Security Controls Flashcards
CIA Triad
Cyber security offers three related principles to protect data from breaches; the principle is called the CIA triad.
C -> Confidentiality
I -> Integrity
A -> Availability
Technical Controls
Technical controls are also known as logical controls. That is used to reduce attacks on both hardware and software.
Management Controls
This control is used to focus on risk management and information security management.
Operational Control
The security controls that are primarily implemented, like technical and managerial controls executed by people, are saved by operational control.
Physical Controls
Physical security controls in cyber security are implemented based on cyber measures in a defined structure. That is used to detect or prevent unauthorized access to sensitive data.
Preventative controls
These controls are used to prevent loss or errors.
Detective controls
It is an accounting term, that uses internal control to find errors within the organization.
Corrective controls
After a system malfunction, corrective controls are used to make the system more effective to use.
Deterrent controls
Deterrent controls are used to reduce deliberate attacks, which are usually in the form of a tangible object or person.
Compensating controls
Compensating control is an alternative method that is used to satisfy the requirement for security.