1. Preventative - Operates before an attack can take place to eliminate or reduce the likelihood an attack can succeed. Ex: Access Control List (ACL), SOPs, Anti-malware software.
2. Detective - Used during an attack to identify and record any attempted or successful intrusion. Ex: Logs.
3. Corrective - Used after an attack to eliminate or reduce the impact of an intrusion. Ex: backup system, patch management system.
4. Physical - Alarms, locks, cameras, guards, etc. that deter and detect access to premises and hardware
5. Deterrent - May not physically or logically prevent access, but psychologically discourages an attacker. Ex: signs and warnings of legal penalties.
6. Compensating - Serves as a substitute for a principal control. Same or better level of protection but uses a different methodology or technology.