lesson 4 ias

Cards (12)

  • are measures implemented to discourage potential attackers or intruders from attempting unauthorized access or malicious activities.
    Deterrent controls
  • Give examples of Deterrent Controls
    Warning signs
    security awareness training,
    security policies and procedures,
    security guards,
    and access control mechanisms.
  • are measures implemented to rectify or mitigate the impact of security incidents, breaches, or deviations from security policies and standards.
    Corrective controls
  • Give examples of Corrective controls
    Incident response plans,
    system patches and updates,
    access controls adjustments,
    employee training and retraining.
  • are measures implemented to restore systems, data, and operations to normalcy following a security incident or disaster.
    Recovery controls
  • Give examples of Recovery controls
    Data backups and recovery procedures,
    disaster recovery plans,
    redundant systems and infrastructure.
  • are measures implemented to safeguard physical assets, facilities, and infrastructure from unauthorized access, damage, or theft.
    Physical controls
  • Give examples of Physical controls
    Perimeter fences,
    access control systems,
    surveillance cameras,
    biometric authentication,
    security guards.
  • are measures implemented through technology to protect digital assets, networks, and systems from security threats.
    Technical controls
  • Give examples of Technical controls
    Firewalls,
    antivirus software,
    encryption,
    intrusion detection systems (IDS),
    multifactor authentication (MFA)
  • are measures implemented through policies, procedures, and governance structures to manage and enforce security practices within an organization.
    Administrative controls
  • Give examples of Administrative controls
    Security policies and standards,
    access control policies,
    employee training and awareness programs,
    and compliance audits.