Logical Security - Protects digital assets and systems from unauthorized access, ensuring data integrity and confidentiality, Principle of Least Privilege - Limits user access to only what is necessary for their role., Access Control Lists (ACLs) - Define permissions for users or groups on systems and files, Multifactor Authentication (MFA) - Strengthens authentication by requiring multiple verification factors, , Email: - Sends verification codes, Hard Token - Physical device for one-time passwords., Soft Token - App-based codes, SMS - Sends codes via text messages, Voice Call - Provides verification through calls, Authenticator Application - Generates time-based codes on devices., Mobile Device Management (MDM) - Secures and manages mobile devices, enforcing policies like remote wiping, app control, and encryption, Active Directory - Centralized directory service that manages network resources and user access., Login Script - Automates user-specific tasks at login, Domain: - Organizes users and computers under a single network identity., Group Policy/Updates - Enforces security settings and updates across devices, Organizational Units - Segments users or devices for administrative control., Home Folder - Assigns personal storage on the network, Folder Redirection - Moves user files to secure network locations, Security Groups - Defines user permissions for accessing resources,

a+1102 2.1 continued Summarize various security measures and their purposes

Таблица лидеров

Визуальный стиль

Параметры

Переключить шаблон

Восстановить автоматически сохраненное: ?