O'Reilly logo

CISA® Certified Information Systems Auditor®: Study Guide, Third Edition by David Cannon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using Technical Protection

Technical protection is also referred to as logical protection. A simple way to recognize technical protection is that technical controls typically involve a hardware or software process to operate. Let’s start with technical controls, which are also known as automated controls.

Technical Control Classification

Technical protection may be implemented by using a combination of mandatory controls or discretionary controls. Technical controls are considered very strong if used in combination with administrative and physical controls. Technical controls should always be active, be monitored, and block unauthorized access attempts. Any unauthorized attempt should notify the security staff with both a log entry and matching ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required