Coconote
AI notes
AI voice & video notes
Export note
Try for free
Security Controls in IT Security
Jul 19, 2024
π
Review flashcards
Security Controls in IT Security
Introduction
IT security involves preparing for various security risks.
Attackers seek different ways to access systems.
We protect data and physical systems, buildings, people, and organizational assets.
Security controls can prevent events, minimize impact, or limit damage when breaches occur.
Categories of Security Controls
1. Technical Controls
Implemented using technical systems.
Example: Operating system policies and procedures, firewalls, antivirus software.
2. Managerial Controls
Policies and procedures created by management.
Example: Security policy documentation, standard operating procedures.
3. Operational Controls
Implemented by people to maintain security.
Example: Security guards, awareness programs, lunch and learns.
4. Physical Controls
Limit physical access to buildings, rooms, or devices.
Example: Guard shacks, fences, locks, badge readers.
Control Types and Categories
1. Preventive Controls
Limit access to resources.
Examples:
Firewall rules β Technical
Onboarding policies β Managerial
Guard shack ID checks β Operational
Door locks β Physical
2. Deterrent Controls
Discourage or deter attacks.
Examples:
Splash screens β Technical
Demotion threats β Managerial
Reception desk β Operational
Warning signs β Physical
3. Detective Controls
Identify and warn about breaches.
Examples:
System logs review β Technical
Reviewing login reports β Managerial
Property patrols β Operational
Motion detectors β Physical
4. Corrective Controls
Occur after an event; minimize impact or allow continued operation.
Examples:
Data recovery from backups β Technical
Policies for incident reporting β Managerial
Contacting authorities β Operational
Fire extinguishers β Physical
5. Compensating Controls
Temporary measures when full resolution isnβt possible.
Examples:
Firewall rules to block vulnerability exploits β Technical
Separation of duties β Managerial
Multiple security guards β Operational
Power generators β Physical
6. Directive Controls
Direct actions for security (weaker control).
Examples:
Storing sensitive info in encrypted folders β Technical
Compliance policy β Managerial
Security policy training β Operational
Authorized personnel only signs β Physical
Summary
Various security controls and categories.
Examples illustrate fitting controls into categories.
Different organizations may use different controls.
π
Full transcript