Categories of controls-risk management, Computer Network Security

Categories of Controls

Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the controls by category:

Control function: Controls (safeguards) designed to defend systems are preventive or detective.?

Architectural layer: Some of the controls apply to one or more layers of organization’s technical architecture

Strategy layer: Controls classified by risk control strategy (avoidance, transference, mitigation) in which they operate.

Information security principle: Controls can be classified according to characteristics of secure information they assure. These characteristics include: accountability integrity, availability, confidentiality, authorization, authentication, and privacy.

Posted Date: 10/8/2012 6:48:43 AM | Location : United States







Related Discussions:- Categories of controls-risk management, Assignment Help, Ask Question on Categories of controls-risk management, Get Answer, Expert's Help, Categories of controls-risk management Discussions

Write discussion on Categories of controls-risk management
Your posts are moderated
Related Questions
Cipher Methods There are 2 methods of encrypting plaintext: • Bit stream method – every bit in the plaintext bit is transformed into a cipher bit one bit at a time. • Block cip

QUESTION (a) Mention two attitudes of a carer towards an inspector that could lead to negative outcomes (b) Give two performance indicators of Early Childhood Education that

Evaluations, Assessment, and Maintenance of Risk Controls When the control strategy has been implemented, it should be monitored and measured on an ongoing basis to determine ef

ADDRESS RESOLUTION WITH MESSAGE EXCHANGE An alternative to local calculation is a distributed function. A computer that requires to find an address transmits a message across


I am ryan, i am looking for data security and network assignment help, Do you have experts in data security?

ACCESS CONTROL DEVICES Successful access control system includes number of components, which depends on system’s requirements for authentication and authorization. Powerful auth

Question 1 Explain the types of threats (Attacks) Question 2 What are the Characteristics of Good Encryption Technique? Question 3 Write a note on Digital Signatur


doing coursework in Network Security to present a possible solution to the problem at hand by creating a prototype of the new network security infrastructure. This new design shou