Monitoring areas suggested in ISO 27002 include: authorized access, all privileged operations, unauthorized access attempts, changes to (or attempts to change) system security settings and controls, and __________.

Fill in the blank(s) with the appropriate word(s).

Monitoring areas suggested in ISO 27002 include: authorized access, all privileged operations, unauthorized access attempts, changes to (or attempts to change) system security settings and controls, and __________.

Computer Science & Information Technology

You might also like to view...

A ________ workbook allows multiple users on a network to view and make changes to a workbook at the same time

Fill in the blank(s) with correct word

Computer Science & Information Technology

_________ is an organization that produces data to be made available for controlled release, either within the organization or to external users.

A. Client B. Data owner C. User D. Server

Computer Science & Information Technology