Logical Security - Logical Security: Protects digital assets and systems from unauthorized access, ensuring data integrity and confidentiality, Principle of Least Privilege - Principle of Least Privilege: Limits user access to only what is necessary for their role., Access Control Lists (ACLs) - acls: Define permissions for users or groups on systems and files, Multifactor Authentication (MFA) - MFA: Strengthens authentication by requiring multiple verification factors, , Email: - Sends verification codes, Hard Token - Hard Token: Physical device for one-time passwords., Soft Token - soft token: App-based codes, SMS - sms: Sends codes via text messages, Voice Call - voice call:Provides verification through calls, Authenticator Application - Authenticator Application:Generates time-based codes on devices., Mobile Device Management (MDM) - MDM:Secures and manages mobile devices, enforcing policies like remote wiping, app control, and encryption, Active Directory - AD: Centralized directory service that manages network resources and user access., Login Script - Login Script: Automates user-specific tasks at login, Domain: - Domain: Organizes users and computers under a single network identity., Group Policy/Updates - GP/updates:Enforces security settings and updates across devices, Organizational Units - OU:Segments users or devices for administrative control., Home Folder - Home Folder:Assigns personal storage on the network, Folder Redirection - Folder Redirection:Moves user files to secure network locations, Security Groups - Security Groups:Defines user permissions for accessing resources,

a+1102 2.1 continued Summarize various security measures and their purposes

Lestvica vodilnih

Vizualni slog

Možnosti

Preklopi predlogo

Obnovi samodejno shranjeno: ?