Identify Security Control Types Flashcards

lesson NO 1 (30 cards)

1
Q

What is the job of a cybersecurity analyst?

A

A senior position within an organization’s security team with direct responsibility for protecting sensitive info and preventing unauthorized access to electronic data and the systems that protect it.

Important traits: problem solving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the job of a CISO?

A

chiff information security officer

A senior executive responsible for managing cybersecurity and information security within an organization. Their role includes overseeing security strategies, identifying threats, managing risks, and ensuring compliance with security standards.

Oversees an organization’s information, cyber, and technology security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a CSIRT?

A

(Computer Security Incident Response Team)

Responsible for identifying, analyzing, and responding to cybersecurity incidents within an organization. Their primary goal is to minimize damage, contain threats, and restore normal operations as quickly as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the job of a SOC?

A

Security operations center

A location where professionals monitor and protect critical information assets in an organizations.

Important traits:
1. They must have an authority to operate
2. Have motivated and professional people in the group
3. Incorporate processes into a single center
4. Be ready to perform incidence response
5. Protect themself and the organization network
6. Can separate the data to: not good, not bad, maybe?
7. Collaborate with other SOC stuff from different companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NIST Special Publication 800-53 Revision 5
What can u tell me about it?

A

This document is called the security and privacy controls for federal information systems and organizations

This document has 18 families of controls to make it easier to find controls. Examples of families are:
● Access Control (AC)
● Accountability (AA)
● Incident Response (IR)
● Risk Management (RA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the model of CIA?

A

Confidentiality – Keeping data private and accessible only to authorized users.

Integrity – Ensuring data remains accurate and unchanged unless modified by authorized parties.

Availability – Ensuring systems and data are accessible to legitimate users when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In CIA model, what letter dose encryption fit?

A

Confidentiality

Example: Encrypting sensitive emails or files ensures that only authorized users can read the content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ISO 27001
What can u tell me about it?

A

Is an international standard and a proprietary framework.
Earlier versions of the NIST SP 800-53 used classes of controls (technical, operational, and managerial)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Technical (Logical) Controls?

A

A category of security control that is implemented as a system

(hardware, software, or firmware)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Operational Controls ?

A

A category of security control that is implemented primarily by people rather than systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Managerial Controls ?

A

A category of security control that provides oversight of the information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If i install a firewall or an anti-virus on your machine, what kind of control is it?

A

Technical control

A category of security control that is implemented as a system (hardware, software, or firmware)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If i teach people in the company against phishing, what kind of control is it?

A

operational control

because it’s targeted people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Preventative Control ?

A

A control that acts to eliminate or reduce the likelihood that an attack can succeed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Detective Control ?

A

A control that may not prevent or deter access, but will identify and record any attempted or successful intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Corrective Control ?

A

A control that acts to eliminate or reduce the impact of an
intrusion event

17
Q

Give an example for preventive control

A

Installing firewall

because it’s trying to stop an attacker from breaking in

18
Q

Give an example for detective control

A

logs investigations, or going through the footage of a security camera

19
Q

What is a Physical Control ?

A

A type of security control that acts against in-person intrusion attempts

like alarm , security guard

It can be: detective , physical, corrective or penetrative control.

20
Q

What is a Deterrent Control ?

A

A type of security control that discourages intrusion attempts

For example: a sigh of warning like “beware a dog” and its not necessarily the house has a dog.

21
Q

What is a Compensating Control ?

A

A type of security control that acts as a substitute for a principal control.
Not the top line, but gives you some protection

using 2FO - two factors authentication

22
Q

What is a Responsive Control ?

A

System that actively monitors for potential vulnerabilities or attacks, and then takes action to mitigate them before they can cause damage

For example: a firewall

23
Q

What is a firewall ?

A

a system that monitors all incoming and outgoing network, traffic and blocks

24
Q

What is an Intrusion Prevention System (IPS)

A

devices that can monitor network traffic for patterns that indicate an intrusion is occurring such as a repeated failed log on attempt

25
What kind of CIA is digital signature on my emails?
Integrity because its an hash!
26
What kind of CIA is a cloud?
Availability because we can take as much of a data we need
27
How do you select the security controls you want to use?
Make use of Confidentiality, Integrity, and Availability (CIA) to have proper coverage over each of those areas to make sure you're creating security for your system
28
Quiz q: Which role or position maintains the overall responsibility for systems security and information assurance within an organization?
CISO בגלל הרמז של אוברול ריספונסביליטי, ואינפורמיישן וכו- כל הראשי תיבות פה
29
Quiz q: Which type of control aims to minimize the impact of a security incident after it occurs?
corrective control Corrective controls are implemented to mitigate or limit the damage after a security incident has occurred. האפשרויות שהיו ולא נכונות: * Preventive control -These aim to stop security incidents before they happen * Detective control- These focus on identifying and detecting security incidents
30
Quiz q: Which security control functional type is used to identify and record any attempted or successful intrusion?
detective control A detective control is a a type of security control that acts during an incident to identify or record that it is happening. A detective control operates during the progress of an attack. Examples include logs and security cameras which are used to maintain a record of actions taken by an attacker. האפשרויות שהיו ולא נכונות: *preventive control-These aim to stop security incidents before they happen