Good evening class! Last week! That is another couple of classes down! Great job, everyone!
Good evening class!
Last week! That is another couple of classes down! Great job, everyone!
So depending on how you read the question, there are two ways to answer. One is by listing the control functions of preventative, detective, and corrective. The other is by listing the types of controls themselves which are physical, technical, and administrative. I will use the latter for this week’s discussion.
1) Physical controls would be the use of fences and gates. The use of these will prevent any would be attacker from gaining physical access to any facility they are thinking of trying to penetrate. This is also a preventative control.
2) Technical controls could be the quarantining of a virus or vulnerability patching. Using these would eliminate any vulnerability or malware that an attacker has already implemented to the device and thus thwarting the dastardly plans. This is also a corrective control.
3) Last would be administrative controls. This would be routinely going through audit logs and annotating any changes to the system which would allow the admin to see if there was anything awry. This is also a detective action.
Seems I went for both. Thanks for reading.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.