1. Risk Management
Security can only be evaluated by better understanding the tools and processes that dynamically interact to protect the computing environment. This interaction should occur in a way that is appropriate for the sensitivity of the environment's data or the function it provides. ... Detective controls track security events after they occur and provide information for investigations when an incident is noticed or data is missing or corrupted. ... Such a mandate requires implementing a security policy and a process for certifying and accrediting that systems and networks comply with that polic...
- Word Count: 522
- Approx Pages: 2
- Grade Level: Graduate