SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start


From course:

ICE CONSULTING PRODUCTS & SERVICES

» Start this Course
(Practice similar questions for free)
Question:

Security

Author: James Williams



Answer:

System resources must be defended against outside access to comply with the principle of security. Access controls must adequately resist attempts at intrusion, device manipulation, unauthorized deletion, data misuse, or improper modification and release. An auditor looks at IT security tools like WAF (web application firewalls), encryption and intrusion detection in addition to administrative controls such as background checks and authorizations.


0 / 5  (0 ratings)

1 answer(s) in total