1/9
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Technical Controls
Technology based safeguards
Example: Firewall blocking malicious IP addresses or a antivirus detecting malware.
It keeps attackers from breaching a network.
Managerial Control (Administrative)
Policies, procedures and governance set by a management,
Example, An Acceptable Use Policy, or a risk assessment procedure performed quarterly.
IT ensures consistent company wide security direction.
Operational Controls
Day to day procedures and practices carried out by people.
It reduces human error and prepares staff for threats
Example: Security awareness training for employees, or incident response drills.
System Backups, Patch management, Risk Assessment, Configuration Management.
Physical Controls
Definition: Use physical tools or barriers to protect property and people from threats.
Example: Security guards check IDs at entrances.
Real-life Use: Office buildings hire guards and use access-controlled doors.
Preventive
Definition: Stop problems before they happen.
Example: Strong password requirements prevent unauthorized access.
Real-life Use: Encryption, Firewalls, AV Software, all have technologies to prevent unauthorized access. Encryption, scrambles info, Firewalls block specific traffic, and AV software, detect and remove viruses.
Deterrent
Definition: Dissuade attackers with warnings or visible protections.
Example: "No Trespassing" signs or warning banners.
Real-life Use: Banks place warning signs and visible cameras to discourage theft.
Detective
Definition: Detect issues or breaches after they occur.
Example: Alarm systems or log reviews signal suspicious activity.
Real-life Use: Retail stores have surveillance that alerts managers to shoplifting.
Log Monitoring, Security Aduits, CCTV’s, IDS, Vulnerability Scanning
Corrective
Definition: Fix and recover after a security incident.
Example: Restoring data from backups after a cyberattack.
Real-life Use: Companies use backup data to recover after ransomware events.
Compensating
Definition: Use alternative controls to satisfy requirements when standard controls aren’t possible.
Example: Extra monitoring when technical encryption is not feasible.
Real-life Use: Legacy systems may restrict access if encryption can’t be added.
Backup Power, MFA Application Sandboxing, Network Segmentation.
Directive
Definition: Guide user behavior with policies and instructions.
Example: Security awareness training programs.
Real-life Use: Hospitals teach staff to recognize and report suspicious emails.
Security Training, Incident Response Plans, Acceptable Use Policies
Can be classified as Managerial(administrative) as they provide guidance on user behavior.