Control Type and Selection Flashcards

(72 cards)

1
Q

____ are countermeasures or safeguards used to reduce the chances that a threat will exploit a vulnerability.

A

security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The act of reducing risk is also called _____.

A

risk mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

three main types of IT security controls

A
  1. Technical
  2. Administrative
  3. Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CONTROL TYPES

Fences

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CONTROL TYPES

Gates

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CONTROL TYPES

CCTV

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CONTROL TYPES

Surveillance

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CONTROL TYPES

Repair physical damage

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CONTROL TYPES

re-issue access cards

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CONTROL TYPES

IPS

A

Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CONTROL TYPES

Honeypots

A

Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CONTROL TYPES

Antivirus

A

Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CONTROL TYPES

Vulnerability patching

A

Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CONTROL TYPES

reboot a system

A

Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CONTROL TYPES

hiring & termination policies

A

administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CONTROL TYPES

separation of duties

A

administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CONTROL TYPES

data classification

A

administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CONTROL TYPES

review access rights

A

administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CONTROL TYPES

audit logs

A

administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CONTROL TYPES

implement a business continuity plan

A

administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CONTROL TYPES

have an incident response plan

A

administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Risk mitigation is achieved by implementing different types of security controls depending on:

A
  1. The goal of the countermeasure
  2. level to which the risk needs to be minimized
  3. severity of damage the threat can inflict
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

_____ controls attempt to prevent an incident from occurring.

A

Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

____ controls attempt to detect incidents after they have occurred.

A

Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
____ controls attempt to reverse the impact of an incident.
corrective
26
_____ controls attempt to discourage individuals from causing an incident.
Deterrent
27
_____ controls are alternative controls used when a primary control is not feasible.
comepnsating
28
They are the people who interact with the physical assets, networks, and endpoints.
Users
29
Users must adhere to security policies, such as using strong passwords, being aware of phishing attempts, and following proper access control procedures.
Responsibility
30
Human error, such as falling for a social engineering attack or misplacing a device, can compromise even the most robust security systems.
Vulnerability
31
the primary asset that all the security measures are ultimately designed to protect. It is the information (personal records, intellectual property, financial data) that has value to an organization.
Data
32
3 States of data
1. rest (stored) 2. transit (moving across network) 3. in use (being processed by an app)
33
SECURITY DOMAINS Tangible assets (buildings, hardware, server rooms, people)
Physical
34
SECURITY DOMAINS Prevent unauthorized physical access, theft, vandalism, and damage from environmental threats (fire, flood).
Physical
35
SECURITY DOMAINS The network infrastructure and data as it moves across the network (data in transit).
Network
36
SECURITY DOMAINS Individual devices (laptops, desktops, mobile phones, servers) that connect to the network.
Endpoint
37
SECURITY DOMAINS Protect the integrity of the network and control traffic flow to prevent digital intrusions and data breaches.
Network
38
SECURITY DOMAINS Protect the data and applications residing on the device, serving as the last line of defense against threats.
Endpoint
39
the likelihood that a threat will exploit a vulnerability resulting in a loss.
risks
40
any event with the potential to compromise the confidentiality, integrity, and availability (CIA) of information.
Threat
41
___ are a weakness or flaw in the software, hardware, or organizational processes, which when compromised by a threat, can result in a security incident.
Vulnerabilities
42
an occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies.
Security Incidents
43
Network traffic filters that can control incoming or outgoing traffic. ACLs are common in routers or firewalls but can also be configured in any device that runs in the network.
Access Control Lists (ACLs)
44
A policy that defines what to do with user access accounts for employees who leave voluntarily, have immediate terminations, or are on a leave of absence.
Account Disablement Policy
45
Policies, procedures, or guidelines that define personnel or business practices in accordance with the organization’s security goals.
Administrative Security Controls
46
The process of creating and storing copies of data that can be used to protect organizations against data loss.
Backups and System Recovery
47
The methods and manners in which a company describes and implements change within both its internal and external processes.
Change Management
48
Alternative controls used when a primary control is not feasible. They must meet the intent of the original control and provide a similar level of assurance.
Compensating Controls
49
Controls that attempt to reverse the impact of an incident.
Corrective Controls
50
A common security strategy used whereby multiple layers of controls are implemented.
Defense-in-depth
51
Controls that attempt to detect incidents after they have occurred.
Detective Controls
52
Controls that attempt to discourage individuals from causing an incident.
Deterrent Controls
53
The process of reducing security exposure and tightening security controls.
Hardening
54
A network security technology that monitors network traffic to detect anomalies and can quickly prevent malicious activity by dropping packets or resetting connections.
Intrusion Prevention Systems
55
An approach that combines multiple security controls to develop a defense-in-depth strategy.
Layering
56
A diagnostic method used to analyze real-time events or stored data to ensure application availability and to assess the impact of changes on an application’s performance.
Log Monitoring
57
Security controls that focus on the management of risk and the management of information system security.
Management Controls
58
Security controls that are primarily implemented and executed by people (as opposed to systems).
Operational Controls
59
A method for testing a web application, network, or computer system to identify security vulnerabilities that could be exploited.
Penetration Testing
60
The implementation of security measures in a defined structure used to deter or prevent unauthorized access to sensitive material.
Physical Controls
61
Controls that attempt to prevent an incident from occurring.
Preventive Controls
62
The likelihood that a threat will exploit a vulnerability resulting in a loss.
Risk
63
The act of reducing risk by decreasing the chances that a threat will exploit a vulnerability.
Risk Mitigation
64
A measurement that focuses on cybersecurity standards, guidelines, and procedures, as well as the implementation of these controls.
Security Audit
65
The process of providing formal cybersecurity education to a workforce about various information security threats and company policies for addressing them.
Security Awareness Training
66
The testing and/or evaluation of the management, operational, and technical security controls in an information system to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome.
Security Control Assessment
67
Countermeasures or safeguards used to reduce the chances that a threat will exploit a vulnerability.
Security Controls
68
An occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability (CIA) of an information system or the information it processes, stores, or transmits.
Security Incident
69
A set of tools and services offering a holistic view of an organization’s information security by using operational logs from various systems.
Security Information and Event Management (SIEM)
70
Also known as logic controls, these use technology to reduce vulnerabilities in hardware and software.
Technical Controls
71
The practice of gathering information and attempting to identify a pattern in the information gathered from an application’s log output.
Trend Analysis
72
The process of identifying risks and vulnerabilities in computer networks, systems, hardware, applications, and other parts of the IT ecosystem.
Vulnerability Assessment