Policies, procedures, and awareness - User education; manageable network plans; and employee onboarding and off-boarding procedures., Physical - Fences, door locks, mantraps, turnstiles, device locks, server cages, cameras, motion detectors, and environmental controls., Perimeter - Firewalls using ACLs and securing the wireless network., Network - The installation and configuration of switches and routers; implementation of VLANs; penetration testing; and virtualization use., Host - Log management, OS hardening, patch implementation, patch management, auditing, anti-malware, and password attack prevention on each workstation, laptop, and mobile device., Application - Authentication and authorization, user management, group policies, and web application security., Data - Storing data properly, destroying data, classifying data, cryptography, and data transmission security.,
0%
Defense in Depth (Definition Exercise)
Podijeli
Autor
Terry22
9th Grade
10th Grade
11th Grade
12th Grade
Vocational / Technical
Higher Education
CompTIA
Computing
CompTIA
Cybersecurity
Security
Uredi sadržaj
Postavi
Više
Zadatke
Top-lista
Pokaži više
Pokaži manje
Ova top-lista je trenutno privatna. Odaberite opciju
Podijeli
da biste je javno objavili.
Ovu top-listu onemogućio je vlasnik sadržaja.
Ova top-lista je onemogućena jer se vaš odabir opcija razlikuje od postavki vlasnika sadržaja.
Vrati opcije na početne postavke
Spoji parove
je otvoreni predložak. Ne generira rezultate za top-listu.
Prijava je obvezna
Vizualni stil
Fontovi
Potrebna je pretplata
Postavke
Promijeni predložak
Prikaži sve
Više formata prikazat će se dok budete igrali.
Otvoreni rezultati
Kopiraj vezu
QR kôd
Izbriši
Vrati automatski spremljeno:
?