simliar to security controls but are generally more reactive rather than proactive, and target specific threats