The _________ controls focus on the response to a security breach, by warning of violations or attempted violations of security policies
or the identified exploit of a vulnerability and by providing means to restore the resulting lost computing resources.
What will be an ideal response?
detection and recovery
Business
You might also like to view...
Summarize the four different approaches that organizations can take in adapting to environmental uncertainty.
What will be an ideal response?
Business
In the context of network security, _________ is the ability to limit and control the access to host systems and applications via communications links.
What will be an ideal response?
Business