From course:
(Practice similar questions for free)
ICE CONSULTING PRODUCTS & SERVICES
» Start this Course(Practice similar questions for free)
Question:
Security
Author: James WilliamsAnswer:
System resources must be defended against outside access to comply with the principle of security. Access controls must adequately resist attempts at intrusion, device manipulation, unauthorized deletion, data misuse, or improper modification and release. An auditor looks at IT security tools like WAF (web application firewalls), encryption and intrusion detection in addition to administrative controls such as background checks and authorizations.
0 / 5 Â (0 ratings)
1 answer(s) in total