Any control, be it technical, physical, or administrative, is either a preventive control, a detective control, or possibly a corrective control (e.g., a security guard can not only det

    January 10, 2024

 
Any control, be it technical, physical, or administrative, is either a preventive control, a detective control, or possibly a corrective control (e.g., a security guard can not only detect a disturbance but also can respond to it in near real time). Of these three types of controls, technical controls have the advantage that they can be set up to run automatically, always on, running “in the background,” while users perform other tasks.
Unfortunately, the evolution of technical controls in information security often leads both users and management to the mistaken belief that these “set it and forget it” controls keep them completely secure, and their awareness of, and concern for, information security can drop precipitously.
What both users and information security professionals need to always be aware of is that no technical control, no matter how well engineered and tested, can provide 100% risk-free operation. Technical controls can, and will, fail.
For this Discussion, you will explore how technical controls have evolved over the past 10 years, and you will investigate how the failure of these technical controls has led to significant security breaches. As you review technical controls, their evolution and their failures, consider how they failed, what could have been done to prevent or mitigate the failure, and analyze the failures to see if you can identify any trends in how these controls were exploited. Spotting such a trend may serve as a powerful research topic, and developing this knowledge will also serve you well as an information security professional.
To Prepare:

Based on these resources and your own research, document 2 cases in which the failure of information security technical controls have resulted in significant security breaches (loss of data confidentiality) or security disasters (loss of data integrity or availability) in terms of size or impact.

Participants: , submit a 2- to 3-paragraph post that includes the following:

A description of the cases you have documented in which the failure of information security technical controls have resulted in significant security breaches
Answers to the following questions, including justifications for your responses:

What, if any, trends did you discover in how technical controls failed?
How could the failure of the technical control have been avoided or otherwise mitigated?

Trust your assignments to an essay writing service with the fastest delivery time and fully original content.

March
January
February
March
April
May
June
July
August
September
October
November
December
2025
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
2026
2027
2028
2029
2030
2031
2032
2033
2034
2035
2036
2037
2038
2039
2040
2041
2042
2043
2044
2045
2046
2047
2048
2049
2050
SunMonTueWedThuFriSat
23
24
25
26
27
28
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
1
2
3
4
5
00:00
01:00
02:00
03:00
04:00
05:00
06:00
07:00
08:00
09:00
10:00
11:00
12:00
13:00
14:00
15:00
16:00
17:00
18:00
19:00
20:00
21:00
22:00
23:00
Verified