The 3 types of security controls (experts explain) PurpleSec

The 3 types of security controls (experts explain) PurpleSec

HomePurpleSecThe 3 types of security controls (experts explain) PurpleSec
The 3 types of security controls (experts explain) PurpleSec
ChannelPublish DateThumbnail & View CountDownload Video
Channel AvatarPublish Date not found Thumbnail
0 Views
Security controls play a fundamental role in shaping the actions cybersecurity professionals take to protect an organization.

There are three main types of IT security controls: technical, administrative and physical. The primary objective of implementing a security control can be preventive, detective, corrective, compensatory or deterrent. Controls are also used to protect people, as is the case with training or social engineering policies.

What is a security check?

Security controls are countermeasures or protection mechanisms designed to reduce the likelihood that a threat will exploit a vulnerability.

For example, conduct company-wide security awareness training to minimize the risk of a social engineering attack on your network, employees and information systems.

Download the PDF here: https://purplesec.us/wp-content/uploads/2022/12/Types-Of-Security-Controls.pdf

Video chapter
—————-
00:00 – Introduction
00:40 – What is a security check?
01:38 – What are the goals of security checks?
04:10 – Understanding the basics of risks and threats
05:59 – Technical checks
07:20 – Administrative controls
09:29 – Physical checks
10:01 – Preventive controls
11:26 – Detective control
13:22 – Corrective checks
14:02 – Deterrent controls
15:00 – Compensation checks
16:08 – Conducting a Security Control Assessment

About the author
—————-
Michael Swanagan, CISSP, CISA, CISM
https://purplesec.us/cyber-security-experts/michael-swanagan/

Similar Videos
————————
What is vulnerability management?
https://youtu.be/RE6_Lo2wSIg
Common Types of Network Vulnerabilities in 2022 https://www.youtube.com/watch?v2VaPTIuRs4k
7 Best Practices to Prevent Data Loss
https://www.youtube.com/watch?v-Jpec7tOQqM
Red Team VS. Blue Team: What's the Difference?
https://www.youtube.com/watch?vjNY59pil8Tk
What is a Security Operations Center?
https://www.youtube.com/watch?vM24YUsv5xlg
What types of penetration tests are there?
https://www.youtube.com/watch?vca-6xCLmND8
Firewall Penetration Testing: Steps, Methods and Tools
https://www.youtube.com/watch?v0Izu0J6iSoM

Resources & Links
—————-
What is cybersecurity?
https://purplesec.us/cyber-security/

50 Free Information and Cybersecurity Policy Templates
https://purplesec.us/resources/cyber-…

————————————–

If you need help protecting your business from cyberattacks, please contact: https://purplesec.us/consultation/

Find us on Pinterest: https://www.pinterest.com/purple_sec/

#securitycontrols #cybersecurity #infosec

Please take the opportunity to connect with your friends and family and share this video with them if you find it useful.