- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 103字
- 2021-06-30 19:15:45
Data
As we finished the previous section talking about data, we should ensure that data is always protected regardless of its current state (in transit or at rest). There will be different threats according to the data's state. The following are some examples of potential threats and countermeasures:
These are only some examples of potential threats and suggested countermeasures. A deeper analysis must be performed to fully understand the data path according to the customer's needs. Each customer will have their own particularities regarding data path, compliance, rules, and regulations. It is critical to understand these requirements even before the project is started.
推薦閱讀
- Windows Server 2019 Cookbook
- 蘋果電腦玩全攻略 OS X 10.8 Mountain Lion
- Kali Linux滲透測(cè)試全流程詳解
- Linux操作系統(tǒng)應(yīng)用編程
- Windows Vista融會(huì)貫通
- Mobile First Design with HTML5 and CSS3
- 操作系統(tǒng)分析
- Django Project Blueprints
- Cassandra 3.x High Availability(Second Edition)
- INSTANT Galleria Howto
- Windows Vista終極技巧金典
- iOS 10 開發(fā)指南
- Linux 從入門到項(xiàng)目實(shí)踐(超值版)
- Linux操作系統(tǒng)案例教程(第2版)
- Implementing Domain-Specific Languages with Xtext and Xtend(Second Edition)