week 2
K1.2 The role and types of detective business control techniques in protecting the digital security of an organisation:
The Role of Detective Controls
Detective controls are security measures that aim to identify and alert an organisation to suspicious or harmful activity.
They can spot an incident:
-
During the event (in progress)
-
After the event has happened (retrospectively)
These controls don’t stop the incident from occurring – instead, they help organisations:
-
Detect breaches
-
Respond appropriately
-
Gather evidence for investigation
-
Improve future prevention
Types of Detective Control Techniques
Detective controls can be physical or administrative in nature.
Physical Detective Controls
These help identify unauthorised physical access or unusual movement in secured spaces.
Type | Description |
---|---|
CCTV | Closed-Circuit Television cameras monitor activity. Can be used for: |
- Live monitoring by security teams | |
- Playback of footage to identify incidents | |
Motion Sensors | Detect movement in restricted or sensitive areas. Trigger alerts or alarms if movement is unexpected. |
These tools are especially important for data centres, server rooms, or any area storing critical digital infrastructure.
Administrative (Policies and Procedures)
These are human- or system-based logs and checks designed to detect abnormal activity.
Type | Description |
---|---|
Logs | Records created by systems, devices, or people. Examples include: |
- Temperature Logs: Track climate in server rooms – overheating may signal failure. | |
- Error Logs: Record system errors – help detect malware, software issues, or intrusion. | |
- Access Logs: Logins, system access attempts, or failed logins can reveal threats. | |
Review/Audit | Scheduled or reactive checks to identify problems. Examples: |
- Audit of People Entering/Leaving: Detect tailgating or unauthorised access. | |
- Review of Logs: Helps spot repeated failed logins, malware signatures, or suspicious trends. |
Spot the Detective Controls
Scenario:
Your school is upgrading its IT security. The IT manager wants to install detective controls to help monitor and investigate incidents.
Task:
Identify three detective controls the school could use (at least one physical, one administrative).
For each, explain:
How it works
Why it's useful
What it detects
Example (start):
Control: CCTV in the server room
What it detects: Unauthorised access
How it works: Video surveillance records people entering
Why it’s useful: Provides evidence if a breach occurs
Presentation Format: Paragraphs, posters, Canva Presentation or slides.
Last Updated
2025-07-11 13:02:56
English and Maths
English
Maths
Stretch and Challenge
Stretch and Challenge
- Fast to implement
- Accessible by default
- No dependencies
Homework
Homework
Equality and Diversity Calendar
How to's
How 2's Coverage
Links to Learning Outcomes |
Links to Assessment criteria |
|
---|---|---|
Files that support this week
Week 1←
PrevWeek 2←
PrevWeek 3←
Prev→
Next