Firewalls, encryption, or access control policies.
What is preventive control?
"C" in CIA Triad
What is Confidentiality?
AAA
What are Authentication, Authorization, and Accounting?
The basic principle of Zero Trust
What is "Never trust, always verify?"
An attack where an attacker tries all possible combinations of passwords or encryption keys until the correct one is found.
What is a brute force attack?
A control designed to discourage or prevent attackers, such as warning signs, security cameras, or legal penalties.
What is a deterrent control?
Ensuring that data has not been altered or tampered with and remains accurate and trustworthy.
What is "integrity"?
Verifies the identity of a user or system
What is Authentication?
The concept that users should be granted the minimum level of access necessary to perform their jobs.
What is "least privilege"?
An attack where the attacker intercepts and potentially alters communication between two parties without their knowledge.
What is a man-in-the-middle attack?
Intrusion detection systems (IDS), monitoring and logging systems, or audits.
What is detective control?
By using redundancy, backups, disaster recovery plans, and load balancing to ensure systems and data are accessible when needed.
What is availability?
Logging user activities, auditing access to systems, or tracking data transfers.
What is Acounting
The process divides the network into smaller, isolated segments, reducing the potential for lateral movement by attackers.
What is Micro-segmentation?
An attacker captures valid data (such as login credentials) during transmission and re-sends it to impersonate the original sender.
What is replay attack?
Alternative security measures are used when primary controls are not feasible, such as additional monitoring when encryption cannot be implemented.
What are compensating controls?
To support confidentiality this transforms data into an unreadable format that can only be accessed by authorized users with the correct key.
What is encryption?
A security measure that requires two or more verification methods to authenticate a user, such as a password and a fingerprint.
What is multi-factor authentication (MFA)?
Zero Trust continuously verifies the identity and trustworthiness of every entity attempting to access resources, reducing __________
What is the attack surface?
Social engineering attack where an attacker attempts to trick users into giving up sensitive information.
What is a Phishing attack?
Controls are designed to fix security issues after they have been detected, such as patching vulnerabilities or restoring from backups.
What are corrective controls?
This converts data into a fixed-size value. If any changes are made to the original data, the value will change, ensuring the integrity of the data.
What is hash (hashing)?
Verify the identity of users or systems by linking public keys to identities in a Public Key Infrastructure (PKI).
What is digital certificate?
By requiring continuous verification for all users and devices, even those inside the network perimeter, removing areas where entities are automatically trusted.
What are Implicit Trust Zones?
This attack overwhelms a system with traffic, making it unavailable to legitimate users.
What is a Denial of Service (DoS) attack?