1/171
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
AUTHORIZATION, ACCOUNTING, AUTHENTICATION
Purpose - Defines what employees can and cannot
do with company IT resources
Ensures only authorized users can
access sensitive systems.
maintaining secure passwords.
Outlines how an organization
should respond to security incidents.
Ensures proper handling of
sensitive customer and business data.
is the minimum set of security controls and configurations that must
be implemented to protect an organization's IT systems.
is a detailed, step-by-step set of instructions that explain how to implement a specific security policy or process.
is a detailed list of all physical components in an organization's IT infrastructure. This includes computers, servers, networking devices, peripherals, and other assets.
SERVES AS THE MECHANISM AND FORUM TO REVIEW, APPROVE, IMPLEMENT, AND COMMUNICATE CHANGES AND
INFORMATION THAT IMPACT RESEARCH ADMINISTRATION PROCESSES.
CAN INCLUDE POOR COMMUNICATION,
LACK OF LEADERSHIP, AND RESISTANCE TO CHANGE.
is a software development methodology where a
prototype (an early version of the software with limited functionality) is built, tested, and refined based on user feedback before developing the final product.