150k views
0 votes
A major financial institution hired a renowned security firm to attempt to compromise its computer network. A few days later, the security firm reported that it had successfully entered the financial institution's computer system without being detected. The security firm presented an analysis of the vulnerabilities that had been found to the financial institution. This is an example of a

User Ritzk
by
5.8k points

1 Answer

6 votes

Answer:

detective control.

Step-by-step explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

IDS is an acronym for intrusion detection system and it can be defined as a security system which is typically used to monitor network traffic and it notifies the engineer when there's a malicious activity.

Generally, the detection methods used by the Intrusion Detection Systems (IDS) are;

1. Statistical anomaly-based detection.

2. Stateful protocol analysis detection.

3. Signature-based detection.

Hence, the operations in this scenario is an example of a detective control which avails a business firm information about vulnerabilities that exist in its network system.

User Andrew Butenko
by
6.3k points