1 / 8

Functions of Security Controls

Security controls are essential components of an organization's cybersecurity strategy. They serve various functions to protect systems, data, and networks from various threats and vulnerabilities. Here are some common functions of security controls

Download Presentation

Functions of Security Controls

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CYBERSECURITY CAREER PATH CONTROLS Functions of SECURITY SWIPE LEFT www.infosectrain.com

  2. 01 Directive Controls Directive Controls are the mandatory controls that are implemented to monitor the regulations. It provides guidance primarily aligned with the organizations required to follow, like policies, regulations, etc. @infosectrain

  3. 02 Deterrent Controls Deterrent Controls are deployed to discourage the violation of a security function, and it helps to reduce the chances of a deliberate attack. Deterrent Controls help to make intelligent decisions and deter the way that is not secure to use. @infosectrain

  4. 03 Preventive Controls Preventive Controls are used to prevent or avoid security incidents in the organization. It helps to mitigate unauthorized activities by indulging preventive methods in the organization. @infosectrain

  5. 04 Compensating Controls Compensating Controls are the alternative methods that support the requirement of actual security control implemented. The role of the compensating Control is to provide a similar level of assurance even if the attacker has compromised the actual security control. @infosectrain

  6. 05 Detective Controls Detective controls are used to detect and alert unauthorized or unwanted activities within the organization. It helps to detect and react to security violations using tools, processes, and best practices. @infosectrain

  7. 06 Corrective Controls Corrective Controls are used to remediate or mitigate the effect of a security incident. It includes measures to mitigate and prevent the same security incident from recurrence. @infosectrain

  8. 07 Recovery Controls Recovery Controls are deployed to recover and restore the operating system to normal condition after the security incident. @infosectrain

More Related