preview

Unit 5-1 Security Controls

Satisfactory Essays

TABLE 5-1 Types of security controls.
CONTROL TYPE
Administrative
These are policies approved by management and passed down to staff in the form of rules. These are a first line of defense to inform users of their responsibilities. Examples include policies on password length.
Logical/technical
These are additional policies that are controlled and enforced automatically. This reduces human error. For example, a computer can check passwords to make sure they follow the rules.
Hardware
This includes equipment that checks and validates IDs, such as Media
Access Control (MAC) filtering on network devices, smart-card use for two-factor authentication, and security tokens such as RFID tags. In this instance, MAC is a hardware address that uniquely

Get Access