Control Types
Ports
Acronyms
More Acronyms
Scenarios
100

This type of control is focused around noticing or discovering something during or after it has already happened

Detective control

100

Both FTP ports

20/21

100

PII

Personal Identifiable Information

100

BYOD

Bring Your Own Device

100

When someone follows you closely to gain access to a location that they do not have authorization to enter into.

Shoulder surfing/ Piggy backing

200

This type of control discourages a person from doing something but may not be able to actually stop them from doing it.

Deterrent Control

200

Telnet

23

200

ACL

Access Control List

200

NIC

Network Interface Card

200

This would be the correct port to block if you wanted to disable anyone from being able to remote into your computers desktop.

3389

300

This type of control restores the system back to the state of confidentiality, integrity, and availability without retrieving backups, after unauthorized activity occurs.

Corrective Control

300

Port 53

DNS

300

NIDS

Network Intrusion Detection System

300

NAC

Network Access Control

300

The correct response if Jeff Bezos, emails you telling you to click a link to get free V-bucks.

Ignore it.

400

Retrieving the servers data from a backup and return it to a previous known good state known as this type of control.

Recovery Control

400

143

IMAP4

400

LDAP

Lightweight Directory Access Control

400

TFTP

Trivial File Transfer Protocol

400

This server would need to be checked if an IP config shows you an address of 169.254.0.0

DHCP server

500

This type of control may temporarily make up for the issue without necessarily outright solving said issue.

Compensative Control

500

Syslog

514

500

Both Versions of MAC

Media Access Control

Also Mandatory Access control

500

NIST

National Institute of Standards & Technology

M
e
n
u