Domaine 1 : Concepts généraux de sécurité Flashcards

(28 cards)

1
Q

What are security controls?

A

Safeguards or countermeasures to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets.

Security controls are critical for protecting various types of assets from potential threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three types of security controls?

A
  • Managerial Controls
  • Operational Controls
  • Technical Controls

Each type of control serves a different purpose in managing security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do managerial controls focus on?

A

The management of risk and the information security program.

Examples include risk assessments, security planning, and policy development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do operational controls involve?

A

Controls implemented by people, such as security awareness training and incident response processes.

These controls are more focused on day-to-day operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are technical controls?

A

Controls implemented through technology, such as firewalls and intrusion detection systems.

These controls leverage technology to enhance security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of preventive controls?

A

To aim to prevent security incidents.

Examples include access controls and security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are detective controls designed to do?

A

To detect and react to incidents once they have occurred.

Examples include audit logs and intrusion detection systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the goal of corrective controls?

A

To correct systems after an incident.

Examples include backup and restore procedures and patch management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What do deterrent controls aim to do?

A

Discourage security violations.

Examples include warning signs and security awareness training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are compensating controls?

A

Alternative measures put in place when primary controls cannot be used.

An example would be using manual procedures when automated controls are not feasible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What factors influence the selection of appropriate security controls?

A

The organization’s specific needs, risk assessments, and regulatory requirements.

Tailoring controls to the organization ensures effective security management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is confidentiality in the context of information security?

A

Ensuring that sensitive information is accessible only to authorized individuals

Techniques include encryption, access controls, and authentication mechanisms.

17
Q

What does integrity mean in information security?

A

Maintaining the accuracy and completeness of data

Methods involve hashing, digital signatures, and checksums to detect unauthorized modifications.

18
Q

What is the goal of availability in information security?

A

Ensuring that information and resources are accessible to authorized users when needed

Strategies include implementing redundant systems, regular maintenance, and protection against denial-of-service attacks.

19
Q

Fill in the blank: Techniques for ensuring confidentiality include _______.

A

encryption, access controls, and authentication mechanisms

20
Q

Fill in the blank: Methods to maintain data integrity include _______.

A

hashing, digital signatures, and checksums

21
Q

True or False: Availability in information security means that resources are available to unauthorized users.

22
Q

What is one method to enhance availability?

A

Implementing redundant systems

Regular maintenance and protection against denial-of-service attacks also contribute to availability.

23
Q

What does authentication verify?

A

The identity of a user or system

Common methods include passwords, biometrics, and security tokens.

24
Q

What is the purpose of authorization?

A

Determines what resources an authenticated user can access

Implemented through access control lists and role-based access controls.

25
What does accounting track?
User activities for auditing and compliance ## Footnote Involves logging access times, duration, and resources used.
26
Fill in the blank: _______ verifies the identity of a user or system.
Authentication
27
Fill in the blank: _______ determines what resources an authenticated user can access.
Authorization
28
True or False: Accounting is solely focused on verifying user identities.
False