Back to Results
First PageMeta Content
Security / Malware / Consensus audit guidelines / Spyware / Vulnerability / DMZ / Network security / Wireless security / Computer network security / Cyberwarfare / Computer security


Summary  of  CCA’s  Critical  Security  Controls   Condensed from TripW ire’s “The Executive’s Guide to the Top 20 Critical Security Controls” Created by Art Jacoby [removed]    
Add to Reading List

Document Date: 2014-07-03 11:16:59


Open Document

File Size: 97,02 KB

Share Result on Facebook

/

IndustryTerm

authorized software / Wireless Device / manageable using enterprise management tools / software vulnerabilities / business partner networks / e- ‐ / private network / print services / web servers / malware tools / spyware software / removable media / network device / unnecessary software / hardware device / configuration management / unauthorized wireless access / wireless access / party application software / malicious software / unnecessary software components / application software / web app firewalls / secure network / wireless access points / wireless devices / remote devices / perimeter networks / /

Position

Executive / /

Technology

operating system / wireless access / DNS / wireless devices / firewall / Wireless Device / Mobile Devices / /

SocialTag