2 cissp ® Official Study Guide Eighth Edition


Grant or restrict access based on the subject’s identity. 4



Download 19,3 Mb.
Pdf ko'rish
bet541/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   537   538   539   540   541   542   543   544   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

3.
Grant or restrict access based on the subject’s identity.
4.
Monitor and record access attempts.
A broad range of controls is involved in these steps. The three primary control types 
are preventive, detective, and corrective. Whenever possible you want to prevent any type 
of security problem or incident. Of course, this isn’t always possible and unwanted events 
occur. When they do, you want to detect the event as soon as possible. If you detect an 
event, you want to correct it.
There are also four other access control types, commonly known as deterrent, recovery, 
directive, and compensating access controls.
As you read about the controls in the following list, you’ll notice that some examples 
are used in more than one access control type. For example, a fence (or perimeter-defining 
device) placed around a building can be a preventive control because it physically bars 
someone from gaining access to a building compound. However, it is also a deterrent con-
trol because it discourages someone from trying to gain access.
Preventive Access Control

preventive control
attempts to thwart or stop unwanted 
or unauthorized activity from occurring. Examples of preventive access controls include 
fences, locks, biometrics, mantraps, lighting, alarm systems, separation-of-duties poli-
cies, job rotation policies, data classification, penetration testing, access control methods, 
encryption, auditing, the presence of security cameras or closed-circuit television (CCTV), 
smartcards, callback procedures, security policies, security awareness training, antivirus 
software, firewalls, and intrusion prevention systems.
Detective Access Control

detective control
attempts to discover or detect unwanted or 
unauthorized activity. Detective controls operate after the fact and can discover the activity 
only after it has occurred. Examples of detective access controls include security guards, 
motion detectors, recording and reviewing of events captured by security cameras or 


Controlling Access to Assets 
583
CCTV, job rotation policies, mandatory vacation policies, audit trails, honeypots or hon-
eynets, intrusion detection systems, violation reports, supervision and reviews of users, and 
incident investigations. 

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   537   538   539   540   541   542   543   544   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish