Integrity, Ensures data is not modified by unauthorized users, Separation of Duties, No single person controls all steps of a critical process, NAT, Translates private IP addresses to public IP addresses, Non-repudiation, Sender cannot deny having sent a message, Due Diligence, Researching and understanding risks before acting, Hot Site, Fully operational recovery site within minutes, Due Care, Implementing reasonable security measures, Cold Site, Empty facility that takes days or weeks to activate, Least Privilege, Granting minimum access needed to perform a job, Accountability, Logging and tracking user actions, RPO, Maximum acceptable amount of data loss, Confidentiality, Prevents unauthorized disclosure of information, RTO, Maximum acceptable downtime for a system, IDS, Detects and alerts on threats but does not block them, Authorization, Determining what a user is allowed to do, Defense in Depth, Multiple overlapping layers of security controls, Authentication, Verifying that a user is who they claim to be, IPS, Sits inline and automatically blocks malicious traffic, Availability, Ensures systems are accessible when needed, VPN, Creates an encrypted tunnel for secure remote access.

만든이

리더보드

주요 선수 보기

순위표

비주얼 스타일

옵션

템플릿 전환하기

리더보드

주요 선수 보기
)
자동 저장된 게임을 복구할까요?