Term
What are controls that determine the way people act, including policies, procedures, and guidance? |
|
Definition
Administrative Security Control |
|
|
Term
What are controls implemented in operating systems, software, and security appliances? |
|
Definition
Technical Security Control |
|
|
Term
What are controls such as alarms, gateways, and locks that deter access to premises and hardware? |
|
Definition
Physical Security Control |
|
|
Term
What physically or logically restricts unauthorized access? |
|
Definition
Preventive Security Control |
|
|
Term
What may not physically or logically prevent access, but psychologically discourages an attacker from attempting an intrusion? |
|
Definition
Deterrent Security Control |
|
|
Term
What may not prevent or deter access, but it will identify and record any attempted or successful intrusion? |
|
Definition
Detective Security Control |
|
|
Term
What responds to and fixes an incident and may also prevent its reoccurrence? |
|
Definition
Corrective Security Control |
|
|
Term
What does not prevent the attack but restores the function of the system through some other means? |
|
Definition
Compensating Security Control |
|
|
Term
What forces an intruder to bypass more than one security control to achieve action on objectives? |
|
Definition
|
|
Term
What is the utilization of multiple different types of security controls? |
|
Definition
|
|
Term
What is the use of more than one supplier? |
|
Definition
|
|
Term
What is the transfer of responsibility to recover? |
|
Definition
Transfer Security Control |
|
|
Term
International Organization for Standardization |
|
Definition
|
|
Term
Control Objectives for Information and Related Technologies |
|
Definition
|
|
Term
Sherwood Applied Business Security Architecture ( |
|
Definition
|
|
Term
What are the following?:
oOpen Web Application Security Project (OWASP)
oSANS Institute (SysAdmin, Network, and Security)
oCenter for Internet Security (CIS) |
|
Definition
General Purpose Secure Configuration Guides |
|
|
Term
What is the requirement to do as much as you possibly can to protect information? |
|
Definition
|
|
Term
SysAdmin, Network, and Security |
|
Definition
|
|
Term
What is the in-depth analysis of security systems and policies? |
|
Definition
|
|
Term
What is a penetration test somewhere between white box and black box? |
|
Definition
|
|
Term
Common Vulnerabilities and Exposures |
|
Definition
|
|
Term
Security Content Automation Protocol |
|
Definition
|
|
Term
Open Vulnerability and Assessment Language |
|
Definition
|
|
Term
What is a letter that defines the scope of your penetration test of what is and is not allowed? |
|
Definition
|
|
Term
What is a software configured with a list of known exploits / vulnerabilities? |
|
Definition
|
|