{"id":1191,"date":"2022-11-22T00:03:35","date_gmt":"2022-11-22T00:03:35","guid":{"rendered":"https:\/\/chin4teck.com\/?page_id=1191"},"modified":"2025-01-20T04:09:27","modified_gmt":"2025-01-20T04:09:27","slug":"new-page-trial","status":"publish","type":"page","link":"https:\/\/chin4teck.com\/index.php\/new-page-trial\/","title":{"rendered":"Cybersecurity is the new mindset!"},"content":{"rendered":"\n<p class=\"has-text-align-center\">Almost everything cyber And information security! Cybersecurity is the main line of defense for the next generations to come!<\/p>\n\n\n\n<p class=\"has-text-align-center\">Who would be better to define this for us, but the legendary CISA! Since the definitions are so universal, i&#8217;m just going to leave the link here.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/www.cisa.gov\/news-events\/news\/what-cybersecurity\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.cisa.gov\/news-events\/news\/what-cybersecurity<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\">According to CISA, Cybersecurity is the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information. It seems that everything relies on computers and the internet now\u2014communication (e.g., email, smartphones, tablets), entertainment (e.g., interactive video games, social media, apps ), transportation (e.g., navigation systems), shopping (e.g., online shopping, credit cards), medicine (e.g., medical equipment, medical records), and the list goes on. How much of your daily life relies on technology? How much of your personal information is stored either on your own computer, smartphone, tablet or on someone else&#8217;s system?<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-44k2BJ\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2023\/11\/Cybersecurity-1024x536.jpg\" alt=\"Cybersecurity\" class=\"wp-image-1379\" srcset=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2023\/11\/Cybersecurity-1024x536.jpg 1024w, https:\/\/chin4teck.com\/wp-content\/uploads\/2023\/11\/Cybersecurity-300x157.jpg 300w, https:\/\/chin4teck.com\/wp-content\/uploads\/2023\/11\/Cybersecurity-768x402.jpg 768w, https:\/\/chin4teck.com\/wp-content\/uploads\/2023\/11\/Cybersecurity.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-RglDxu\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\">There&#8217;s so much to learn, and so little time. Let&#8217;s start off with the foundations, like how do you protect data or information?<\/p>\n\n\n\n<p class=\"has-text-align-center\">Security within an organization is a combination of frameworks, security controls, policies, and procedures. All of these components are put together to form a strong security posture. Understanding each section adds a significant increase in ones capability to integrate the knowledge in both a enterprise and a personal environment. Every aspect of Information security, network security, or even cybersecurity&#8217;s fall under one of the three major security controls. <\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-wi55AZ\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center has-startupzy-primary-color has-text-color has-link-color wp-elements-1eecca624c8d3ba082e94516c8b9d359\"><strong>Security Control Categories<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">Irrespective of the IT infrastructure&#8217;s size, you would want to protect it from various types of security threats. To do that, you need to apply different security measures and ensure that the organization\u2019s assets are protected and safeguarded. These measures are known as security controls, which help you protect the infrastructure, be it physical or logical.<\/p>\n\n\n\n<p class=\"has-text-align-center\">The security controls are implemented to handle risks in different ways. They can be implemented to protect the infrastructure by reducing or eliminating the risks. There is no fixed method of applying security controls in the infrastructure. The number and types of security controls will depend on various factors, including the architecture of the infrastructure, the size of the infrastructure, and the nature of the business.<\/p>\n\n\n\n<p class=\"has-text-align-center\">It is important to note that no control works in isolation. Multiple control mechanisms need to be layered, which is known as defense-in-depth. Many security administrators make the mistake of adding too many security control mechanisms to protect the infrastructure. However, this adds to the complexity of the infrastructure. Therefore, an administrative policy should be implemented to prevent the over implementation of security measures. This policy needs to be measurable, effective, objective, and enforceable.<\/p>\n\n\n\n<p class=\"has-text-align-center\">A security control must involve four key entities &#8211; people, processes, operations, and technology. The security controls must also be designed to protect the assets and, more specifically, the information for confidentiality, integrity, authenticity, and availability.<\/p>\n\n\n\n<p class=\"has-text-align-center\">There are three different categories of security controls:<\/p>\n\n\n\n<p class=\"has-text-align-center\">1. Administrative<\/p>\n\n\n\n<p class=\"has-text-align-center\">2. Technical<\/p>\n\n\n\n<p class=\"has-text-align-center\">3. Physical<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-qbwaIE\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"guten-element guten-vtrWwm animated guten-element-hide desktop-rotateInDownRight guten-feature-list\"><div class=\"feature-list-wrapper\"><div class=\"icon-position-left feature-list-item\"><span class=\"connector icon-position-left\"><\/span><div class=\"icon-wrapper\"><div class=\"icon\"><i class=\"gtn gtn-manager-light\"><\/i><\/div><\/div><div class=\"feature-list-content\"><h2 class=\"feature-list-title\">Administrative<\/h2><p class=\"feature-list-desc\">Administrative controls are implemented and applied to the individuals within an organization. The idea of administrative controls is to lay down a set of rules that must be adhered to.\n\nSome of the key examples are:\n\u2022\tTraining\n\u2022\tPersonnel recruitment\n\u2022\tChange management\n\u2022\tAccess management\n\u2022\tEmployee screening\n\u2022\tCertification programs\n\u2022\tNon-disclosure agreements (NDA)\n\u2022\tDisaster preparedness and recovery plans\n<\/p><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-UDQvfG\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-image-marque guten-element guten-image-marque horizontal guten-a02wSH animated guten-element-hide slow desktop-rubberBand guten-data\"><div class=\"marque-wrapper marque-animate-guten-a02wSH\"><div class=\"marque-item marque-index-0\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/Employee-screening.jpg\"\/><\/div><div class=\"marque-item-description\">Employee Screening<\/div><\/div><div class=\"marque-item marque-index-1\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/Employee-Training.jpg\"\/><\/div><div class=\"marque-item-description\">Certification Programs<\/div><\/div><div class=\"marque-item marque-index-2\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/Access-Management.jpg\"\/><\/div><div class=\"marque-item-description\">Access Management<\/div><\/div><div class=\"marque-item marque-index-3\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/Change-Management.jpg\"\/><\/div><div class=\"marque-item-description\">Change Management<\/div><\/div><div class=\"marque-item marque-index-4\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/Job-Recruiting.jpg\"\/><\/div><div class=\"marque-item-description\">Personnel Recruitment<\/div><\/div><div class=\"marque-item marque-index-5\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/22a9a449-aa7c-4bb6-8923-01f9dc30a328.jpg\"\/><\/div><div class=\"marque-item-description\">Employee Training<\/div><\/div><\/div><div class=\"marque-wrapper marque-animate-guten-a02wSH\"><div class=\"marque-item marque-index-0\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/Employee-screening.jpg\"\/><\/div><div class=\"marque-item-description\">Employee Screening<\/div><\/div><div class=\"marque-item marque-index-1\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/Employee-Training.jpg\"\/><\/div><div class=\"marque-item-description\">Certification Programs<\/div><\/div><div class=\"marque-item marque-index-2\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/Access-Management.jpg\"\/><\/div><div class=\"marque-item-description\">Access Management<\/div><\/div><div class=\"marque-item marque-index-3\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/Change-Management.jpg\"\/><\/div><div class=\"marque-item-description\">Change Management<\/div><\/div><div class=\"marque-item marque-index-4\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/Job-Recruiting.jpg\"\/><\/div><div class=\"marque-item-description\">Personnel Recruitment<\/div><\/div><div class=\"marque-item marque-index-5\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/22a9a449-aa7c-4bb6-8923-01f9dc30a328.jpg\"\/><\/div><div class=\"marque-item-description\">Employee Training<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-bZwqK6\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"guten-element guten-hqljUd animated guten-element-hide slower desktop-rotateInDownLeft guten-feature-list\"><div class=\"feature-list-wrapper\"><div class=\"icon-position-right feature-list-item\"><span class=\"connector icon-position-right\"><\/span><div class=\"icon-wrapper\"><div class=\"icon\"><i class=\"gtn gtn-smart-light\"><\/i><\/div><\/div><div class=\"feature-list-content\"><h2 class=\"feature-list-title\">Technical<\/h2><p class=\"feature-list-desc\">Technical controls are also known as logical controls, which apply to the systems and devices. These controls can be in software or hardware forms that are used to protect the information assets.\nSome of the key examples are:\n\u2022\tEncryption\n\u2022\tSmart cards\n\u2022\tPasswords\n\u2022\tFirewalls\n\u2022\tRouters\n\u2022\tNetwork Authentication\n\u2022\tAccess Control Lists (ACLs)\n\u2022\tIntrusion detection systems\n<\/p><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-izBvGV\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-image-marque guten-element guten-image-marque horizontal guten-aHRiT3 animated guten-element-hide slow desktop-rubberBand reverse\"><div class=\"marque-wrapper marque-animate-guten-aHRiT3\"><div class=\"marque-item marque-index-0\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_representing_passwords_showi.jpg\"\/><\/div><div class=\"marque-item-description\">Passwords<\/div><\/div><div class=\"marque-item marque-index-1\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_encryption_in_action.jpg\"\/><\/div><div class=\"marque-item-description\">Encryption<\/div><\/div><div class=\"marque-item marque-index-2\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_the_concept_of_firewa.jpg\"\/><\/div><div class=\"marque-item-description\">Firewall<\/div><\/div><div class=\"marque-item marque-index-3\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_network_authenticatio.jpg\"\/><\/div><div class=\"marque-item-description\">Network Authentication<\/div><\/div><div class=\"marque-item marque-index-4\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_the_use_of_smart_card.jpg\"\/><\/div><div class=\"marque-item-description\">Smart Cards<\/div><\/div><div class=\"marque-item marque-index-5\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_a_sleek_modern_router.jpg\"\/><\/div><div class=\"marque-item-description\">Routers and Network Devices<\/div><\/div><div class=\"marque-item marque-index-6\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_illustrating_access_control_l.jpg\"\/><\/div><div class=\"marque-item-description\">Access Control List<\/div><\/div><\/div><div class=\"marque-wrapper marque-animate-guten-aHRiT3\"><div class=\"marque-item marque-index-0\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_representing_passwords_showi.jpg\"\/><\/div><div class=\"marque-item-description\">Passwords<\/div><\/div><div class=\"marque-item marque-index-1\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_encryption_in_action.jpg\"\/><\/div><div class=\"marque-item-description\">Encryption<\/div><\/div><div class=\"marque-item marque-index-2\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_the_concept_of_firewa.jpg\"\/><\/div><div class=\"marque-item-description\">Firewall<\/div><\/div><div class=\"marque-item marque-index-3\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_network_authenticatio.jpg\"\/><\/div><div class=\"marque-item-description\">Network Authentication<\/div><\/div><div class=\"marque-item marque-index-4\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_the_use_of_smart_card.jpg\"\/><\/div><div class=\"marque-item-description\">Smart Cards<\/div><\/div><div class=\"marque-item marque-index-5\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_a_sleek_modern_router.jpg\"\/><\/div><div class=\"marque-item-description\">Routers and Network Devices<\/div><\/div><div class=\"marque-item marque-index-6\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_illustrating_access_control_l.jpg\"\/><\/div><div class=\"marque-item-description\">Access Control List<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-lspm5X\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-tsEEzu\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"guten-element guten-ABROIy animated guten-element-hide slower desktop-rotateInDownRight guten-feature-list\"><div class=\"feature-list-wrapper\"><div class=\"icon-position-left feature-list-item\"><span class=\"connector icon-position-left\"><\/span><div class=\"icon-wrapper\"><div class=\"icon\"><i class=\"gtn gtn-camera-video-light\"><\/i><\/div><\/div><div class=\"feature-list-content\"><h2 class=\"feature-list-title\">Physical<\/h2><p class=\"feature-list-desc\">Physical controls are designed to prevent unauthorized access to the data center&#8217;s physical location and the entire infrastructure.\nSome of the key examples are:\n\u2022\tBarricades\n\u2022\tLocked doors\n\u2022\tAlarm systems\n\u2022\tSecurity guards\n\u2022\tSurveillance cameras\n\u2022\tDead-bolted steel doors\n<\/p><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-T3MTpr\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-image-marque guten-element guten-image-marque horizontal guten-pkc7fF animated guten-element-hide slow desktop-rubberBand\"><div class=\"marque-wrapper marque-animate-guten-pkc7fF\"><div class=\"marque-item marque-index-0\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_a_uniformed_security_.jpg\"\/><\/div><div class=\"marque-item-description\">Security Guards<\/div><\/div><div class=\"marque-item marque-index-1\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_an_alarm_system_insta.jpg\"\/><\/div><div class=\"marque-item-description\">Alarm Systems<\/div><\/div><div class=\"marque-item marque-index-2\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_a_locked_door_with_a_.jpg\"\/><\/div><div class=\"marque-item-description\">Locked Doors<\/div><\/div><div class=\"marque-item marque-index-3\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_the_concept_of_barric.jpg\"\/><\/div><div class=\"marque-item-description\">Barricades<\/div><\/div><div class=\"marque-item marque-index-4\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_a_heavy_dead-bolted_s.jpg\"\/><\/div><div class=\"marque-item-description\">Dead Bolted doors\/ Vault<\/div><\/div><div class=\"marque-item marque-index-5\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_modern_surveillance_c.jpg\"\/><\/div><div class=\"marque-item-description\">Surveillance Cameras<\/div><\/div><div class=\"marque-item marque-index-6\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_network_monitoring_in.jpg\"\/><\/div><div class=\"marque-item-description\">Surveillance and Network Monitoring<\/div><\/div><\/div><div class=\"marque-wrapper marque-animate-guten-pkc7fF\"><div class=\"marque-item marque-index-0\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_a_uniformed_security_.jpg\"\/><\/div><div class=\"marque-item-description\">Security Guards<\/div><\/div><div class=\"marque-item marque-index-1\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_an_alarm_system_insta.jpg\"\/><\/div><div class=\"marque-item-description\">Alarm Systems<\/div><\/div><div class=\"marque-item marque-index-2\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_a_locked_door_with_a_.jpg\"\/><\/div><div class=\"marque-item-description\">Locked Doors<\/div><\/div><div class=\"marque-item marque-index-3\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_the_concept_of_barric.jpg\"\/><\/div><div class=\"marque-item-description\">Barricades<\/div><\/div><div class=\"marque-item marque-index-4\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_a_heavy_dead-bolted_s.jpg\"\/><\/div><div class=\"marque-item-description\">Dead Bolted doors\/ Vault<\/div><\/div><div class=\"marque-item marque-index-5\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_modern_surveillance_c.jpg\"\/><\/div><div class=\"marque-item-description\">Surveillance Cameras<\/div><\/div><div class=\"marque-item marque-index-6\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/A_professional_image_showing_network_monitoring_in.jpg\"\/><\/div><div class=\"marque-item-description\">Surveillance and Network Monitoring<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-kC55WQ\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center has-startupzy-primary-color has-text-color has-link-color wp-elements-a6c8cb407242714a7f1649c9e526eb53\"><strong>Control Types<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">Each of the control categories can have various types of security controls, which are primarily:<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Directive<\/strong>: Directs the users to a specific positive and acceptable behavior.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Preventive<\/strong>: Prevents undesirable events, which can be a risk or a threat, to occur.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Detective<\/strong>: Identifies a security risk, which can be present in a policy, process, or procedure.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Deterrent<\/strong>: Poses a warning that displays the consequences of unacceptable behavior.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Corrective<\/strong>: Defines measures that are designed to react to an incident. These controls are used to either reduce or eliminate a threat.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Recovery<\/strong>: Used to restore a system after an incident.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Compensating<\/strong>: Alternative controls that can be used in place of security controls that were difficult to implement. The compensating control works similarly to the original security control.<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-pnAyLJ\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"guten-element guten-z9vAO1 animated guten-element-hide desktop-rotateInDownLeft guten-feature-list\"><div class=\"feature-list-wrapper\"><div class=\"icon-position-right feature-list-item\"><span class=\"connector icon-position-right\"><\/span><div class=\"icon-wrapper\"><div class=\"icon\"><i class=\"gtn gtn-manager-light\"><\/i><\/div><\/div><div class=\"feature-list-content\"><h2 class=\"feature-list-title\">Administrative<\/h2><p class=\"feature-list-desc\">\u2022\tDirective: Policies, guidelines\n\n\u2022\tPreventive: Non-Disclosure Agreement (NDA), separation of duties, warning banner\n\n\u2022\tDetective: Investigation, log reviews\n\n\u2022\tDeterrent: Demotion\n\n\u2022\tCorrective: Penalty, administrative leave, termination\n\n\u2022\tRecovery: Business Continuity Planning (BCP), Disaster Recovery Planning (DRP)\n\n\u2022\tCompensating: Supervision, job rotation\n<\/p><\/div><\/div><div class=\"icon-position-right feature-list-item\"><span class=\"connector icon-position-right\"><\/span><div class=\"icon-wrapper\"><div class=\"icon\"><i class=\"gtn gtn-smart-light\"><\/i><\/div><\/div><div class=\"feature-list-content\"><h2 class=\"feature-list-title\">Technical<\/h2><p class=\"feature-list-desc\">\u2022\tDirective: Standards\n\u2022\tPreventive: User authentication, multi-factor authentication, firewalls, Intrusion Prevention System (IPS), encryption\n\u2022\tDetective: Intrusion Detection System (IDS), SNMP\n\u2022\tDeterrent: Violation report\n\u2022\tCorrective: Update of access privileges, change in firewall policies\n\u2022\tRecovery: Backups, rebuilding the system\n\u2022\tCompensating: Keyboard logging\n<\/p><\/div><\/div><div class=\"icon-position-right feature-list-item\"><span class=\"connector icon-position-right\"><\/span><div class=\"icon-wrapper\"><div class=\"icon\"><i class=\"gtn gtn-camera-video-light\"><\/i><\/div><\/div><div class=\"feature-list-content\"><h2 class=\"feature-list-title\">Physical<\/h2><p class=\"feature-list-desc\">\u2022\tDirective: Security guard\n\u2022\tPreventive: Fences, bollards\n\u2022\tDetective: CCTV, sensors\n\u2022\tDeterrent: A warning sign\n\u2022\tCorrective: Fire extinguishers\n\u2022\tRecovery: Reconstruct, rebuild\n\u2022\tCompensating: Layered defenses\n<\/p><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-xALH9Y\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-3N4waT\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"guten-element guten-advance-button-wrapper guten-LC6qsu\"><a class=\"guten-advance-button guten-advance-button-sm guten-advance-button-wrap\" href=\"https:\/\/chin4teck.com\/index.php\/2025\/01\/20\/compliance-unlocking-its-amazing-secrets\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-particle-count=\"20\" data-particle-distance=\"250\" data-particle-fade-duration=\"0.5\" data-particle-duration=\"4\" data-element-id=\"guten-LC6qsu\"><span class=\"advance-button-icon-wrapper \"><i class=\"fa-lg fas fa-database\"><\/i><\/span><span class=\"advance-button-text \">Regulations, Standards and legislation<\/span><\/a><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-QrzB5p\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"guten-element guten-advance-button-wrapper guten-cWwB1e\"><a class=\"guten-advance-button guten-advance-button-sm guten-advance-button-wrap\" href=\"https:\/\/chin4teck.com\/index.php\/2023\/11\/07\/theres-never-a-time-to-operate-without-security\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-particle-count=\"20\" data-particle-distance=\"250\" data-particle-fade-duration=\"0.5\" data-particle-duration=\"4\" data-element-id=\"guten-cWwB1e\"><span class=\"advance-button-icon-wrapper \"><i class=\"fa-lg fas fa-chart-area\"><\/i><\/span><span class=\"advance-button-text \">Security Operations Center<\/span><\/a><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-dVCcJp\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized is-style-rounded\"><a href=\"https:\/\/chin4teck.com\/index.php\/2023\/11\/07\/theres-never-a-time-to-operate-without-security\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"360\" height=\"240\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2023\/09\/240_F_611328691_BKtrR78LfXEyo4x08i0or8qhkGgn1ywl.jpg\" alt=\"SOC\" class=\"wp-image-1356\" style=\"aspect-ratio:1.5;width:706px;height:auto\" srcset=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2023\/09\/240_F_611328691_BKtrR78LfXEyo4x08i0or8qhkGgn1ywl.jpg 360w, https:\/\/chin4teck.com\/wp-content\/uploads\/2023\/09\/240_F_611328691_BKtrR78LfXEyo4x08i0or8qhkGgn1ywl-300x200.jpg 300w\" sizes=\"auto, (max-width: 360px) 100vw, 360px\" \/><\/a><\/figure>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-pntlss\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Almost everything cyber And information security! Cybersecurity is the main line of defense for the next generations to come! Who would be better to define this for us, but the legendary CISA! Since the definitions are so universal, i&#8217;m just going to leave the link here. https:\/\/www.cisa.gov\/news-events\/news\/what-cybersecurity According to CISA, Cybersecurity is the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information. It seems that everything relies on computers and the internet now\u2014communication (e.g., email, smartphones, tablets), entertainment (e.g., interactive video games, social media, apps<\/p>\n","protected":false},"author":1,"featured_media":1259,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-1191","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/pages\/1191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/comments?post=1191"}],"version-history":[{"count":18,"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/pages\/1191\/revisions"}],"predecessor-version":[{"id":1756,"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/pages\/1191\/revisions\/1756"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/media\/1259"}],"wp:attachment":[{"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/media?parent=1191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}