Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?

A.
Detective controls

B.
Safeguards

C.
Preventive controls

D.
Corrective controls

Explanation:

Corrective controls are used after a security breach. After security has been breached, corrective controls are intended to limit the extent of any damage caused by the incident, e.g. by recovering the organization to normal working status as efficiently as possible.
Answer option C is incorrect. Before the event, preventive controls are intended to prevent an incident from occurring, e.g. by locking out unauthorized intruders.
Answer option A is incorrect. During the event, detective controls are intended to identify and characterize an incident in progress, e.g. by sounding the intruder alarm and alerting the security guards or the police. Answer option B is incorrect. Safeguards are those controls that provide some amount of protection to an asset.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


networkmanagers

networkmanagers

D