Section 3: Security Control Categories and Types

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/15

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:25 PM on 5/1/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

16 Terms

1
New cards

Technical Controls

aka logical security controls, are mechanisms in hardware, software, and firmware that automate the process of preventing, detecting, and responding to security threats.

2
New cards

Technical Controls includes

Access Control Mechanisms, Firewalls, IDS & IPS, Encryption, VPN, Anti-virus & Anti-malware

3
New cards

Managerial Controls

aka admin controls, are the policies, procedures, and guidelines that govern the behavior of people within an org and operation of IT systems

4
New cards

Managerial Controls include

risk management, security policies & procedures, Incident Response and Recovery plans, BCP and DR

5
New cards

Operational Controls

are the day to day methods and procedures that are implemented by an organization to ensure and maintain the security of its info and assets.

6
New cards

Operational Controls include

Security Awareness training, Physical media protection

7
New cards

Physical Controls

Measures taken to protect actual hardware and facilities that house the systems, networks, and data.

8
New cards

Physical Controls include

lighting, signs, fences, cameras, security guards

9
New cards

Security Control Types

  • Preventative

  • Detective

  • Deterrent

  • Directive

10
New cards

Preventative

attempts to stop a security incident from occurring (firewalls, encryption, access control, IPS)

11
New cards

Detective controls

attempts to detect events that resulted in a security incident (IDS, SIEM, video surveillance, motion detection)

12
New cards

Corrective controls

attempts to remediate an incident that has occurred (UPS, restoring backups, incident response procedures)

13
New cards

Deterrent controls

attempts to discourage a threat (guard dog, cameras, barbed wire)

14
New cards

Directive controls

provides directions on how to systems (procedures, policies)

15
New cards

Compensating controls

provides alternate controls when the primary control is not sufficient (segregation of duties)

16
New cards

Layered Security

aka defense in depth; is an information assurance concept where multiple layers of security controls (defensive mechanisms) are placed throughout an IT system.