Answer:
The actual methods used to protect against data loss are Technical controls, but the program that identifies which data to protect is a Procedural control.
Step-by-step explanation:
In technical control, different software has been installed and protocols has been deployed to avoid any data loss in network security. As all the devices and protocols that we need while installing a network needs technical support. This is the reason, these things are called technical control of the system.
Another control in network security is procedural control. In this type of control it has been identified that, which data should be protected or which data should not be accessed to unauthorized users. This is called procedural control.