null
US
Iniciar Sesión
Regístrate Gratis
Registro
Hemos detectado que no tienes habilitado Javascript en tu navegador. La naturaleza dinámica de nuestro sitio requiere que Javascript esté habilitado para un funcionamiento adecuado. Por favor lee nuestros
términos y condiciones
para más información.
Siguiente
Copiar y Editar
¡Debes iniciar sesión para completar esta acción!
Regístrate gratis
2832679
Critical Security Controls
Descripción
Information security Controls for effective governance.
Sin etiquetas
security controls
information security control
controls
information security
Mapa Mental por
Viki J
, actualizado hace más de 1 año
Más
Menos
Creado por
Viki J
hace más de 9 años
14
0
0
Resumen del Recurso
Critical Security Controls
Inventory of Authorized and Unauthorized DevicesInventory of Authorized and Unauthorized Devices
Inventory of Authorized and Unauthorized Software
Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
Continuous Vulnerability Assessment and Remediation
Malware Defenses
Application Software Security
Wireless Access Control
Data Recovery Capability
Security Skills Assessment and Appropriate Training to Fill Gaps
Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
Limitation and Control of Network Ports, Protocols, and Services
Controlled Use of Administrative Privileges
Boundary/ Perimeter Defense
Account Monitoring and Control
Data Protection
Secure Network Engineering
Incident Response and Management
Maintenance, Monitoring, and Analysis of Audit Logs
Controlled Access Based on the Need to Know
Penetration Tests and Red TeamPenetration Tests and Red Team Exercises Exercises
Mostrar resumen completo
Ocultar resumen completo
¿Quieres crear tus propios
Mapas Mentales
gratis
con GoConqr?
Más información
.
Similar
AS Levels ICT -Form Controls
lukejones
2.1 Business Influences and Associated Security Risks
DJ Perrone
Infosec Basics
bondarets
Types of Attacks
River L.
Information Security: Chapter 2
marcb176
Data-centric Security
Michael Mihalik
Threats
marnus.db
PC Dashboard
al wed
Information Security FULL WORK
Luis Mauricio Falla Guiulfo
Loho Co (12,14) IC IA
hasnain zehra
Control Systems Exit Review
Freyja Ivorie Miguel
Explorar la Librería