GCGA Ch. 1 Mastering Security Basics Flashcards

(55 cards)

1
Q

Security Control Categories

A

Technical, Managerial, Operational, Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Control Types

A

Preventive, Deterrent, Detective, Corrective, Compensating, Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Controls

A

Controlling who accesses data is how you ensure confidentiality (C) in the CIA triad. Identification, authentication, and authorization are the 3 core identity and access management activities that help ensure only authorized personnel can access data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A

Keeping data secret from all but those authorized to access it. This is accomplished by encryption, identification, authentication, and authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Managerial Controls

A

Primarily administrative in function. They are typically documented in an organization’s security policy and focus on managing risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Operational Controls

A

Help ensure that the day-to-day operations of an organization comply with the security policy. People implement them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Physical Controls

A

Impact the physical world, such as locks on doors, fences, security guards, and other objects that you can physically touch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Preventive Controls

A

Attempt to prevent an incident from occurring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Detective Controls

A

Attempt to detect incidents after they have occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Corrective Controls

A

Attempt to restore normal operations after an incident occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Deterrent Controls

A

Attempt to discourage individuals from causing an incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Compensating Controls

A

Alternative controls used when a primary control is not feasible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Directive Controls

A

Provide instruction to individuals on how they should handle security- related situations that arise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encryption

A

Scrambling data to make it unreadable to unauthorized personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Examples of technical controls

A

Encryption, antivirus software, Intrusion Detection Systems (IDSs), Intrusion Prevention Systems (IPSs), firewalls, least privilege principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Examples of managerial controls

A

Risk assessments, vulnerability assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Examples of operational controls

A

Awareness and training, configuration management, media protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Examples of physical controls

A

Barricades, bollards, access control vestibules, lighting, signs, fences, sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Examples of preventive controls

A

Hardening (defense-in-depth, layered security, disabling unnecessary ports & services), training (vs social engineers), security guards, account disablement process (ensures employee account is disabled after employee leaves org), IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Examples of detective controls

A

Log monitoring, SIEM, IDS, security audit (ex. account audit to make sure personnel/technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Examples of corrective controls

A

Backups and system recovery, incident handling processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Examples of deterrent controls

A

Warning signs, login banners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Examples of compensating controls

A

Time-based one-time password (temporarily, instead of a smart card)

24
Q

Examples of directive controls

A

Policies, standards, procedures, and guidelines, change management

25
Least privilege principle
specifies that individuals or processes are granted only the privileges they need to perform their assigned tasks or functions, but no more. Privileges are a combination of rights and permissions
26
Confidentiality
ensures that data is only viewable by authorized users. Encryption is the best choice to provide confidentiality. Access controls also protect the confidentiality of data.
27
Integrity
provides assurances that data has not been modified, tampered with, or corrupted through unauthorized or unintended changes. Data can be a message, a file, or data within a database. Hashing is a common method of ensuring integrity.
28
Availability
ensures that data and services are available when needed. A common goal is to remove single points of failure. Fault tolerance methods and redundancies are commonly added to support high availability.
29
Scale up vs scale out
Systems scale up by adding additional hardware resources such as memory, processing power, bandwidth capability, and/or drive space. Systems scale out by adding additional nodes or servers. They can scale down or scale in by removing these resources.
30
Scalability
the ability of a system to handle increased workload either by scaling up or by scaling out. This is done manually by administrators.
31
Elasticity
the ability of a system to handle the increased workload by dynamically adding or removing resources as the need arises. Cloud resources typically have elasticity capabilities allowing them to adapt to this increased and decreased demand automatically.
32
Resiliency methods
help systems heal themselves or recover from faults with minimal downtime.
33
Balancing resource availability with security constraints
Organizations balance resource availability with security constraints. Security professionals may want to apply security controls everywhere without considering the cost. However, executives have a responsibility to minimize costs without sacrificing security.
34
Risk
the possibility of a threat exploiting a vulnerability and resulting in a loss.
35
Threat
any circumstance or event that has the potential to compromise confidentiality, integrity, or availability.
36
Vulnerability
a weakness. It can be a weakness in the hardware, software, configuration, or users operating the system.
37
Risk mitigation
reduces risk by reducing the chances that a threat will exploit a vulnerability or reduce the risk’s impact. Security controls reduce risks. For example, antivirus software is a security control that reduces the risk of virus infection. One of the core jobs of security professionals is selecting an effective set of security controls to manage different types of risk.
38
Four security control categories
managerial, operational, technical, and physical.
39
Managerial controls
primarily administrative and include items such as risk and vulnerability assessments.
40
Operational controls
focused on the day-to-day operations of an organization. They help ensure an organization is complying with its overall security plan. Some examples include security awareness and training, configuration management, and change management.
41
Technical controls
use technology to reduce vulnerabilities. Encryption, antivirus software, IDSs, firewalls, and the principle of least privilege are technical controls.
42
Physical controls
any controls that you can physically touch. Some examples are bollards and other barricades, access control vestibules (sometimes called mantraps), lighting, fences, and signs.
43
Six control types
preventive, deterrent, detective, corrective, compensating, and directive.
44
Preventive controls
attempt to prevent security incidents. Examples include system hardening, user training, guards, change management, and account disablement processes.
45
Detective controls
attempt to detect when a vulnerability has been exploited. Examples include log monitoring, security information and event management (SIEM) systems, trend analysis, video surveillance systems, and motion detection systems.
46
Deterrent controls
attempt to prevent incidents by discouraging threats. Examples include locks and guards. Note that these can also be described as preventive controls. The primary difference is that they try to discourage people from trying to exploit a weakness.
47
Corrective controls
attempt to reverse the impact of an incident or problem after it has occurred. Examples include backups, system recovery plans, and incident handling processes.
48
Compensating controls
alternative controls used when it isn’t feasible or possible to use the primary control. Directive controls provide instruction to individuals on how they should handle security-related situations that arise.
49
Windows logs
Windows includes several logs that you can view with the Windows Event Viewer. The Security log functions as a security log, an audit log, and an access log. Windows records events related to the operating system in the System log. Some applications record events in the Application log.
50
Linux logs
Linux systems store log information in text files contained in the /var/log directory. The /var/log/syslog and/or /var/log/messages files contain general system messages. The /var/log/secure file records authentication and authorization events.
51
Network logs
important sources of information about network activity. Common sources of network logs include firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), and packet captures.
52
OS Log Files
Many applications store log records in operating system log files, while others maintain their own logs. Web servers commonly store records of every request that they receive and process.
53
Metadata
Some applications track and store metadata about the data that they process. Common examples of metadata include email headers and image metadata.
54
SIEM
Security information and event management (SIEM) systems provide a centralized solution for collecting, analyzing, and managing data from multiple sources.
55
Syslog protocol
specifies a log entry format and the details on how to transport log entries. You can deploy a centralized syslog server to collect syslog entries from a variety of devices in the network.