Detective controls are intended to identify a threat event as it is happening and to aid in inquiries and audits after the event has taken place.
to prevent the use of spyware. To defend against keyloggers, which record keystrokes with the intention of stealing data, keyboard encryption software is utilized. In order to trick the receiving computer system into believing the packet is coming from a reliable source, such as another computer on a legitimate network, and accepting it, an IP spoofing attack uses tools to change the source address in the packet header. It outlines appropriate ways to use the company's information resources and computing hardware, such as desktop and laptop computers, wireless devices, phones, and the Internet, as well as the penalties for breaking the rules.
Learn more about system here-
https://brainly.com/question/27162243
#SPJ4