Skip to content
Casturity.com
  • HOME
  • CAREER
  • VENDORS
  • RESOURCES
  • ABOUT
  • ARTICLES
Casturity.com
What is a Technical Cybersecurity Control. cyber security training
Documentation

What is a Technical Cybersecurity Control?

Technical, also known as logical controls, involve the hardware or software mechanisms used to manage access and to provide protection for resources and systems.

Examples: authentication methods (username, passwords, smart cards), encryption, firewalls, intrusion detection/prevention systems.

Post navigation

Previous Previous
What is Risk Deterrence in Cybersecurity?
NextContinue
What is an Administrative Cybersecurity Control?

Similar Posts

What is an IAVM? | DoD RMF
Documentation

What is an IAVM? | DoD RMF

Read More What is an IAVM? | DoD RMFContinue

HTTP Status Code 301 – Moved Permanently
Documentation

HTTP Status Code 301 – Moved Permanently

Read More HTTP Status Code 301 – Moved PermanentlyContinue

Cross-layer functions | OSI Model
Documentation

Cross-layer functions | OSI Model

Read More Cross-layer functions | OSI ModelContinue

HTTP Status Code 302 – Found
Documentation

HTTP Status Code 302 – Found

Read More HTTP Status Code 302 – FoundContinue

What is Risk Acceptance in Cybersecurity?
Documentation

What is Risk Acceptance in Cybersecurity?

Read More What is Risk Acceptance in Cybersecurity?Continue

HTTP Status Code 418 – Im A Teapot
Documentation

HTTP Status Code 418 – Im A Teapot

Read More HTTP Status Code 418 – Im A TeapotContinue

Casturity.com

Network & Infrastructure Security

Documentation

  • What is an IAVM? | DoD RMF
  • What Is A Cross-layer function?
  • Cross-layer functions
    Cross-layer functions | OSI Model
  • Seven Layers of OSI Model Explained
    7 Layers of OSI Model Explained

Guides

  • HTML Injection. Tryhackme. Free cyber security training.
    HTML Injection Explained
  • How to perform a Penetration Test.
    Comprehensive Guide to Penetration Tests | Tools, Process & Methods
  • Universal XSS via Evernote WebClipper
    Universal XSS via Evernote WebClipper
  • Semmle QL
    Vulnerability hunting with Semmle QL: DOM XSS

Tutorials

  • How to use exiftool. Learn cyber security.
    How to use ExifTool? Metadata Tool
  • How to use inurlbr dork automation tool. Learn cyber security.
    How to use Inurlbr? Dork Automation Tool
  • How to use search engine dorks with Google.
    How to use Search Engine Dorks?
  • How to use Photon for OSINT. Learn cyber security.
    How to use Photon.py? | RECON

© 2020-2022 Casturity.com

  • HOME
  • CAREER
  • VENDORS
  • RESOURCES
  • ABOUT
  • ARTICLES