KEY CONCEPTS AND TERMS

Acceptable use policy (AUP)

Authentication

Baseline

Board of directors (BOD)

Chief information officer (CIO)

Chief information security officer (CISO)

Chief technology officer (CTO)

Data destruction policies

Data retention policies

Guidelines

Information security governance (ISG)

Information security management (ISM)

Multifactor authentication

Operational planning

Policy

Procedures

Stakeholders

Standards

Strategic planning

Tactical planning

User credentials

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.222.119.148