Computer security is often divided into three distinct master
categories, commonly referred to as controls:
-
Physical
-
Technical
-
Administrative
These three broad categories define the main objectives of
proper security implementation. Within these controls are
sub-categories that further detail the controls and how to
implement them.
Physical control is the implementation of security measures in a
defined structure used to deter or prevent unauthorized access to
sensitive material. Examples of physical controls are:
-
Closed-circuit surveillance cameras
-
Motion or thermal alarm systems
-
Security guards
-
Picture IDs
-
Locked and dead-bolted steel doors
-
Biometrics (includes fingerprint, voice, face, iris,
handwriting, and other automated methods used to recognize
individuals)
Technical controls use technology as a basis for controlling the
access and usage of sensitive data throughout a physical structure
and over a network. Technical controls are far-reaching in scope
and encompass such technologies as:
Administrative controls define the human factors of security. It
involves all levels of personnel within an organization and
determines which users have access to what resources and
information by such means as:
-
Training and awareness
-
Disaster preparedness and recovery plans
-
Personnel recruitment and separation strategies
-
Personnel registration and accounting