Chapter 9 Implementing Controls to Protect Assets Flashcards
____ ____ _____ help protect access to secure areas
Physical security controls
____ and ____ _____ strategies help eliminate single points of failure for critical systems.
Redundancy and fault-tolerance
_____ ensure that data remains available even after data is lost.
Backups
_____ ______ strategies help ensure mission critical functions continue to operate even if a disaster destroys a primary business location
Business continuity
____ ___ _____ refers to the security practice of implementing several layers of protection.
Defense in depth (aka layered security)
True or False: You must implement security at several different layers so if one layer fails you still have additional layers to protect you.
True
____ _____ is the use of different security control types, such as technical controls, administrative controls, and physical controls.
Control diversity
_____ ____ such as vulnerability assessments and penetration tests can help verify that these controls are working as expected
Administrative controls
____ ________ is the practice of implementing security controls from different vendors to increase security.
Vendor diversity
True or False: Many DMZs use two firewalls and vendor diversity dictates the use of firewalls from different vendors.
True
Example: One firewall could be a Cisco firewall and the other one could be a Check Point firewall.
_____ _______ also helps provide defense in depth.
User training
True or False: If users engage in risky behaviors, such as downloading and installing files from unknown sources or responding to phishing emails, they can give attackers a path into an organization’s network.
True
True or False: Providing regular user training on common threats, and emerging threats, helps them avoid these types of attacks.
True
A _____ ____ _____ is something you can physically touch, such as a hardware lock, a fence, an identification badge, and a security camera.
Physical security control
______ _____ _____ ______ attempt to control entry and exits, and organizations commonly implement different controls at different boundaries
Physical security access controls
List some physical security access controls
- Perimeter - Border around land
- Buildings
- Secure work areas - i.e. SOCC, NOC
- Hardware - Cabinet locks, cable locks, etc.
- Airgap
An ______ is a physical security control that ensures that a computer or network is physically isolated from another computer or network.
Airgap
True or False: A complex physical security control is a sign
False
It is a simple physical security control
True or False: It is common to secure access to controlled areas of a building with door locks, and there are many different lock types.
True
A ____ ____ ____ is one that only opens after some access control mechanism is used
Door access system
True or False: When implementing door access systems, it’s not important to limit the number of entry and exit points.
False
It is important
True or False: In the event of a fire, door access systems should allow personnel to exit the building without any form of authentication.
True
____ ____ often have four or five buttons labeled with numbers.
Cipher locks
Cipher locks can be ______ or ______
Electronic or manual