Integrity, Ensures data is not modified by unauthorized users, Separation of Duties, No single person controls all steps of a critical process, NAT, Translates private IP addresses to public IP addresses, Non-repudiation, Sender cannot deny having sent a message, Due Diligence, Researching and understanding risks before acting, Hot Site, Fully operational recovery site within minutes, Due Care, Implementing reasonable security measures, Cold Site, Empty facility that takes days or weeks to activate, Least Privilege, Granting minimum access needed to perform a job, Accountability, Logging and tracking user actions, RPO, Maximum acceptable amount of data loss, Confidentiality, Prevents unauthorized disclosure of information, RTO, Maximum acceptable downtime for a system, IDS, Detects and alerts on threats but does not block them, Authorization, Determining what a user is allowed to do, Defense in Depth, Multiple overlapping layers of security controls, Authentication, Verifying that a user is who they claim to be, IPS, Sits inline and automatically blocks malicious traffic, Availability, Ensures systems are accessible when needed, VPN, Creates an encrypted tunnel for secure remote access.
0%
ISC2 CC Practice
Kongsikan
Kongsikan
Kongsikan
oleh
Lantraducoes
Edit Kandungan
Cetakan
Benamkan
Lebih lagi
Papan pendahulu
Lihat pemain terbaik
Tugasan
Papan mata
Paparkan banyak
Paparkan sedikit
Papan mata ini berciri peribadi pada masa ini. Klik
Kongsikan
untuk menjadikannya umum.
Papan mata ini telah dilumpuhkan oleh pemilik sumber.
Papan mata ini dinyahdayakan kerana pilihan anda berbeza daripada pemilik sumber.
Pilihan untuk Kembali
Padankan
ialah templat terbuka. Ia tidak menjana skor untuk papan mata.
Log masuk diperlukan
Gaya visual
Fon
Langganan diperlukan
Pilihan
Tukar templat
Paparkan semua
Lebih banyak format akan muncul semasa anda memainkan aktiviti.
Papan pendahulu
Lihat pemain terbaik
)
Buka keputusan
Salin pautan
Kod QR
Padam
Pulihkan autosimpan:
?