Cyberspace Notes

What is corrective security controls?

Intro Corrective security controls are essential for an organization’s IT security strategy. These controls directly address and resolve security incidents or vulnerabilities that have already occurred. Unlike preventative controls, which…

What is detective security controls?

Intro Detective security controls in IT are critical components of an organization’s security framework. These controls are designed to identify and detect security incidents, vulnerabilities, and policy violations after they…

What is deterrent security controls?

Intro Deterrent security controls play a crucial role in an organization’s IT security framework. While other controls, such as preventative or detective measures, focus on stopping or identifying attacks, deterrent…

What is preventative security controls?

Intro Preventative security controls are an essential component of IT security, designed to stop potential security incidents before they occur. These controls are implemented to reduce vulnerabilities and minimize the…

What is physical security controls?

Intro Physical security controls are an essential component of an organization’s overall security strategy. While much attention is given to technical and operational measures, physical security is just as crucial…

What is operational security controls?

Intro Operational security controls are a critical aspect of an organization’s overall security strategy. While technical and managerial controls focus on hardware, software, and policy development, operational controls deal with…

What is managerial security controls?

Intro Managerial security controls play a crucial role in protecting an organization’s IT infrastructure. These controls involve policies, procedures, and oversight mechanisms that guide the behavior of employees and ensure…

What is a technical security control?

TLDR Technical security controls refer to the security measures that organizations implement using technology to protect their systems, networks, and data. These controls aim to safeguard critical infrastructure from cyberattacks,…

What is Whaling?

TLDR Whaling is a type of phishing attack that targets high-ranking individuals within an organization, such as executives, CEOs, CFOs, or senior managers. These attacks are more sophisticated than regular…

What is Eliciting Information?

TLDR Eliciting information is a technique used to subtly extract sensitive or valuable details from individuals without directly asking for them. It often involves casual conversations where the subject is…