Cuestionario sin título
20 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Pair

Confidentiality = Ensures information is accessible only to authorized personnel Integrity = Ensure data REmains acurrate and unaltered Availability = Ensures information and resources are accessible when needed non-repudation = Guarantees that an action or event cannot be denied by the involved parties

CIANA pentagon add to CIA:

non-repudation and authentication

Triple A of security

Authentication = Verifying the identity of a user or system Authorization = Determing actions or resourcer and authenticated user can access Accouting = TRacking user activies and resources usage for audit or billing puposes

Security control categories

<p>Technical, maagerial, operational, physical</p> Signup and view all the answers

Security control types

<p>Preventative, deterrent, detective, corrective, compensating , directive</p> Signup and view all the answers

Technical control

<p>Technologies, hardware and software that are imlemented to manage and reduce risk</p> Signup and view all the answers

Managerial controls

<p>Sometimes also referred to as administrative controls. Involve the strategic planning and governance side of security</p> Signup and view all the answers

Operational controls

<p>Procedures and measures that area designed to protect data on a day-to-day basis. Are mainly governed by internal processes and human actions.</p> Signup and view all the answers

Physical controls

<p>Tangible, real-world measures taken to protect assets</p> Signup and view all the answers

Preventive controls

<p>Proactive measures implemented to thwart potential security threats or breaches.</p> Signup and view all the answers

Deterrents controls

<p>Discourage potential attackers by making the effort seem less appealing or more challengin</p> Signup and view all the answers

Detective controls

<p>Monitor and alert organizations to malicius activities</p> Signup and view all the answers

Corrective control

<p>Mitigate any potential damage and restore our system to their normal state</p> Signup and view all the answers

Compensating controls

<p>Alternatives measures that are implemented when primary security controls are not feasible or effective</p> Signup and view all the answers

Directive controls

<p>Guide, inform, or mandate actions. Often rootef in policy od documentation.</p> Signup and view all the answers

¿Cuál de los siguientes principios de Zero Trust se centra en limitar el acceso de los usuarios solo a los recursos necesarios para sus tareas?

<p>Acceso de menor privilegio</p> Signup and view all the answers

¿Qué técnica en Zero Trust implica dividir la red en segmentos más pequeños para minimizar el movimiento lateral de las amenazas?

<p>Micro-segmentación</p> Signup and view all the answers

Cuál es el propósito principal de implementar monitoreo continuo en el contexto de Zero Trust?

<p>Identificar comportamientos sospechosos en tiempo real</p> Signup and view all the answers

¿Cuál de las siguientes afirmaciones sobre la autenticación de usuarios en un modelo Zero Trust es correcta?

<p>La autenticación debe ser fuerte y verificarse regularmente.</p> Signup and view all the answers

Qué enfoque Zero Trust promueve la idea de que la seguridad debe ser una tarea constante y adaptativa?

<p>Seguridad como un proceso continuo</p> Signup and view all the answers

Study Notes

Zero Trust Principle

  • Never Trust, Always Verify: This principle emphasizes the assumption that threats can originate both within and outside the network. It necessitates the verification of user identities, device integrity, and data authenticity.
  • Least Privilege Access: Limiting user access to only the resources required for their tasks is crucial. Regularly reviewing and adjusting permissions ensures that access is granted on a need-to-know basis.
  • Micro-Segmentation: Dividing the network into smaller, isolated segments prevents lateral movement of threats within the network. This granular access control helps minimize the impact of a security breach.
  • Continuous Monitoring: Implementing real-time monitoring of user activity and network traffic allows for the detection of suspicious behaviour. Analytics and threat detection tools play a vital role in identifying potential threats.
  • User Authentication: Strong authentication methods, such as multi-factor authentication, are essential. Regular verification of identities, even for users already on the network, ensures ongoing security.
  • Device Security: Maintaining secure and compliant devices accessing the network is crucial. Monitoring device health and enforcing security posture checks helps prevent unauthorized access.
  • Data Protection: Encrypting sensitive data, both during transmission and when stored, protects it from unauthorized access. Data loss prevention (DLP) measures further safeguard critical information.
  • Automate Security Responses: Automating incident response allows for swift mitigation of potential threats. Integrating security tools enhances visibility and allows for faster reactions.
  • Zero Trust Architecture: Security features should be embedded into the network from its inception. A combination of technologies, including identity management and firewalls, enforces the Zero Trust principles.
  • Security as a Continuous Process: Continuously updating and auditing security measures helps adapt to evolving threats. Fostering a culture of security awareness and training among all users is crucial.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Cuestionario sin título
34 questions
Cuestionario sin título
6 questions

Cuestionario sin título

RedeemingTortoise avatar
RedeemingTortoise
Cuestionario sin título
9 questions

Cuestionario sin título

SelfDeterminationJasper4609 avatar
SelfDeterminationJasper4609
Use Quizgecko on...
Browser
Browser