day-to-day security measures and procedures that ensure an organization’s systems, data, and operations are protected and functioning securely
Ex.An organization conducts regular incident response drills to make sure employees know how to react during a cybersecurity breach. This helps minimize damage and ensures a quick recovery when real incidents occur.
Operational Controls
security measures focused on planning, policy, and oversight to manage and guide an organization’s overall security strategy
Setting security policies and conducting risk assessments are examples of what type of control?
Managerial Controls
security measures implemented through technology to protect systems and data from unauthorized access or attacks.
ex. Using firewalls and encryption to prevent hackers from accessing sensitive information.
Technical Controls
measures taken after a security incident to fix issues, restore systems, and prevent the problem from happening again.
Ex. Restoring data from backups after a ransomware attack.
Corrective Controls
Definition: Long-term risks that affect an organization’s overall goals or direction.
Example: Failing to adapt to new cybersecurity regulations or technologies.
Strategic Risk
Definition: Risks that arise from day-to-day business activities or processes.
Example: A system outage caused by human error or poor procedures.
Operational Risk
Definition: Risks that could lead to monetary loss due to breaches, fines, or downtime.
Example: Paying regulatory penalties after a data leak
Financial Risk
Definition: Risks related to violating laws, regulations, or standards.
Example: Not following GDPR or HIPAA requirements.
Compliance Risk
Definition: Risks that damage an organization’s public image or trust.
Example: Customers losing trust after a publicized data breach.
Reputational Risk Network based
monitors and analyzes data in motion — information being sent over a network — to detect and prevent sensitive data from leaving an organization’s network without authorization.
Ex. A DLP system scans outgoing emails and blocks messages that contain Social Security numbers or credit card data.
Network-Based DLP
runs on individual devices (endpoints) such as computers or servers to monitor and protect data in use or at rest on that system
Ex. A DLP agent on a laptop blocks a user from copying sensitive files to a USB drive.
Host-based DLP
U.S. federal law that sets standards for the protection and privacy of sensitive patient health information (Protected Health Information, or PHI).
Which law sets standards for protecting patient health information in the U.S.?
HIPAA
a set of security standards designed to ensure that all organizations that handle credit card information maintain a secure environment.
ex. A retailer encrypts credit card data during transactions and restricts access to only authorized personnel.
PCI DSS (Payment Card Industry Data Security Standard)
a U.S. federal law that requires financial institutions to protect the privacy and security of customers’ nonpublic personal information (NPI).
ex. A bank implements strict access controls and encryption to protect customer financial records.
GLBA (Gramm-Leach-Bliley Act)
a U.S. federal law that mandates financial transparency and accountability for publicly traded companies, including requirements for protecting financial data and internal controls.
Example:
A company implements strict audit trails and access controls for its financial systems to comply with __
SOX (Sarbanes-Oxley Act)
is a process that replaces sensitive data (like credit card numbers) with a non-sensitive placeholder, which has no exploitable value if intercepted.
Tokenization
is a process that converts data into a fixed-length string of characters using a mathematical algorithm. It is one-way, meaning the original data cannot be easily recovered
ex. Storing passwords like 5f4dcc3b5aa765d61d8327deb882cf99 instead of the actual password password.
Hashing
formal documents published by the Internet Engineering Task Force (IETF) that define standards, protocols, and best practices for the Internet. They provide guidance on how technologies like TCP/IP, HTTP, and email should work.
Quiz Question:
What are the formal documents that define Internet standards and protocols?
Internet RFCs (Request for Comments)
a standardized language for sharing cyber threat intelligence. It allows organizations to describe threats, attacks, indicators, and other threat-related information in a structured, machine-readable format.
ex. A cybersecurity team shares a __ report detailing a new malware campaign, including file hashes, IP addresses, and attack techniques, so other organizations can prepare defenses.
STIX (Structured Threat Information eXpression)
evidence that a system or network has been breached or compromised by malicious activity. It helps security teams detect and respond to attacks.
Example:
Unusual outbound network traffic, a known malware hash, or suspicious login attempts.
IOC (Indicator of Compromise)
how cyber attackers operate, including their overall goals, methods of attack, and step-by-step actions
Quiz Question:
What term describes the methods, strategies, and actions used by cyber attackers?
TTP (Tactics, Techniques, and Procedures)
a formal document published by the Internet Engineering Task Force (IETF) that defines standards, protocols, or best practices for the Internet.
Quiz Question:
What type of document defines Internet standards, protocols, or best practices?
RFC (Request for Comments)
the process of translating a domain name (like example.com) into its corresponding IP address so that devices can locate and communicate with each other over the Internet.
Typing www.example.com in a browser triggers a ____, which returns the IP address 93.184.216.34 so your computer can connect to the website.
DNS lookup
malicious code that stays dormant until specific conditions are met (date, event, or action), then executes a harmful payload.
Example:
Insider threat plants code that deletes database files if their employee ID is removed from the HR system on a certain date.
Logic Bomb