Save
lesson 2 ias ge move
lesson 2 ias
lesson 4 ias
Save
Share
Learn
Content
Leaderboard
Learn
Created by
IdealFish85880
Visit profile
Cards (12)
are measures implemented to discourage potential attackers or intruders from attempting unauthorized access or malicious activities.
Deterrent controls
Give examples of Deterrent Controls
Warning
signs
security
awareness
training,
security
policies
and
procedures
,
security
guards
,
and access control
mechanisms.
are measures implemented to rectify or mitigate the impact of security incidents, breaches, or deviations from security policies and standards.
Corrective controls
Give examples of Corrective controls
Incident
response
plans,
system
patches and updates,
access controls
adjustments
,
employee
training and retraining.
are measures implemented to restore systems, data, and operations to normalcy following a security incident or disaster.
Recovery controls
Give examples of Recovery controls
Data
backups and recovery
procedures
,
disaster
recovery plans,
redundant
systems and infrastructure.
are measures implemented to safeguard physical assets, facilities, and infrastructure from unauthorized access, damage, or theft.
Physical controls
Give examples of Physical controls
Perimeter
fences,
access
control systems,
surveillance
cameras,
biometric
authentication,
security
guards.
are measures implemented through technology to protect digital assets, networks, and systems from security threats.
Technical controls
Give examples of Technical controls
Firewalls
,
antivirus
software,
encryption
,
intrusion detection systems
(IDS),
multifactor authentication
(MFA)
are measures implemented through policies, procedures, and governance structures to manage and enforce security practices within an organization.
Administrative controls
Give examples of Administrative controls
Security policies and
standards
,
access
control
policies
,
employee
training and awareness programs,
and compliance
audits.