184k views
0 votes
List five items that might be considered logical controls.

A) Passwords, encryption, access control lists, firewalls, intrusion detection systems
B) Physical locks, security cameras, biometric scanners, guard dogs, alarm systems
C) Security policies, security awareness training, CCTV cameras, security audits, security badges
D) Fences, motion sensors, security guards, ID cards, metal detectors

User Metin
by
7.5k points

1 Answer

5 votes

Final answer:

Logical controls in cybersecurity include passwords, encryption, access control lists, firewalls, and intrusion detection systems. They ensure data protection, user authentication, and detection of potential security threats.

Step-by-step explanation:

The list of five items that might be considered logical controls in cybersecurity are: A) Passwords, encryption, access control lists, firewalls, intrusion detection systems. These logical controls are used to protect information, manage who has access to resources, and detect potential security breaches. Logical controls are essential in creating a layered defense strategy for cybersecurity.

  • Passwords are used to authenticate users and ensure that only authorized individuals can access certain information or systems.
  • Encryption is a way of protecting data by converting it into a coded form that is unreadable to unauthorized users.
  • Access control lists (ACLs) specify which users or system processes are granted access to objects, as well as what operations are allowed on given objects.
  • Firewalls are network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.
  • Intrusion detection systems (IDS) are designed to detect unauthorized access or misuse of a computer system or network.

User Daniel Apt
by
7.5k points