O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security controls

Risk mitigation strategies involve the security controls that address one or more risk areas. For example, preventative controls are designed and implemented to prevent a security violation from happening. Similarly, detective controls are designed and rolled out to detect a security violation; reactive and recovery controls assist in business continuity in the event of a disaster or disruptions to business processes.

This security violation can stem from either an inadvertent or malicious breach of a security policy. For example, a security policy may state that Non-Public Information (NPI) such as internal communications between board members or internal project information should not be exposed to general public. If an employee ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required