Chapter 1: Understanding Security Fundamentals Flashcards
(39 cards)
A concept used that has multiple protective layers so that if one layer of protection goes down, other layers will be in place to guard against hacking a company’s data.
Defense in Depth
Managers write these as sort of an organizational policies and procedures to help mitigate risks within companies.
Managerial Controls
Ex: Annual Risk Assessment,
Pentesting/vulnerability scanning.
Policies and procedures executed by personnel on a day-to-day basis.
Operational Controls
Ex: Annual Security Awareness Training, Change management, Business Continuity Plan
Policies and procedures implemented by the IT Team to reduce the risk of breaches to cyber security
Technical Controls
Ex: Firewall Rules, Antivrus, Screen savers, Screen filters, IPS/IDS
CCTV (Camera that captures crimes) and motion sensors
Deterrent Controls
Used when investigating an incident that has happened.
Detective Controls
Text files that record events that take place on devices like servers, desktops, and firewalls with details of what happened. Timestamps provide the time of attack. WORM helps to avoid tampering.
Log Files
The actions taken to correct and help guard against future attacks of the same nature.
Corrective Controls
Used when Primary controls are not available
Compensating Controls (Alternative or Secondary Controls)
Used to prevent any potential problems from occurring in the first place like a former employee getting onto a company server and tampering with data.
Preventative Controls
Consists of three main parts:
Identification, Authentication, and Authorization.
Access Controls
Examples include a smart card, Security Identifier, fingerprint reader
Identification
Used to verify access. Examples include a PIN, or password.
Authentication
This is the least amount of privilege given in order to have access to data needed to perform your job.
Authorization
Involves New Technology File System(NTFS) file permissions that give the bare minimum amount of privilege needed to perform your job.
Discretionary Access Control
Full Control Modify Read and Execute List Folder Contents Read Write
Access based on the label/level of the data.
Ex: Top Secret, Secret, Classified
Mandatory Access Control(MAC)
A rule that only applies to the people in that department and no one else can have access to that data because the rule doesn’t apply to them.
Rule-Based Access Control (RBAC)
Access is restricted based on an attribute in the account.
Attribute-Based Access Control
Individuals may be put into groups that have certain privileges so that simplifies access.
Group-Based Access Control
- Collection
- Examination
- Analysis
- Reporting
Forensic Cycle
The data is looked at, then pulled from the media that it is on, and changed to a format that it can then be examined by forensic tools.
Collection
Prior to being examined by a forensics tool, The data is hashed to ensure integrity so that once the investigation is over with, the data will have the same hash. This helps with it being used as evidence in court cases.
Examination
data that is analyzed and formatted so that it can be used as evidence.
Analysis
The evidence from the investigation is then used for a conviction.
Reporting