Policies, procedures, and awareness - User education; manageable network plans; and employee onboarding and off-boarding procedures., Physical - Fences, door locks, mantraps, turnstiles, device locks, server cages, cameras, motion detectors, and environmental controls., Perimeter - Firewalls using ACLs and securing the wireless network., Network - The installation and configuration of switches and routers; implementation of VLANs; penetration testing; and virtualization use., Host - Log management, OS hardening, patch implementation, patch management, auditing, anti-malware, and password attack prevention on each workstation, laptop, and mobile device., Application - Authentication and authorization, user management, group policies, and web application security., Data - Storing data properly, destroying data, classifying data, cryptography, and data transmission security.,
0%
Defense in Depth (Definition Exercise)
Share
by
Terry22
9th Grade
10th Grade
11th Grade
12th Grade
Vocational / Technical
Higher Education
CompTIA
Computing
CompTIA
Cybersecurity
Security
I-edit ang Content
Embed
Uban pa
Leaderboard
Show more
Show less
Kini nga leaderboard naka-pribado. Pag-klik sa
Share
aron himuon kini nga publiko.
Kini nga leaderboard gi-disable sa tag-iya sa resource.
Kini nga leaderboard gi-disable tungod ang imong mga kapilian lahi ra sa tag-iya sa resource.
I-revert ang mga Kapilian
Ang
Match up
usa ka open-ended nga template. Dili kini makamugna ug mga marka sa leaderboard.
Kinahanglan mag log in
Visual style
Fonts
Subscription required
Mga Option
I-switch ang template
Ipakita tanan
Daghang mga format ang mugawas samtang gidula nimo ang activity.
Open results
Copy link
QR code
Mag-delete
I-restore ang gi-autosave:
?