Podcast
Questions and Answers
Which category of controls includes policies, procedures, and guidelines aligned with security goals?
Which category of controls includes policies, procedures, and guidelines aligned with security goals?
- Technical controls
- Logical controls
- Physical controls
- Administrative controls (correct)
Which type of control actively blocks unauthorized actions before they occur?
Which type of control actively blocks unauthorized actions before they occur?
- Recovery controls
- Detective controls
- Corrective controls
- Preventive controls (correct)
What type of control identifies and alerts on unauthorized activities as they happen?
What type of control identifies and alerts on unauthorized activities as they happen?
- Deterrent controls
- Recovering controls
- Preventive controls
- Detective controls (correct)
What does the term 'corrective controls' refer to in cybersecurity?
What does the term 'corrective controls' refer to in cybersecurity?
What type of asset is characterized as having a physical form that can be touched?
What type of asset is characterized as having a physical form that can be touched?
Which state of data occurs when it is actively being processed by a system?
Which state of data occurs when it is actively being processed by a system?
Which element does the countermeasure dimension in the cybersecurity cube include?
Which element does the countermeasure dimension in the cybersecurity cube include?
What describes an event that violates security unintentionally?
What describes an event that violates security unintentionally?
What method of access control is primarily based on job titles?
What method of access control is primarily based on job titles?
Which of the following is an example of Rule-Based Access Control (RAC)?
Which of the following is an example of Rule-Based Access Control (RAC)?
What is the equation used to calculate Annualized Loss Expectancy (ALE)?
What is the equation used to calculate Annualized Loss Expectancy (ALE)?
What does the Qualitative Method of Risk Assessment rely on?
What does the Qualitative Method of Risk Assessment rely on?
Which risk response strategy involves eliminating the risk altogether?
Which risk response strategy involves eliminating the risk altogether?
What is the primary goal of Risk Mitigation?
What is the primary goal of Risk Mitigation?
In Risk Management, what are the two key steps in Risk Assessment?
In Risk Management, what are the two key steps in Risk Assessment?
What does Risk Transfer aim to achieve?
What does Risk Transfer aim to achieve?
What principle does non-repudiation ensure in a security context?
What principle does non-repudiation ensure in a security context?
Which access control model is based solely on the owner of the data determining access rights?
Which access control model is based solely on the owner of the data determining access rights?
Which model evaluates user access based on the historical behavior of the user?
Which model evaluates user access based on the historical behavior of the user?
What does the availability aspect of the CIA Triangle refer to?
What does the availability aspect of the CIA Triangle refer to?
In access control, what is the primary function of authentication?
In access control, what is the primary function of authentication?
What does the principle of audit in access control allow organizations to do?
What does the principle of audit in access control allow organizations to do?
Which of the following access control models relies on attributes of users and environmental conditions?
Which of the following access control models relies on attributes of users and environmental conditions?
Security Enhanced Linux implements which type of access control model?
Security Enhanced Linux implements which type of access control model?
Flashcards
RBAC
RBAC
Role-Based Access Control; access is granted based on job title or role, not individual discretion.
RAC
RAC
Rule-Based Access Control; access is based on specific contextual rules, like when and where.
Risk Assessment
Risk Assessment
Process of determining potential risks, ranking them based on the probability and impact.
Risk Management
Risk Management
Signup and view all the flashcards
ALE
ALE
Signup and view all the flashcards
SLE
SLE
Signup and view all the flashcards
Risk Mitigation
Risk Mitigation
Signup and view all the flashcards
Qualitative Risk Assessment
Qualitative Risk Assessment
Signup and view all the flashcards
CIA Triangle
CIA Triangle
Signup and view all the flashcards
Non-Repudiation
Non-Repudiation
Signup and view all the flashcards
Authentication
Authentication
Signup and view all the flashcards
Authorization
Authorization
Signup and view all the flashcards
Attribute-Based Access Control (ABAC)
Attribute-Based Access Control (ABAC)
Signup and view all the flashcards
Discretionary Access Control (DAC)
Discretionary Access Control (DAC)
Signup and view all the flashcards
Mandatory Access Control (MAC)
Mandatory Access Control (MAC)
Signup and view all the flashcards
History-Based Access Control (HBAC)
History-Based Access Control (HBAC)
Signup and view all the flashcards
Control Categories in Cybersecurity
Control Categories in Cybersecurity
Signup and view all the flashcards
Control Types (Cybersecurity)
Control Types (Cybersecurity)
Signup and view all the flashcards
Security Governance Elements
Security Governance Elements
Signup and view all the flashcards
Cybersecurity Assets
Cybersecurity Assets
Signup and view all the flashcards
Intrusion Detection System (IDS)
Intrusion Detection System (IDS)
Signup and view all the flashcards
Intrusion Prevention System (IPS)
Intrusion Prevention System (IPS)
Signup and view all the flashcards
Cybersecurity incidents
Cybersecurity incidents
Signup and view all the flashcards
Cybersecurity Cube Dimensions
Cybersecurity Cube Dimensions
Signup and view all the flashcards
Study Notes
CIA Triangle
- Confidentiality: Ensures an individual or entity cannot deny performing an action.
- Integrity: Non-repudiation ensures an individual or entity cannot deny having performed a particular action.
- Availability: Ensures resources are accessible when needed.
Access Control Components
- Authentication: Verifying a user's identity.
- Authorization: Determining the extent of access to resources and type of services.
- Access: Successful authentication and authorization allows verified users to access resources.
- Audit: Organizations use audits to collect data on user activities and analyze potential access violations.
- Management: Organizations manage access control systems by adding and removing authentication/authorization for users and systems.
Access Control Models
- Attribute-Based Access Control (ABAC): Access is granted/denied by evaluating rules, policies, and relationships based on user, system, and environmental attributes.
Discretionary Access Control (DAC)
- Data owners determine access to resources based on user ID and ownership.
- Less secure than other models.
History-Based Access Control (HBAC)
- Access is granted/denied based on user history, activities, and request content.
- Examines patterns of behavior over time to mitigate risk.
Mandatory Access Control (MAC)
- Access rights are regulated by a central authority based on multiple security levels.
- Security Enhanced Linux (SELinux) is an example of MAC implementation.
Identity-Based Access Control (IBAC)
- Network administrators can manage activity and access based on individual requirements.
Organization-Based Access Control (OrBAC)
- Allows the policy designer to set security policies independently of the implementation.
- Manages permissions for organizational parts.
Role-Based Access Control (RBAC)
- Access is based on job title.
- Eliminates discretion in granting access.
Risk Management
- Risk = Event Probability of Occurrence x Event Impact
- Risk Assessment: Determine assets, perform risk analysis.
- Risk Control: Implement risk mitigation strategies, monitor risks.
- Qualitative Risk Assessment: Ranks risks subjectively (high, medium, low).
- Quantitative Risk Assessment: Uses numerical data to estimate risk probability and financial impact (ALE = SLE x ARO).
Risk Response Strategies
- Accept: Acknowledge and prepare for consequences.
- Mitigate: Reduce negative impact through safeguards and controls.
- Transfer: Shift risk to a third party.
- Avoid: Eliminate the risk by changing processes or behaviors.
Control Categories
- Administrative (Management): Policies, procedures, guidelines defining personnel and business practices.
- Physical (Operational): Measures to prevent unauthorized access to sensitive material (e.g., alarms, guards).
- Logical (Technical): Technology-based controls to reduce vulnerabilities in hardware and software (e.g., antivirus, firewalls).
Control Types
- Deterrent: Discourages malicious activities (e.g., security policies).
- Preventive: Stops security incidents before they occur (e.g., Intrusion Prevention Systems).
- Detective: Identifies security incidents after they occur (e.g., Intrusion Detection Systems).
- Recovery: Restores systems and data after an incident.
- Corrective: Fixes vulnerabilities.
Security Governance
- Policies, Procedures, Standards, Guidelines: Key elements of security governance.
- Assets: Tangible and intangible resources.
Security Quiz Questions
- Cybersecurity framework development, hacking process without permission, data states, cyber security cube, data storage, countermeasure dimension (involving network availability), and more are included among the questions.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.