Page 274 - CISSO_Prep_ Guide
P. 274

•  Authentication: proof of the assertion.
                          •  Authorization: what a user can do.
                          •  Accounting: logging.
                   •  Data remanence = data remains even if
                       deleted (i.e., what is left on the drive after
                       deleted).
                   •  Security domain = group of subjects that
                       share similar privileges or management
                       controls.
                   •  Capability tables = authorization table.

               Control Categories
               Tip: Identify which controls are done before the
               fact (e.g., deterrent) and which are done afterward
               (e.g., corrective).  When reading a question,
               determine if it is asking about a before or after the
               fact control and then choose the answer
               accordingly.
                   •  Deterrent: discourage incident
                          •  Administrative: policy.
                          •  Technical: warning banner.
                          •  Physical: beware of dog sign.
                   •  Preventative: avoid an incident
                          •  Administrative: user registration
                              procedure.
                          •  Technical: password-based login, IPS.
                          •  Physical: fence.
                   •  Detective: identify incident
                          •  Administrative: review violation
                              reports.
                          •  Technical: logs, ids.
   269   270   271   272   273   274   275   276   277   278   279