University of Phoenix
CYB/120
06:49:40 GMT -05:00
Wk 4 “ Apply: Controls, Protocols, and ThreatsUniversity of Phoenix CYB/120 06:49:40 GMT -05:00Security controls are implemented by organizations to safeguard various forms of data and infrastructure deemed important and/or critical to operations. Any type of countermeasure or deterrent used to detect, avoid, minimize, or counteract security risks to physical property, computer systems, information or other assets is a type of security control.Controls and protocols are a set of rules or a policy to follow to safeguard assets of the organization. Physical controls include fencing, locks, guards, access control cards, biometric access control, surveillance cameras, and intrusion detection systems. Physical controls provide barriers to access to the physical components of an organizations network or data storage. Digital security controls are comprised of username and password combinations
Truly helpful study guides
Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.
No worries! You can instantly pick a different document that better fits what you're looking for.
No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.
“Bought, downloaded, and aced it. It really can be that simple.”