PDF4PRO ⚡AMP

Modern search engine that looking for books and documents around the web

Example: confidence

Sunflower CISSP

CISSP Summary Version Maarten de Frankrijker, CISSP . Revised by Christian Reina, CISSP . Revised by Steve Warnock __..-/ \-. ( \__/ ). /` ;;\.-`\. \ _.\;;/._ /. ( / \ ). '-\__/-'.-, , \\ (-. ). |\_ ||/.-`. \'.\_ |;`. '--,\|| , `;| _/|. // _/.'/. //_/,--'. ||'-`. Domain 1: Security and Risk Management Concepts (10). CIA. DAD - NEGATIVE -(disclosure alteration and destruction). Confidentiality - prevent unauthorized disclosure, need to know, and least privilege. Assurance that information is not disclosed to unauthorized programs, users, processes, encryption, logical and physical access control, Integrity - no unauthorized modifications, consistent data, protecting data or a resource from being altered in an unauthorized fashion Availability - reliable and timely, accessible, fault tolerance and recovery procedures, WHEN. NEEDED. IAAA - requirements for accountability Identification - user claims identity, used for user access control Authentication - testing of evidence of users identity Accountability - determine actions to an individual person Authorization - rights and permissions granted Privacy - level of confidentiality and privacy protection Risk (12).

similar framework. Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH) - Congress amended HIPAA by passing this Act. This law updated many of HIPAA’s privacy and security requirements. One of the changes is a change in the way the law treats business associates

Tags:

  Updated, Framework

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Spam in document Broken preview Other abuse

Transcription of Sunflower CISSP

Related search queries