Recovery- create duplicates of all information in case data is lost during and attack.
Preventative implement permission policies on the entire information system,
Deterent- head of security displays warning signs to caution people against accessing a system without authorization,
Detective-a file verification system records the details of users who attempt to gain access to information,
Corrective-the IT administrator installs antivirus software that identifies known viruses and erdaicates them,
Copyright © 2026 eLLeNow.com All Rights Reserved.