@infosectrain #
l
e
a
r
n
t
o
r
i
s
e
EXPLORING THE
OF SECURITY CONTROLS!
7 LAYERS
www.infosectrain.com
@infosectrain #
l
e
a
r
n
t
o
r
i
s
e
The first line of defense! Physical security controls
protect physical assets, like data centers and servers,
from unauthorized access and physical damage.
PHYSICAL
SECURITY
www.infosectrain.com
@infosectrain #
l
e
a
r
n
t
o
r
i
s
e
Securing the digital highway! Network security controls
manage and monitor data traffic, preventing unauthorized
access and potential cyberattacks.
NETWORK
SECURITY
www.infosectrain.com
@infosectrain #
l
e
a
r
n
t
o
r
i
s
e
Protecting the gateways! Endpoint security guards
individual devices, like laptops and smartphones,
against malware and unauthorized access.
ENDPOINT
SECURITY
www.infosectrain.com
@infosectrain #
l
e
a
r
n
t
o
r
i
s
e
Limiting entry to the right people! Access control
mechanisms authenticate users, granting them appropriate
access to sensitive information.
ACCESS
CONTROL
www.infosectrain.com
@infosectrain #
l
e
a
r
n
t
o
r
i
s
e
Guarding the treasure trove! Data security ensures
the confidentiality and integrity of sensitive data,
preventing unauthorized disclosure or alteration.
DATA
SECURITY
www.infosectrain.com
@infosectrain #
l
e
a
r
n
t
o
r
i
s
e
Protecting the heart of operations! Application security
controls defend against code vulnerabilities and
protect applications from exploitation.
APPLICATION
SECURITY
www.infosectrain.com
@infosectrain #
l
e
a
r
n
t
o
r
i
s
e
Vigilant eyes on watch! Security monitoring constantly
scans for anomalies, suspicious activities,
and potential breaches to respond swiftly.
SECURITY
MONITORING
FOUND THIS USEFUL?
Get More Insights Through Our FREE
Courses | Workshops | eBooks | Checklists | Mock Tests
LIKE SHARE FOLLOW

7 layers of security controls.pdf