Вы находитесь на странице: 1из 2

Physical Security Mechanisms

Prevention Containment Detection and Event Collection Recovery and Assurance


Notification and Event Tracking Restoration
Logical Security Entity Stored Data Security Audit Trails; Incident Response; Audit Trails;
Services Authentication; Confidentiality; Monitoring; Security Data Replication Security Audit;
Session Environmental Intrusion Operations and Backup; Security
Authentication Security; Security Detection; Security Management; Software Monitoring;
Training and Training and Security Replication and Security
Awareness Awareness; Monitoring; Backup; Crisis Measurement and
Security Security Management Metrics
Measurement and Measurement and
Metrics Metrics
Physical Security Entity Stored Data Security Audit Trails Incident Response Audit Trails
Mechanisms Authentication Confidentiality Monitoring User Event logs; Event Data collection Event logs; Event
Login Procedure; Logical Access activity logs; log integrity and analysis; log integrity
User Passwords Control application event protection Incident protection
and Tokens; Client Mechanisms; logs; operator mechanisms; Event assessment mechanisms; Event
User Agents for Physical Access activity logs; log browsing tools; procedures; log browsing tools;
Authentication; Control management event event log analysis Response action event log analysis
Authentication Mechanisms; logs; event log tools; reporting management tools; reporting
Exchange Stored Data browsing and tools Security procedures Data tools Security
Protocols; Encryption; Media analysis; reporting; Operations Replication and Audit
Authentications Storage Security; real-time system Management Backup Regular Independent
Server System: and Media Disposal monitoring and Operator backup copying; inspection; regular
Directory System Procedures alarms Intrusion authentication backup media scanning with
Session Environmental Detection mechanisms; management: system audit tools;
Authentication Security Site- Intrusion signature operator activity labeling, indexing, Security
Mutual two-way Selection analysis on logs; operations transport, storage, Monitoring User
and three-way procedures; Fire network traffic; event logs; retrieval, media activity logs;
authentication Prevention, real-time system Security recycling, media application event
exchanges; Session detection and monitoring; alarms Measurements and disposal Crisis logs; operator
Context (finite quenching; Flood Security Training Metrics Management activity logs;
state machine) avoidance, and Awareness Cryptographic test Vested authority in management event
detection and Training courses; mechanisms; a crisis manager logs; event log
removal; Air training manuals inspection tools; and crisis browsing and
temperature and and penetration testing; management team; analysis; reporting;
humidity controls; documentation; statistical tests assessment real-time system
electrical power publicity procedures; monitoring and
protection campaigns Security escalation alarms Security
mechanisms Measurements and procedures; Measurements and
Security Training Metrics activation Metrics
and Awareness Cryptographic test procedures Cryptographic test
Training courses; mechanisms; mechanisms;
training manuals inspection tools; inspection tools;
and penetration testing; penetration testing;
documentation; statistical tests statistical tests
publicity
campaigns
Explanation I think for In Containment we Security Every security Recovery and For assurance the
prevention to work must be concerned monitoring and program needs to Restoration is all same reasons as
in security with how data is intrusion detection be audited. I about saving what Event Collection
architecture there stored and all the in my opinion go believe the security was lost and and Event Tracking
needs to be moving parts that hand in hand, we operation restoring it to its play in to why we
authentication at come with it. The need to monitor management can rightful state. First need these logical
every possible security of the whats going on in also help with the we need to respond security services.
level. Two of those environment in order to detect audit because this to the incident then
levels would be which we store our intrusions. Training measure also has replicate and
entity and sessions. data the physical and Awareness as I logs. Security backup the data.
Entity especially environment is just have said before in measurement and The most important
because this as important as the important in any metrics can also thing is crisis
sometimes is where digital security help with audits management
the breaches in environment. architecture. All because of results because there
security usually Lastly training and security programs that could come needs to be steps to
occur. awareness are must have security from the testing. take in these
important. measurement and situations.
metrics established.

Вам также может понравиться