Module 04: Network Security Controls -Administrative Controls Flashcards
Necessitates the shutdown of all outdoor activities. Leads to power and voltage fluctuations that in turn affect the working of the system.
Lightning and Thunder
Leads to issues such as corrosion and short-circuits, and damages magnetic tapes and optical storage units.
Temperature and humidity
Transfer of data between end users
Transport Layer
Transfer data packets
Network Layer
Transfer data between nodes on a network segment across the physical layer.
Data link Layer
These controls prevent security violations and enforce various access control mechanisms. Controls may be physical, administrative, or technical. Examples include door lock, security guard, etc.
Preventative Controls
These Controls may not prevent access directly. They are used to discourage attackers and send warning messages to the attackers to discourage an intrusion attempt. Examples include various types of warning signs.
Deterrent Controls
These Controls are used as an alternative control when the indexed controls fail or cannot be used. They do not prevent any attack attempt but try to restore using other means like restoring from backup.
Compensating Controls
These controls are used in a more serious condition to recover from security violation and restore information and systems to a persistent state. Examples include disaster recovery, business continuity plans, backup systems, etc.
Recovery Controls
Most commonly used for personal computers. An offline battery backup facilitating the maintenance of the primary device from a power fluctuation.
Standby
Most commonly used for server rooms. These are mainly used to supply power below 10k VA. It is connected to the battery during a power failure.
Stand by On-line hybrid
Most commonly used for small business, web, and departmental servers. Mainly deals with maintaining continuous power fluctuations.
Line Interactive
Transformer that is used for filtering the output. It is no longer commonly used because it becomes unstable when operating a modern computer power supply load.
Standby-Ferro
It is made up of glass or plastic and is least susceptible to wiretapping threats
Fiber Optic
Made up of a single copper conductor at its center. A plastic layer provides an insulated center conductor and a braided metal shield. The metal shield prevents interference from fluorescent lights, motors, etc.
Coaxial Cable