1. Risk Management
After all, the same technology that connects companies to the global marketplace also makes their systems vulnerable to attack. ... Detective controls track security events after they occur and provide information for investigations when an incident is noticed or data is missing or corrupted. Assessment controls identify weaknesses in the environment by evaluating system configurations, security settings, access control lists, and other security elements of a particular system or layer. ... For example, every department and agency within the federal government has been mandated, by Executive ...
- Word Count: 522
- Approx Pages: 2
- Grade Level: Graduate