CISSP #1 Flashcards
(45 cards)
Access control: directive
used to define appropriate use and behavior within an organization with regard to that organization’s systems and services.
Access control: deterrent
used to dissuade potential attacks
Access control: preventive
used to stop potential attacks by preventing users from performing specific actions or functions on a system.
Access control: compensating
used to supplement directive access controls, such as company policy.
Access control: detective
used to monitor or send alerts about malicious activity.
Access control: corrective
used to repair damage caused by malicious events.
Access control: recovery
used to restore a system to a normal state after malicious activity has occurred.
Brownout
long period of low voltage
Sag
short period of low voltage
blackout
long period of power loss
fault
short period of power loss
Policies
Provide a high-level overview of the company’s security posture, creating the basic framework upon which a company’s security program is based. Contains mandatory directives an employee must follow.
Standards
Define the technical aspects of a security program, including hardware and software. These are mandatory things.
Procedures
Low-level guides that explain how to accomplish a task
Baselines
Minimum level of security
Guidelines
Provide helpful bits of advice to employees
Quartz Lamps
high wattage and immediately cast a bright white light. most appropriate for security lighting that requires quick and near-daylight brightness.
Mercury vapor lights
slow to full brightness. typically for continuous or emergency security lighting.
Sodium vapor lights
emit a soft yellow light and are best used in foggy conditions
Fluorescent lights
sensitive to temperature and are best suited for indoor uses
Configuration management steps:
- Baselining 2. Patch management 3. Vulnerability management
Change management steps:
- Requests 2. Impact assessment 3. Approval/Disapproval 4. Build and test 5. Notification 6. Implementation 7. Validation 8. Documentation
Bell-Lapadula model
Confidentiality; uses Simple Security Property and the * security property.
Simple security property
no read up policy