

16
Q

Set of minimum controls for a given environment?

A

Control Baseline

17
Q

Process of eliminating unnecessary baseline recommendations?

18
Q

Control implemented to address a specific threat?

A

Countermeasure

19
Q

Control Category - Technical

A

Mechanisms are implemented using hardware, software, and/or firmware components. Can be native or supplemental.

Examples: firewalls, cryptography, authentication systems.

20
Q

Control Category - Managerial

A

Relates to risk management, governance, oversight, strategic alignment and derision making.

Examples: risk assessments, project management

21
Q

Control Category - Operational

A

Aligned with a process that are primarily implemented and executed by people.

Examples: change management, training, testing

22
Q

Control Category - Physical

A

Designed to address physical interactions. Generally related to buildings and equipment.

Examples: Gates, barricades, locks

23
Q

Control Classification - Deterrent

A

Discourage a threat agent from acting

24
Control Classification - Preventative
Stop a threat agent from being successful
25
Control Classification - Detective
Identify and report a threat agent or action
26
Control Classification - Corrective
Minimize the impact of a threat agent or modify or fix a situation
27
Compensating Control
Implemented in lieu of a recommended control that provides equivalent or comparable protection.
28
Directive Controls
proactive actions taken to cause or encourage a desirable event or outcome.