Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
10 views5 pages

Chapter 1

The document outlines various types of security controls, categorized into technical, managerial, operational, and physical controls, each serving distinct purposes in mitigating risks and ensuring compliance. It details examples of each control type, such as firewalls and data encryption for technical controls, performance reviews and risk assessments for managerial controls, and incident response procedures for operational controls. Additionally, it describes control types like preventive, detective, and corrective controls, emphasizing their roles in managing security effectively.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views5 pages

Chapter 1

The document outlines various types of security controls, categorized into technical, managerial, operational, and physical controls, each serving distinct purposes in mitigating risks and ensuring compliance. It details examples of each control type, such as firewalls and data encryption for technical controls, performance reviews and risk assessments for managerial controls, and incident response procedures for operational controls. Additionally, it describes control types like preventive, detective, and corrective controls, emphasizing their roles in managing security effectively.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

1.

Compare and contrast various types of security controls


Security control
It offers a range of measures to mitigate risks, detect incidents, and ensure compliance with
current regulations.
Control Categories

The four main control categories are

1. Technical
2. Managerial
3. Operational
4. Physical

Technical Controls
➢ It minimizes vulnerabilities within an organization’s technical systems, including
computer networks, software, and data management.
➢ Their primary focus is on upholding system integrity, mitigating the risk of
unauthorized access, and protecting sensitive data from potential threats.
➢ Examples of technical controls are as follows:
Firewalls:
➢ These are a common technical control used to protect computer networks from
unauthorized access.
➢ They monitor incoming and outgoing network traffic, filter and block potential
threats, and reduce the risk of unauthorized intrusion.
Data encryption:
➢ It is a technical control that converts sensitive information into a coded form,
making it unreadable to unauthorized individuals.
➢ It reduces the risk of data breaches by ensuring that even if data is intercepted,
it remains secure and inaccessible without the decryption key.

Managerial Controls

➢ They encompass the implementation of policies, procedures, and practices by


management to guide and direct the activities of individuals and teams.
➢ By providing clear guidance and oversight, managerial controls contribute to a
proactive approach to risk reduction and help safeguard the organization’s success.
➢ Examples of managerial controls include the following:
Performance reviews:
➢ These are a managerial control that involves regular assessments of employee
performance.
➢ By providing feedback, setting goals, and identifying areas for improvement,
performance reviews help align employee activities with organizational
objectives and ensure that employees are performing effectively.
Risk assessments:

➢ These are a managerial control that involves the systematic identification,


evaluation, and mitigation of potential risks within an organization.
➢ By conducting regular risk assessments, management can proactively identify
and address potential threats, reducing the organization’s overall risk exposure.

Code of conduct:

➢ A code of conduct is a set of guidelines and ethical standards established by


management to govern employee behaviour.
➢ It serves as a managerial control by defining acceptable behaviour, promoting
ethical conduct, and reducing the risk of misconduct within the organization.

Operational Controls:

➢ These revolve around the execution of day-today activities and processes necessary for
delivering goods and services.
➢ They involve managing operational procedures, ensuring adherence to quality
standards, enhancing productivity, and optimizing efficiency.
➢ These can enhance their overall performance and achieve their objectives effectively.
➢ Examples of operational controls are as follows:
Incident response procedures:
➢ These are operational controls that outline the steps to be followed in the event
of a security incident or breach.
➢ These procedures provide a structured approach to detecting, responding to, and
recovering from security incidents.
➢ By having well-defined incident response procedures in place, organizations can
minimize the impact of security breaches, mitigate further risks, and restore
normal operations more effectively.
Security awareness training:

➢ It is an operational control that educates employees about security threats, best


practices, and organizational policies.
➢ By providing regular training sessions and updates, organizations reduce the
risk of security incidents caused by human error or negligence and create a
proactive defence against cyber threats.
User access management:

➢ It is an operational control that involves the management and control of user


access privileges to systems, applications, and data.
➢ It includes processes for user provisioning, access requests, access revocation,
and periodic access reviews.
➢ By implementing strong user access management controls, organizations can
reduce the risk of unauthorized access, protect sensitive information, and ensure
that users have appropriate access privileges aligned with their roles and
responsibilities.

Physical Controls

➢ These are a crucial aspect of overall security, focusing on the protection of an


organization’s tangible assets, facilities, and resources.
➢ These aim at preventing unauthorized access, ensuring safety, and mitigating physical
security risks.
➢ By controlling who has access to sensitive or restricted areas, organizations can
minimize the risk of unauthorized individuals compromising security or gaining access
to critical assets.
➢ The following are examples of physical controls:
Access control vestibule:
➢ It is a small, enclosed area with two doors that creates a buffer zone between
the outside environment and the secured area.
➢ It typically requires individuals to pass through multiple authentication steps
(such as presenting an access card or undergoing biometric verification) before
they can proceed into the secured area.

Biometric locks:

➢ These use unique physical or behavioural characteristics, such as fingerprints,


iris patterns, or facial recognition, to grant access.
➢ These locks scan and compare the biometric data with stored templates to verify
the identity of the person attempting to gain entry.

Guards/security personnel:

➢ Employing guards or security personnel is a common physical control measure.


They act as a visible deterrent and can provide physical intervention and
response in case of security breaches.
➢ Guards are typically stationed at entry points and their responsibilities include
monitoring surveillance systems, conducting patrols, and enforcing security
protocols.
Security fences:

➢ These are used to deter unauthorized access to premises or a restricted area.


➢ These fences are often made of sturdy materials such as metal or high-tensile
wire, and they can be equipped with additional features, such as barbed wire or
electric currents, to enhance security.

CCTV surveillance systems:

➢ Closed-circuit television (CCTV) surveillance systems use cameras to monitor


and record activities in specific areas.
➢ They are often strategically placed to provide coverage of entry points,
hallways, parking lots, and other critical areas. CCTV systems can help in
identifying security breaches, investigating incidents, and deterring potential
threats.
Mantraps:

➢ Mantraps are enclosed areas that allow only one person at a time to pass through.
➢ They typically consist of two interlocking doors or gates. The first door must
close and lock before the second door opens, ensuring that only authorized
individuals can proceed through the controlled area.

Vehicle barriers:

➢ These physical controls are used to prevent unauthorized vehicles from


accessing specific areas.
➢ Vehicle barriers can take the form of bollards, gates, tire spikes, or hydraulic
barriers that can be raised or lowered to control vehicle access to a facility.
Tamper-evident seals:

➢ These are used to secure containers, equipment, or sensitive areas.


➢ These seals are designed to show visible signs of tampering or unauthorized
access, such as a broken seal or a change in colour, indicating that someone has
attempted to gain access or tamper with the secured item.
Panic buttons/alarms:

➢ These provide a quick and visible means of alerting security personnel or


authorities in case of an emergency or security breach.
➢ These devices can be installed in various locations throughout a facility and are
typically easily accessible to employees or occupants.

Control Types
➢ Control types are essential components of an effective management system that help
organizations achieve their objectives and ensure the smooth operation of processes.
➢ The following list defines these control types, providing an example for each:
Preventive controls:
➢ These controls are designed to prevent problems or risks from occurring in the
first place.
➢ They focus on eliminating or minimizing potential threats before they can cause
harm.
➢ Examples of preventative controls include firewall, employee training
programs, and quality control checks.
Deterrent controls:

➢ These aim to discourage individuals from engaging in undesirable behaviours


or activities.
➢ They create a perception of risk or negative consequences to deter potential
offenders.
➢ Examples include surveillance cameras in public areas, warning signs, strong
passwords and multi-factor authentication.

Detective controls:

➢ These are implemented to identify and detect problems or risks that have already
occurred.
➢ They help uncover issues and anomalies promptly to initiate corrective actions.
➢ Examples include regular financial audits to identify accounting irregularities
or fraud and Security Information and Event Management (SIEM) systems etc.

Corrective controls:
➢ These are put in place to address problems or risks after they have been
identified.
➢ They aim to rectify the situation, mitigate the impact, and restore normalcy.
➢ Examples include backup and recovery system to restore data after a system
failure and implementing fixes or patches to address software vulnerabilities.

Compensating controls:

➢ Compensating controls are alternative measures implemented when primary


controls are not feasible or sufficient.
➢ They help offset the limitations or deficiencies of other controls.
➢ Examples include requiring additional layers of approval for financial
transactions in the absence of automated control systems, utilizing a secondary
authentication method when the primary method fails or is unavailable, and
increasing physical security measures when technical controls are
compromised.

Directive controls:

➢ These controls involve providing specific instructions or guidelines to ensure


compliance with policies, procedures, or regulations.
➢ They establish a clear framework for employees to follow.
➢ Examples of directive controls include a code of conduct or ethical guidelines,
standard operating procedures (SOPs) and regulatory requirements.

You might also like