Preventative

Controls placed at network perimeter to prevent against threats

Detective Control

Located within network to track whether adversary has infiltrated.