Objective 1.1 Flashcards

Compare and contrast various types of security controls (41 cards)

1
Q

Security Controls Categories

A
  • Technical Controls
  • Managerial Controls
  • Operational Controls
  • Physical Controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TMOP

A
  • Technical Controls
  • Managerial Controls
  • Operational Controls
  • Physical Controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The technologies, hardware and software mechanisms that are implemented to manage and reduce risks.

A

Technical Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Examples of technical controls

A
  1. Antivirus
  2. Firewalls
  3. Encryption Processes
  4. Intrusion Detection Systems (IDS like SNORT)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Involve the strategic planning and governance side of security.

Is about making informed decisions and ensure that the organization is on the same security page.

A

Managerial Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Example of Managerial Control

A
  1. Conduct a risk assesment to understand the potential risks and vulnerabilities and assess if a tool implementation or a new network archtecture will align with the company’s broader risk strategy.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Managerial Contols encompass:

A
  • Risk Assessment
  • Security Policies
  • Training Programs
  • Incident Response Strategies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

[Managerial Contols]
RiskAss
SecPo
TaingPo
IncResp

A
  • Risk Assessment
  • Security Policies
  • Training Programs
  • Incident Response Strategies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Procedures and measures that are designed to protect data on a day-to-day basis and are mainly governed by internal processes and human actions.

A

Operational Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Examples of Operational Controls:

A
  • Organization requires that you change your password every 90 days.
  • Backup Procedures
  • Account Reviews
  • User Training Programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Tangible, real-world measures taken to protect assets.

A

Physical Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Example of physical controls:

A
  • Shredding of sensitive documents
  • Security guards
  • Locking the doors
  • Cameras
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Control Types

A
  • Preventive Controls
  • Deterrent Controls
  • Detective Controls
  • Corrective Controls
  • Compensating Controls
  • Directive Controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Proactive mesaures implemented to thwart potential security threats or breaches

A

Preventive Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Aim to discourage potential attackers by making the effort seem less appealing or more challenging.

A

Deterrent Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Monitor and alert organizations to malicious activities as they occur or shortly thereafter.

A

Detective Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Mitigate any potential damage and restore the systems to their normal state.

A

Corrective Controls

18
Q

Alternative measures that area implemented when primary security controls are not feasible or effective.

A

Compensating Control

19
Q

Often rooted in policy or documentation and set the standards for behavior within an organization.

A

Directive Controls

20
Q

Is a cybersecurity approach that assumes no user or system is trusted by default and requires continuous verification for access to organizational resources.

21
Q

Demands verification for every device, user, and transaction within the network, regardless of its origin.

22
Q

Zero Trust Planes

A

Control Plane
Data Plane

23
Q

[Zero Trust] The overarching framework and set of components responsible for defining, managing, and enforcing the policies related to user and system access within an organization.

A

Control Plane

24
Q

[Zero Trust-CoP] Control Plane encompass…

A
  • Adaptative Identity
  • Threat Scope Reduction
  • Policy-driven Access Control
  • Secured Zones
25
[Zero Trust-CoP] Adaptative Identity
Use adaptative identity that **rely on real-time identity validation** that takes into account the user's behavior, device, location, and more.
26
[Zero Trust-CoP] Threat Scope Reduction
**Limit the users' access to only what they need for their work** tasks because ths drastically reduces the network's potential attack surface.
27
[Zero Trust-CoP] Policy-Driven Access Control
Entails developing, managing, and enforcing user access policies based on their roles and responsabilities.
28
[Zero Trust-CoP] Secured Zones
Isolated environments within a network that are designed to house sensitive data.
29
[Zero Trust-CoP] Control Plane uses: Policy ........ Policy ........
[Zero Trust-CoP] Control Plane uses: Policy Engine Policy Administrator
30
[Zero Trust-CoP] Policy Engine
Cross-references the access request with its predefined policies (like a rule book).
31
[Zero Trust-CoP] Policy Administrator
Used to establish and manage the access policies.
32
[Zero Trust] Data Plane
* Subject/System * Policy Enforcement Point
33
[Zero Trust-DP] Subject/System
Refers to the individual or entity attempting to gain access.
34
[Zero Trust-DP] Policy Enforcement Point
Allow or restrict access, and it will effectively act as a gatekeeper to the sensitive areas of the systems or networks.
35
Process of evaluating the differences between an oganization's current performance and its desired performance.
Gap Analysis
36
Gap Analysis Steps
1. Define the scope of the analysis 2. Gather data on the current state of the organization 3. Analyze the data to indentify the gaps 4. Develop a plan to bridge the gap
37
2 types of gap analysis:
Technical Gap Analysis Business Gap Analysis
38
Technical Gap Analysis
Involves evaluating an organization's current technical infrastructure and indetifying any areas where it falls short of the technical capablities required to fully utilize their security solutions.
39
Business Gap Analysis
Involves evaluating and organization's current business processes and identifying any areas where they fall short of the capabilities required to fully utilize cloud-based solutions.
40
Outlines the specific measures to address each vulnerability, allocate resources, and set up timelines for each remediation task that is needed.
POA&M - Plan of Action and Milestones
41
Is a powerful tool that can help organizations to improve their security and their performance by identifying areas where improvements can be made.
Gap Analysis