0 - Striping - If one drive fails, everything is lost, 1 - Mirroring - Data is duplicated on one drive, if one fails there is still integrity and availability, 5 - Striping w/ Parity - Spread across multiple drives. If fails, can be reconstructed via parity, Authentication - Prove you are who you say you are, Authorization - Based on who you are, what can you access, Accounting - Resources Used: Data sent/ login time, Data In Use - Actively Processing in RAM / memory. Usually decrypted, Data in Transit - Data moving over the network, Data at Rest - Data on storage drive, MFA Factor - you know / you have / you are , MFA Attribute - Where you Are / You can Do / You Exhibit / Someone you Know, Purging - Remove it from an existing data store, Wipe - Unrecoverable removal of storage drive data. Can reuse drive after, ECC & Diffie-Hellman - Asymmetric encryption, PFS - use a different encryption key for each session, Iaas - provides the user with the hardware needed to get up and running, and the end user is responsible for the operating system, the application, and any ongoing maintenance tasks., PaaS - provides the building blocks of features and requires the end user to customize their own application from the available modules, SaaS - no local application installation, no ongoing maintenance tasks and no local infrastructure requirements, GLBA - banking, lenders, insurance - limits info they can share with each other, FISMA - formal gov't infosec. , HIPAA - healthcare, COPPA - children online, ECPA - 3rd parties prohibits from intercepting communications, CIS - non profit/ best cybersec practices / threats, NIST CSF - best cybersec practices for private industry, NIST RMF - best cybersec practices for Gov't agencies,
0%
Random :)
共用
共用
共用
由
Pdaniels845
編輯內容
列印
嵌入
更多
作業
排行榜
顯示更多
顯示更少
此排行榜當前是私有的。單擊
共用
使其公開。
資源擁有者已禁用此排行榜。
此排行榜被禁用,因為您的選項與資源擁有者不同。
還原選項
匹配遊戲
是一個開放式範本。它不會為排行榜生成分數。
需要登錄
視覺風格
字體
需要訂閱
選項
切換範本
顯示所有
播放活動時將顯示更多格式。
打開結果
複製連結
QR 代碼
刪除
恢復自動保存:
?