Auto saved by Logseq
This commit is contained in:
parent
4a24d024a7
commit
915d6d1653
|
@ -2347,7 +2347,7 @@
|
||||||
- Threats :-> anything that can cause harm to an information
|
- Threats :-> anything that can cause harm to an information
|
||||||
id:: 648ae35f-8842-4358-93fd-1f6fa1bb72a4
|
id:: 648ae35f-8842-4358-93fd-1f6fa1bb72a4
|
||||||
system – successful exploits of vulnerabilities
|
system – successful exploits of vulnerabilities
|
||||||
- Relationship between a vulnerability and a threat
|
- Relationship between a vulnerability and a threat #flashcard
|
||||||
- An organization does not have sufficient controls
|
- An organization does not have sufficient controls
|
||||||
to prevent an employee from deleting critical
|
to prevent an employee from deleting critical
|
||||||
computer files **(lack of controls – vulnerability).**
|
computer files **(lack of controls – vulnerability).**
|
||||||
|
@ -2373,7 +2373,7 @@
|
||||||
- To effectively assess the security needs of an
|
- To effectively assess the security needs of an
|
||||||
organization and to evaluate and choose various
|
organization and to evaluate and choose various
|
||||||
security products and policies
|
security products and policies
|
||||||
- Methods:
|
- Methods: #flashcard
|
||||||
- Categorize information
|
- Categorize information
|
||||||
- Identify legal obligations
|
- Identify legal obligations
|
||||||
- Assess vulnerabilities, threats and risks
|
- Assess vulnerabilities, threats and risks
|
||||||
|
|
Loading…
Reference in a new issue