Types of Security Controls
CIA Triad
AAA
Zero Trust
Security Threats
100

Firewalls, encryption, or access control policies.

What is preventive control?

100

"C" in CIA Triad

What is Confidentiality?

100

AAA

What are Authentication, Authorization, and Accounting?

100

The basic principle of Zero Trust

What is "Never trust, always verify?"

100

An attack where an attacker tries all possible combinations of passwords or encryption keys until the correct one is found.

What is a brute force attack?

200

A control designed to discourage or prevent attackers, such as warning signs, security cameras, or legal penalties.

What is a deterrent control?

200

Ensuring that data has not been altered or tampered with and remains accurate and trustworthy.

What is "integrity"?

200

Verifies the identity of a user or system

What is Authentication?

200

The concept that users should be granted the minimum level of access necessary to perform their jobs.

What is "least privilege"?

200

An attack where the attacker intercepts and potentially alters communication between two parties without their knowledge.

What is a man-in-the-middle attack?

300

Intrusion detection systems (IDS), monitoring and logging systems, or audits.

What is detective control?

300

By using redundancy, backups, disaster recovery plans, and load balancing to ensure systems and data are accessible when needed.

What is availability?

300

Logging user activities, auditing access to systems, or tracking data transfers.

What is Acounting

300

The process divides the network into smaller, isolated segments, reducing the potential for lateral movement by attackers.

What is Micro-segmentation?

300

An attacker captures valid data (such as login credentials) during transmission and re-sends it to impersonate the original sender.

What is replay attack?

400

Alternative security measures are used when primary controls are not feasible, such as additional monitoring when encryption cannot be implemented.

What are compensating controls?

400

To support confidentiality this transforms data into an unreadable format that can only be accessed by authorized users with the correct key.

What is encryption?

400

A security measure that requires two or more verification methods to authenticate a user, such as a password and a fingerprint.

What is multi-factor authentication (MFA)?

400

Zero Trust continuously verifies the identity and trustworthiness of every entity attempting to access resources, reducing __________

What is the attack surface?

400

Social engineering attack where an attacker attempts to trick users into giving up sensitive information.

What is a Phishing attack?

500

Controls are designed to fix security issues after they have been detected, such as patching vulnerabilities or restoring from backups.

What are corrective controls?

500

This converts data into a fixed-size value. If any changes are made to the original data, the value will change, ensuring the integrity of the data.

What is hash (hashing)?

500

Verify the identity of users or systems by linking public keys to identities in a Public Key Infrastructure (PKI).

What is digital certificate?

500

By requiring continuous verification for all users and devices, even those inside the network perimeter, removing areas where entities are automatically trusted.

What are Implicit Trust Zones?

500

This attack overwhelms a system with traffic, making it unavailable to legitimate users.

What is a Denial of Service (DoS) attack?

M
e
n
u