Chapter 7: Security Operations Flashcards
(79 cards)
Operations Security
Security is primarily concerned with the protection and control of information processing assets in centralized and distributed environments
Security Operations
are primarily concerned with the daily tasks required to keep security services operating reliable and efficiently. Operations security is a quality of other services. Security operations is a service in its own right”
control Mechanisms
Protect information and resources from unauthorized disclosure, modification, and destruction
Types of Control Mechanisms
PhysicalAdministrativeTechnical
Administrative Controls
Development of policies, standards, and procedures Screening personnel, security awareness training, monitoring system and network activity, and change controlExample: - Procedures indicating how servers should be installed, annual security awareness education for all employees, implementing a change control program.
Technical Controls
Logical mechanisms that provide password and resource management, identification and authentication, and software configurationsExample: - Anti-virus software, intrusion detection systems, locking down operating systems, encryption, firewalls.
Physical Controls
Protecting individual systems, the network, employees, and the facility from physical damageExample: - Removing floppy drives from computers, locking chassis’s, security guards monitoring the facility, air conditioning and humidity control.
Preventative Access Control
Controls to prevent undesirable events from taking place
Detective Access Control
Controls used to identify undesirable events that have occurred.
Corrective Access Control
Controls Used to Correct effects of undesirable events.
Deterrent Access Control
Controls used to discourage security violations
Recovery Access Control
Controls used to restore resources and capabilities
Compensation Access Control
Controls used to provide alternate solutions
MTBF
mean time to failure how long will a device last
MTTR
mean time to repair how long for the recovery
RAID - 0
Disk striping
Raid 1
mirroring
Raid 5
Disk striping with parity: fault tolerance + speed
Clustering
2 or more nodes acting as a single or logical entity. can provide load balancing but not always.
Full Backup
Archive bit is reset (is is a flag saying hey i got backed up)
Incremental Backup
Backs up all files that have been modified since last backupArchive Bit is reset
Differential Backup
Backs up all files that have been modified since last full backupArchive Bit is not resetAlways will have to restore 2 tapes
Copy Backup
Same as full backup, but Archive Bit is not resetUse before upgrades, or system maintenanceCopy backup before making a system backup.
configuration management
a process of identifying and documenting hardware components, software and the associated settings.” including bios settings…etc.everything needs to be documented