1/10
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
technical controls
implemented in systems, OS controls, firewalls, anti-virus
managerial controls
admin controls with security design and implementation, policies and SOP
operational controls
implemented by people such as security guards and awareness programs
physical controls
limit physical access
types of controls
preventative, deterrent, detective, corrective, compensating, directive
preventative controls
blocks access to resource such as firewall rules
deterrent controls
discourage intrusion attempt such as application splash screen, threat of demotion, and posted warning signs
detective controls
ID and log intrusion attempts, may not prevent access, involves reviewing syslog and login reports as well as regular patrols and using motion detectors
corrective controls
apply control after even detected, linked with business continuity, involves restoring from backups, creating policy for reporting issues, and contacting LEO to manage criminal activity
compensating controls
temporary control via other means, prevents exploits such as firewall blocking specific app
directive controls
direct subject to security compliance, weak security control such as store sensitive info in protected folder