Managerial control
|
Security risk control through policy control, documented control, standardized procedures, standards and guidelines, etc.
(security management regulations, personal information protection, security incident response guidelines, etc.)
|
Technical control
|
Constant/weekly/monthly monitoring network traffic using firewall, filter, VPN, EDR, etc. to detect malicious actions such as denial-of-service (DoS) attacks, port scans, computer cracks, and hacking
Internal monitoring of systems using constant/weekly/monthly intruder detection, virus protection, host-based security system, security patch, etc.
Software operation management such as password, firewall, intrusion detection system, and access control for information system monitoring and control
|
Physical control
|
Monitoring and controlling workshops/office areas or computer devices through doors, locks, surveillance cameras, security guards, etc.
|