Criado por Shantal K Green
mais de 4 anos atrás
|
||
Confidentiality
Integrity
Availability
Risk Management
Acceptance
Avoidance
Mitigation
Transference
Principle of Least Privilege
Attack Surface
Social Engineering
Physical Security
Securing Physical Locations
Securing Physical Locations
2
Securing Data Physically
Access Control
Defense in Depth
Authentication:
Access control
Auditing