Domain 1 - Security and Risk Management Flashcards
(140 cards)
Administrative, Physical, and Technical controls
Three categories of access controls
Technical Control
Protects access to systems, network architecture, control zones, auditing, and encryption and protocols (Access Control categories). AC category that restricts access.
Administrative Control
Dictates how security policies are implemented to fulfill the company’s security goals. Includes policies, procedures, personnel controls, supervisory structure, security training, and testing. Includes policies and procedures, personnel controls, supervisory structure, security training, and testing (Access Control category).
Physical Control
Access control category that includes badges, locks, guards, network segregation, perimeter security, computer controls, work area separation, backups, and cabling; used to secure physical access to an object, such as a building, a room, or a computer (access control category).
Preventive control
Prevents security breaches and avoids risks.
Detective control
Looks for security breaches as they occur.
Corrective control
Restores control and attempts to recover from any damage that was inflicted during a security breach.
Deterrent control
Stops potential violations.
Recovery control
Restores resources.
Compensative control
Provides an alternative control if another control may be too expensive. All controls are generally considered this type of control.
Directive controls
Provides mandatory controls based on regulations or environmental requirements.
Recovery-Technical control
Restores system capabilities and covers data backups.
Detective-Technical control
Detects when a security breach occurs; covers audit logs and intrusion detection systems (IDS).
Corrective-Technical control
Corrects any issue that arises because of security breaches; Antivirus software and server images are included in this category.
Compensative-Technical control
Considered an alternative to other controls (example, server isolation).
Preventative-Technical control
A router plus encryption used to improve network security.
Deterrent, Preventive, Detective, Compensative, Corrective, Recovery, and Directive.
Access control types (types, not categories).
Preventative control measures
Security awareness training, Firewalls, Anti-virus, security guards, and IPS.
Detective control measures
System monitoring, IDS, Anti-Virus, motion detector, IPS.
Corrective control measures
OS upgrade, backup data rostral, Anti-virus, vulnerability mitigation.
Compensatory control measures
Backup generator, hot site, server isolation.
To prevent the threat from coming into contact with the weakness.
Purpose for Preventative controls.
To identify that a threat has landed in a system.
Purpose for Detective controls.
To mitigate or lesson the effects of the threat that has manifested.
Purpose for Corrective controls.