As a security administrator, you have been asked to implement a mechanism that can discover unauthorized access to company resources and alert the security team when such events occur. Which type of security control should you primarily focus on deploying?
Detective controls are designed to identify and record unauthorized activities or intrusions, including any incident that has an impact on the security of information assets. These controls do not prevent or deter the action but instead, detect and report them. For this scenario, implementing a detective control such as an intrusion detection system (IDS) would be the appropriate choice to discover unauthorized access and alert the security team.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of detective controls?
Open an interactive chat with Bash
How do intrusion detection systems (IDS) work?
Open an interactive chat with Bash
What is the difference between detective controls and preventive controls?