General Security Concepts Flashcards
(42 cards)
Name four control categories
- Technical controls
- Managerial controls
- Operational controls
- Physical controls
Which control type is a relatively weak one and why?
- Directive control types
- It’s relatively weak because you basically just ask someone to follow the rules or to do or not do something
Name 6 control types
- Preventive controls (förebyggande)
- Deterrent controls (avskräckande)
- Detective controls (varning)
- Corrective controls (Korrigerande)
- Compensating controls (kompenserande)
- Directive controls (direktiv)
Explain operational controls
Operational controls is a control category and are controls implemented by people instead of systems, for example: awareness programs
Explain managerial controls
Managerial controls is a control category and are administrative controls like security policies. Also known as Governance in the term GRC
Explain technical controls
Technical crontrols is a control category and are controls implemented using systems, for example firewalls or anti-virus
What are preventive control types?
Preventive control types prevents something bad happening before it happens
What are detective control types?
Detective control types identifies/detect if something bad happens but does not necessarily prevent it
What are deterrent control types?
Deterrent control types “scares” someone to not do bad things due to the consequences
What are corrective control types?
Corrective control types corrects the problem and is applied after something bad has happened
What are compensating control types?
Compensating control types are used when existing controls aren’t enough
What are directive control types?
When you direct a subject towards security compliance, basically when you ask someone to do or not do something
When you collect and review a system log, what category and type of control is that?
Category: Technical
Type: Detective
When you restore a system with backup after an ransomware attack, what category and type of control is that?
Category: Technical
Type: Corrective
If you put up warning signs with consequences if you enter a specific room without permission, what category and type of control is that?
Category: Physical
Type: Deterrent
What is the CIA Triad and what do the letters stand for?
- The CIA Triad is the fundamentals of security
- C = Confidentiality
- I = Integrity
- A = Availability
Name 3 technical controls that you can apply to ensure the information is confidential
- Encryption
- Access controls
- Two-factor authentication
Name 3 technical controls that you can apply to ensure that the information has not been compromised (integrity)
- Hashing
- Digital signatures
- Certificates
Name 3 technical controls that you can apply to ensure that the information is available when needed
- Redundancy
- Fault tolerance
- Patching
What is Non-repudiation?
Non-repudiation is the assurance that someone cannot deny the validity of something - it provides proof of the origin and integrity of data (confirmes who sent it and that it has not been modified on the way)
What is a hash?
Hashing is the process of transforming any given key or string of characters into another value, usually represented by a shorter, fixed-length value or key.
A hash function generates new values accordning to a mathematical hashing algorithm. To prevent the conversion of a hash back into the original key or string, a good hash always uses a one-way hashing algorithm.
Which key do you encrypt with?
The private key
Which key do you decrypt with?
The public key
What is proof of integrity and proof of origin?
- Proof of integrity proves that data has not been modified
- Proof of origin proves the source of the data