Professional Documents
Culture Documents
Network Control
Network Control
Detective Controls
4. Implement network
monitoring tools
6. Conduct periodic
inventory of network
equipment
5. Establish recovery
mechanisms such as
checkpoints, roll-back,
and roll-forward features
in the database
6. Establish recovery
techniques from
computer viruses
9. Implement message
sequence numbers
10. Use checksum
techniques
1. Update contingency
plans
2. Acquire network
diagnostic data collection
tools with automatic
corrective action
Corrective Controls