Type of Control
Examples
Preventive
Authentication controls password, token, biometres. MAC
Preventive addresses
Authorization controls (access control matrices and compatibility tests
Training Physical access controls (locks, guards, bi ometric devices
Remote access controls P packet ering by border routers and firewalls using access control lists; intrusion prevention systems; authentication of dial-in users; wireless access controls
Host and application hardening procedures-firewalls, antivirus sohware, disabling of unnecessary features, user account management, software design (e.g., to prevent b overAows)
Encryption
Detective
Log analysis
Intrusion detection systems
Managerial reports
Security testing (vulnera bility scanners, penetration tests and war dialing)
Corrective
Computer emergency response teams
Chief Security Officer (CSO)
Patch management