week 2

K1.2 The role and types of detective business control techniques in protecting the digital security of an organisation:

 

The Role of Detective Controls

Detective controls are security measures that aim to identify and alert an organisation to suspicious or harmful activity.
They can spot an incident:

  • During the event (in progress)

  • After the event has happened (retrospectively)

These controls don’t stop the incident from occurring – instead, they help organisations:

  • Detect breaches

  • Respond appropriately

  • Gather evidence for investigation

  • Improve future prevention


Types of Detective Control Techniques

Detective controls can be physical or administrative in nature.

Physical Detective Controls

These help identify unauthorised physical access or unusual movement in secured spaces.

Type Description
CCTV Closed-Circuit Television cameras monitor activity. Can be used for:
  - Live monitoring by security teams
  - Playback of footage to identify incidents
Motion Sensors Detect movement in restricted or sensitive areas. Trigger alerts or alarms if movement is unexpected.

 

These tools are especially important for data centres, server rooms, or any area storing critical digital infrastructure.

Administrative (Policies and Procedures)

These are human- or system-based logs and checks designed to detect abnormal activity.

Type Description
Logs Records created by systems, devices, or people. Examples include:
  - Temperature Logs: Track climate in server rooms – overheating may signal failure.
  - Error Logs: Record system errors – help detect malware, software issues, or intrusion.
  - Access Logs: Logins, system access attempts, or failed logins can reveal threats.
Review/Audit Scheduled or reactive checks to identify problems. Examples:
  - Audit of People Entering/Leaving: Detect tailgating or unauthorised access.
  - Review of Logs: Helps spot repeated failed logins, malware signatures, or suspicious trends.

 

Spot the Detective Controls
Scenario:
Your school is upgrading its IT security. The IT manager wants to install detective controls to help monitor and investigate incidents.

Task:
Identify three detective controls the school could use (at least one physical, one administrative).
For each, explain:
           How it works
           Why it's useful
           What it detects

Example (start):
                       Control: CCTV in the server room
                       What it detects: Unauthorised access
                       How it works: Video surveillance records people entering
                       Why it’s useful: Provides evidence if a breach occurs

Presentation Format: Paragraphs, posters, Canva Presentation or slides.

 

 


Last Updated
2025-07-11 13:02:56

English and Maths

English


Maths


Stretch and Challenge

Stretch and Challenge


  • Fast to implement
  • Accessible by default
  • No dependencies
Homework

Homework


Equality and Diversity Calendar
How to's

How 2's Coverage




Links to Learning Outcomes

Links to Assessment criteria

 


Files that support this week


| | | | |
Week 1
Prev
Week 2
Prev
Week 3
Prev

Next