There are seven access control methodologies categorized by their inherent characteristics.  List and briefly define them.

What will be an ideal response?

• Directive-Employs administrative controls, such as policy and training, designed to proscribe certain user behavior in the organization• Deterrent-Discourages or deters an incipient incident; an example would be signs that indicate video monitoring
• Preventative-Helps an organization avoid an incident; an example would be the requirement for strong authentication in access controls
• Detective-Detects or identifies an incident or threat when it occurs; for example, anti-malware software
• Corrective-Remedies a circumstance or mitigates damage done during an incident; for example, changes to a firewall to block the recurrence of a diagnosed attack
• Recovery-Restores operating conditions back to normal; for example, data backup and recovery software
• Compensating-Resolves shortcomings, such as requiring the use of encryption for transmission of classified data over unsecured networks?

Computer Science & Information Technology

You might also like to view...

A 16-bit address uniquely defines a connection to the Internet.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Most of the connections that make up the high-speed backbone of the Internet use technologies designed at least 20 years ago to support telephone calls.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology