Podcast
Questions and Answers
What are the three primary security control types?
What are the three primary security control types?
What is a technical control?
What is a technical control?
A control that uses technology to reduce vulnerabilities.
What are management controls?
What are management controls?
Administrative controls that include risk and vulnerability assessments.
What do operational controls ensure?
What do operational controls ensure?
Signup and view all the answers
What is the purpose of preventive controls?
What is the purpose of preventive controls?
Signup and view all the answers
What are detective controls designed to do?
What are detective controls designed to do?
Signup and view all the answers
What do corrective controls try to achieve?
What do corrective controls try to achieve?
Signup and view all the answers
What are deterrent controls?
What are deterrent controls?
Signup and view all the answers
What are compensating controls?
What are compensating controls?
Signup and view all the answers
What are door access control systems supposed to allow?
What are door access control systems supposed to allow?
Signup and view all the answers
What is the function of cipher locks?
What is the function of cipher locks?
Signup and view all the answers
What does a proximity card do?
What does a proximity card do?
Signup and view all the answers
What is tailgating?
What is tailgating?
Signup and view all the answers
What role do security guards play?
What role do security guards play?
Signup and view all the answers
What do closed-circuit television (CCTV) systems provide?
What do closed-circuit television (CCTV) systems provide?
Signup and view all the answers
What is the purpose of barricades?
What is the purpose of barricades?
Signup and view all the answers
What does physical security include?
What does physical security include?
Signup and view all the answers
What is the principle of least privilege?
What is the principle of least privilege?
Signup and view all the answers
What does Group Policy manage?
What does Group Policy manage?
Signup and view all the answers
Study Notes
Security Control Types
- Three primary security control types: technical, management, and operational.
- Technical controls utilize technology to mitigate vulnerabilities (e.g., encryption, firewalls).
- Management controls emphasize administrative practices, including risk assessments.
- Operational controls ensure daily operations align with security plans, including security training.
Types of Controls
- Preventive controls aim to avert security incidents through methods like user training and system hardening.
- Detective controls identify when vulnerabilities have been exploited, using measures like log monitoring and security audits.
- Corrective controls focus on remedying incidents post-occurrence, utilizing systems like backups.
- Deterrent controls seek to discourage threats from occurring in the first place.
- Compensating controls serve as alternatives when primary controls cannot be executed.
Access Control Systems
- Door access control systems should allow easy exit without authentication during power loss for safety reasons.
- Cipher locks require a code for entry but can be vulnerable to shoulder surfers; training can mitigate this risk.
- Proximity cards enable electronic door unlocking but require additional measures (like PINs) for user authentication.
Security Challenges
- Tailgating occurs when unauthorized users follow legitimate users into secure areas, which can be prevented with mantraps.
- Security guards act as a physical preventive measure, identifying unauthorized individuals through ID checks.
Surveillance and Physical Security
- Closed-circuit television (CCTV) provides reliable video proof of identity and activity in secure areas.
- Barricades offer stronger security than fences and can effectively block vehicles while allowing pedestrian access.
- Physical security includes basic locks, cable locks for mobile devices, and secured cabinets for sensitive items.
Principles of Security
- The principle of least privilege mandates granting users only the permissions necessary for their tasks, minimizing potential security risks.
- Group Policy is utilized for the management of user and computer settings within an organization's network.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on the control types and methods discussed in CompTIA Security+ Chapter 2. This quiz covers the distinctions between technical, management, and operational controls, along with specific examples of each type. Perfect for reinforcement and review of key concepts in cybersecurity.