Security Controls Flashcards

1
Q

Assets

A

Assets are varied. They can be data, physical property, and computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How to prevent security events, minimize impact, and limit damage?

A

Use security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the four control catagories

A

Techical, Managerial, Operational, and Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Technical Controls

A
  • Controls implemented using systems
  • Operating systems controls
  • Firewalls, anti-virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Managerial Controls

A
  • Administrative controls associated with security design and implementation.
  • Security policies, standard operating procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Operational Controls

A
  • Controls implemented by people instead of systems
  • Security guards, awareness programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Physical Controls

A
  • Limited physical access
  • Guard shack
  • Fences, locks
  • Badge readers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Preventive Controls

A

Blocks access to a recource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ways to prevent access?

A
  • Firewalls rules
  • Follw security policy
  • Guard shack checks all identification
  • Enable door locks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Deterrent Controls

A

Deterrent discorages an intrusion attempt. This does not directly prevent access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Was to discourage attackers?

A
  • Use application splash screens
  • Threat of demotion for employees
  • Presence of a front desk receptionist
  • Post warning signs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Detective Controls

A

Identify and log an intrusion attempt. This may not prevent access.

Finding the issue by doing the following:
- Collecting and reviewing system logs
- Reviewing login reports
- Regularly patrol the property
- Enable motion detectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Corrective Controls

A

When applying a control after an event has been detected. This is to help reverse the impact of an event while continuing to operate with minimal downtime.

Correcting the problem is when you restore from backups when trying to mitigate a ransomeware attack.

Creating policies for reporting security issues.

Contacting law enforcement to manage criminal activity

Use a fire extinguisher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Compensating Control

A

Control using other means when existing controls are not enough. This may be temporary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to prevent the exploitation of a weakness

A
  • Using firewall blkocks for specific application instead of patching the app
  • Inmplement a separation of duties
  • requiring simulation guard duties
  • Generator used if there is a power outage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Directive Controls

A

Direct a subject towards security compliance. This is considered a weak security control.

Examples:
1. Storing sensitive files in a protective folder
2. Creating compliance policies and procedures
3. Train users on proper security policy
4. Post a sign for “Authorized Personnel Only”