|
3.6 Analyze and differentiate among types of mitigation and deterrent techniques
- Manual bypassing of electronic controls
- Failsafe/secure vs. failopen
- Monitoring system logs
- Event logs
- Audit logs
- Security logs
- Access logs
- Physical security
- Hardware locks
- Mantraps
- Video surveillance
- Fencing
- Proximity readers
- Access list
- Hardening
- Disabling unnecessary services
- Protecting management interfaces and applications
- Password protection
- Disabling unnecessary accounts
- Port security
- MAC limiting and filtering
- 802.1x
- Disabling unused ports
- Security posture
- Initial baseline configuration
- Continuous security monitoring
- Remediation
- Reporting
- Detection controls vs. prevention controls
- IDS vs. IPS
- Camera vs. guard
|
|
|