cyber security controls india
Cyber Threat

Cyber Security Control

Project Name: Cyber Security Control
Description: Cyber Security Control India blog will help each IT employee to understand information environment in better way. The components of Cyber Security Controls

Author: Rohit D Sadgune

Summary of Content

  1. Components Of Cyber Security Controls
  2. Basic Requirement of Cyber Security Controls
  3. Types of Cyber Security Controls
  4. What are the different Information Security aspects to be considered for Cyber Security

What is a Cyber Security?

Cybersecurity is the division of information technology whose primary objective is to implement processes and practices configure to protect networks, computers, enterprise application and data from attack, damage or unauthorized.

Principle objective of cyber security is to maintain Confidentiality, Integrity, and Availability over the entire enterprise

Types of Cyber Security Controls

There are 6 main types of cyber security controls must implemented by enterprise Preventive, Detective, Corrective, Deterrent, Recovery, Recompense.

Preventive Controls

Preventive controls are the primary measures met by the adversary. The primary objective of preventive controls is to try to block security infection and enforce access control.

Detective Controls

Detective controls are implemented to intercept security breach and alert the defenders. The detective controls will play role when preventive controls have failed or have been bypassed by adversary. Detective measured include SIV( Signature integrity verifier), cryptographic checksums, audit trails and logs, and similar tools.

Corrective Controls

Corrective controls comes into the frame when adversary has already breached the enterprise environment .Although a infections spread, not all is lost, so security analyst and system admins try at most to recover. Corrective controls are highely depends on the area of the enterprise where advesavary has targeted most.

Deterrent Controls

Deterrent controls are implemented to tell adversaries or potential attackers that we have we have detected you and please stop doing same silly thing again and again.

Recovery Controls

Recovery controls are similar to corrective controls, Recovery Controls will get applied in higher level of incidents to recover from security infections and restore information. In most of scenarios recovery controls includes disaster recovery and business continuity tactics.

Recompense Controls

Recompense controls are deliberate to be alternative arrangements for other measures when the primary controls have failed or cannot be used. When any of the new control has addresses the same adversaries that are addressed by another set of primary controls, then newly implemented controls are Recompense controls.


Why Cyber Security Controls are important?

  • On daily basis new attack are getting invented, the volume of these attack are very high. These attack includes threats, targeted attacks, advance persistence threats, phishing scams, data leakages
  • On daily the average unprotected systems are increasing..
  • Millions of infected web pages are being discovered every day.
  • Hundreds of millions of events are involved in data breaches.
  • New attack methods are launched continuously.


cyber security controls india
cyber security control

Cyber Security Control

  1. Assets collections & management
  2. Logical asses collection & management (software / application inventory)
  3. Standard security configuration for all physical and logical assets
  4. Vulnerability management for respective assets of enterprise
  5. Malware Investigation
  6. Vulnerability assessment & Penetration testing for all application
  7. Continuous knowledge transfers & training sessions for employees
  8. Identity & access management
  9. Perimeter security
  10. Security information and event management
  11. Digital Forensics & Incident Response
  12. Monitoring threat intelligence.

1 Comment

Leave a Reply

Your email address will not be published. Required fields are marked *


Cyber Threat
Indicator of Attack vs Indicator of Compromises

Indicator of Attack vs Indicator of Compromises Project Name: Indicator of Attack vs Indicator of Compromises (IOA vs IOC) Description: –  Cyber Threats are nothing but system to system attack that creates adversary’s efforts on the confidentiality, integrity, or availability of a digital information resident on system. Cyber-attacks are increasing in …

How to keep your cell phones secure
Cyber Threat
How to keep your cell phones secure

How to keep your cell phones secure Project Name: How to keep your cell phones secure Description: Mobile malware is spreading exponentially today, stealing personal and professional information which may ruin one’s financial, professional and mental health. This blog shares all simple tips to understand how one’s cell phone can be …

Power of Security Operation Center
Cyber Threat
Power of Security Operation Center

Power of Security Operation Center Project Name: Power of Security Operation Center Description: – Power of Security Operation Center is a concept of a highly skilled expert team working towards continuously monitoring and improving organizations security in the process of prevention, careful planning, detection and responding with a well-defined process. In …

%d bloggers like this: