3.0 Threats and Vulnerabilities


3.6 Analyze and differentiate among types of mitigation and deterrent techniques

  • Manual bypassing of electronic controls
    • Failsafe/secure vs. failopen
  • Monitoring system logs
    • Event logs
    • Audit logs
    • Security logs
    • Access logs
  • Physical security
    • Hardware locks
    • Mantraps
    • Video surveillance
    • Fencing
    • Proximity readers
    • Access list
  • Hardening
    • Disabling unnecessary services
    • Protecting management interfaces and applications
    • Password protection
    • Disabling unnecessary accounts
  • Port security
    • MAC limiting and filtering
    • 802.1x
    • Disabling unused ports
  • Security posture
    • Initial baseline configuration
    • Continuous security monitoring
    • Remediation
  • Reporting
    • Alarms
    • Alerts
    • Trends
  • Detection controls vs. prevention controls
    • IDS vs. IPS
    • Camera vs. guard

Recommended

 





Associates