Slayer CPA
SectionsBlogLog In
Information Systems and Controls/Blueprint/2.C

Security controls and countermeasures

Area 2: Security, Confidentiality, and Privacy (35-45%)

Your Progress

0 of 93 questions attempted

Topics

  • Preventive, detective, and corrective controls
  • Encryption and authentication
  • Network security controls

Lessons

  • Security Controls and Monitoring

Study Frameworks

Access Control Models

Access Control Frameworks
DAC (Discretionary Access Control)
Owner of resource sets permissions
Flexible but less secure
Example: file system permissions set by file owner
MAC (Mandatory Access Control)
System-enforced based on classification labels
Users cannot change access rights
Example: military/government classified systems
RBAC (Role-Based Access Control)
Permissions assigned to roles, users assigned to roles
Supports least privilege and segregation of duties
Most common in enterprise environments
ABAC (Attribute-Based Access Control)
Decisions based on user, resource, and environment attributes
Highly granular and context-aware
Example: allow access only during business hours from corp network

Encryption Method Selection

Is the data at rest (stored)?
Yes
Do you need to query or search individual fields within the encrypted data?
Yes
Column-level / field-level encryption (AES-256) — encrypt sensitive columns individually; allows querying non-encrypted fields
No
Full-disk or volume encryption (AES-256, BitLocker, LUKS) — encrypts entire storage volume transparently; best for laptops, servers, cloud volumes
No
Is the communication between two parties who have not previously exchanged keys?
Yes
Asymmetric encryption (RSA/ECC) for key exchange, then symmetric (AES) for session — TLS/HTTPS
No
Symmetric encryption with pre-shared key — VPN tunnels, internal network communication

Biometric Accuracy — Crossover Error Rate

CER = point where FAR = FRR

False Acceptance Rate (FAR) = % of unauthorized users incorrectly accepted. False Rejection Rate (FRR) = % of authorized users incorrectly rejected. Lower CER indicates a more accurate biometric system.

Encryption Comparison

FeatureSymmetric (AES)Asymmetric (RSA/ECC)
KeysSingle shared keyPublic/private key pair
SpeedFast — suitable for bulk dataSlow — computationally intensive
Key distributionChallenge — must securely share keyEasier — public key can be freely distributed
Common algorithmsAES-128, AES-256, 3DESRSA-2048, RSA-4096, ECC
Primary useData at rest, session encryptionKey exchange, digital signatures, authentication
TLS/HTTPSSession data encryption (after handshake)Initial key exchange (handshake phase)

Control Types and Functions

TypeTimingPurposeExamples
PreventiveBefore the eventStop threats from occurringFirewalls, access controls, encryption, segregation of duties, input validation
DetectiveDuring/after the eventIdentify that a threat has occurredIDS/IPS, log monitoring, audit trails, reconciliations, SIEM alerts
CorrectiveAfter the eventRemediate the impact of a threatBackups/restore, patch deployment, incident response, antivirus quarantine
DeterrentBefore the eventDiscourage potential threatsWarning banners, security cameras, acceptable use policies, penalties
CompensatingVariesSubstitute when primary control is not feasibleManual review when automated control fails, additional monitoring
KHAKnowledge (something you know), Have (something you have), Are (something you are)

The three authentication factors. Knowledge = password/PIN. Have = token/smart card/phone. Are = biometrics (fingerprint, retina). MFA requires two or more different factors.

DRMMDAC, RBAC, MAC, (A)BAC

The four access control models from least to most restrictive: Discretionary (owner decides), Role-Based (role determines access), Mandatory (classification labels), Attribute-Based (policies evaluate multiple attributes).

Practice These Topics(93 questions)