Erstellt von Shantal K Green
vor mehr als 4 Jahre
|
||
Confidentiality
Integrity
Availability
Risk Management
Acceptance
Avoidance
Mitigation
Transference
Principle of Least Privilege
Attack Surface
Social Engineering
Physical Security
Securing Physical Locations
Securing Physical Locations
2
Securing Data Physically
Access Control
Defense in Depth
Authentication:
Access control
Auditing