Confidentiality - Information only accessible to authorized users, Integrity - Data remains accurate and unchanged unless authorized, Availability - Authorized users can access data when needed, Non-repudiation - Users cannot deny their actions (e.g., sending an email), Identify (NIST) - Evaluate risks, threats, and weak points, Protect (NIST) - Install and manage security controls, Detect (NIST) - Monitor for threats, Respond (NIST) - Contain and eliminate issues, Recover (NIST) - Restore systems and data,

CompTIA 4.1 Security Strategies

Leaderboard

Visual style

Options

Switch template

Continue editing: ?