fbpx

Cybersecurity Awareness Month: What is Security Control?

Must Read

Destiny Young
Destiny Younghttp://linktr.ee/youngdestinya
Destiny Young is a highly credentialed information technology professional with over 15 years of industry experience. An HND, BSc (Hons) in Computer Science graduate. He holds a Master of Technology degree in Information Technology from the prestigious University of South Africa (UNISA). He is a distinction-grade MBA alumnus of Nexford University, Washington, DC, where he also obtained a first-class MSc degree in Digital Transformation and currently pursuing another MSc in Computer Science and Information Technology with a specialization in Cybersecurity at Paul University, Awka, Anambra State. His professional development centres around Cybersecurity and Digital Transformation. He is a Chartered IT Practitioner, Manager, and Administrator with professional membership of Computer Professional Registration Council of Nigeria (CPN), the Nigeria Computer Society, the Chartered Institute of Administration of Nigeria (CIA), the Nigerian Institute of Management (Chartered) and a host of others.

In cybersecurity, a control is a measure taken to reduce the risk of a security breach or data loss. Controls can be physical or virtual, policies, training, techniques, methodologies, action plan, devices, and customized solutions to avoid, detect, and prevent intruders and minimize the security risk befalling the individual or organizational proprietary information systems.

There are three types of security controls: preventive controls, detective controls, and corrective controls.

Preventive controls are designed to stop an attack before it occurs. Examples of preventive controls include firewalls, intrusion detection systems (IDS), antivirus software, access control lists (ACLs), and encryption measures. A typical usage scenario for a firewall is to block unauthorized access to a network by filtering incoming traffic based on predefined rules. IDS can be used to monitor network traffic for suspicious activity and alert administrators when an attack is detected. Antivirus software can be used to scan files for malware and prevent it from infecting a system. ACLs can be used to restrict access to sensitive data based on user roles and permissions. Encryption measures can be used to protect data in transit or at rest by converting it into an unreadable format.

Detective controls are designed to identify an attack after it has occurred. Examples of detective controls include security cameras, log analysis tools, and intrusion detection systems (IDS). A typical usage scenario for a security camera is to monitor physical access points to a building and record any suspicious activity. Log analysis tools can be used to analyze system logs for signs of an attack. IDS can be used to monitor network traffic for suspicious activity and alert administrators when an attack is detected.

Corrective controls are designed to mitigate the damage caused by an attack after it has occurred. Examples of corrective controls include backup systems, disaster recovery plans, and incident response teams. A typical usage scenario for a backup system is to create regular backups of critical data so that it can be restored in the event of a data loss incident. Disaster recovery plans can be used to restore critical systems and services in the event of a major outage or disaster. Incident response teams can be used to investigate security incidents and take appropriate action.

Effective implementation of security controls is essential for increasing organizational security posture. By implementing appropriate security controls, organizations can reduce the risk of security breaches and data loss incidents. This can help protect sensitive information from unauthorized access or disclosure and prevent financial losses due to cybercrime.

Destiny YoungMSc (Cand)Nexford University

Technology/IT Infrastructure Engineer

A future Business Leader

Destiny Young
Destiny Young is a highly credentialed information technology professional with over 15 years of industry experience. An HND, BSc (Hons) in Computer Science graduate. He holds a Master of Technology degree in Information Technology from the prestigious University of South Africa (UNISA). He is a distinction-grade MBA alumnus of Nexford University, Washington, DC, where he also obtained a first-class MSc degree in Digital Transformation and currently pursuing another MSc in Computer Science and Information Technology with a specialization in Cybersecurity at Paul University, Awka, Anambra State. His professional development centres around Cybersecurity and Digital Transformation. He is a Chartered IT Practitioner, Manager, and Administrator with professional membership of Computer Professional Registration Council of Nigeria (CPN), the Nigeria Computer Society, the Chartered Institute of Administration of Nigeria (CIA), the Nigerian Institute of Management (Chartered) and a host of others.
- Advertisement -spot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisement -

Latest News

Breaking: Find your lost Android Device when Disconnected from the Internet

...Introducing the New and Improved Find My Device Network for Android Users In a world where losing your devices and...
- Advertisement -

More Articles Like This

- Advertisement -