Monitoring areas suggested in ISO 27002 include: authorized access, all privileged operations, unauthorized access attempts, changes to (or attempts to change) system security settings and controls, and __________.
Fill in the blank(s) with the appropriate word(s).
Monitoring areas suggested in ISO 27002 include: authorized access, all privileged operations, unauthorized access attempts, changes to (or attempts to change) system security settings and controls, and __________.
Computer Science & Information Technology
You might also like to view...
A ________ workbook allows multiple users on a network to view and make changes to a workbook at the same time
Fill in the blank(s) with correct word
Computer Science & Information Technology
_________ is an organization that produces data to be made available for controlled release, either within the organization or to external users.
A. Client B. Data owner C. User D. Server
Computer Science & Information Technology