Which term refers to someone providing information that proves they are who they say they are?
A. Authentication
B. Authorization
C. Accounting
A
True or False: The AAA framework consists of three parts and they are: Authentication, Availability, and Accounting
False
authentication
providing information that proves someone is who they say they are
authorization
CA/Certificate Authority
the entity that signs a certificate authority for a specific device
certificate authentication
a certificate included on a device as an authentication factor
CIA Triad
A combination of principles that includes confidentiality, integrity, and availability
- confidentiality: sensitive data should be protected
- integrity: statse that data should be accurate and unaltered
- availability: states that data should always be accessible to those who are authorized
compensating
a security control type that attempts to make up for the shortcomings of other controls and prevent the exploitation of a weakness
corrective
a security control type used to minimize negative impact of an incident; fire suppression system, antivirus software, security training
detective
deterrent
a security control type that discourages threats from trying to exploit a vulnerability; examples include security guards, login banners,
directive
a weak security control type that directs a subject towards security compliance
identification
this describes who someone claims to be
integrity
managerial
security control category enforced by management and implemented by employees
operational
a security control category that translate managerial policies into routine work. they are the repeatable steps people follow to keep systems secure, detect problems, and restore services when needed
physical security controls
security control category implemented to prevent unauthorized physical access to facilities and resources
preventative security controls
a security control type that exists to not allow an action to happen; examples include firewalls, fences, and access permissions
Proof of Origin
proof that a message was not changed
technical
security control category implemented through technology to protect systems and data.
True or False: It is possible for a security control to fall into or have more than just one category?
A. True
B. False
A
Which refers to the five types of security controls?
What are the six types of security controls?
What are the four security control categories?