- Architecting the Industrial Internet
- Shyam Nath Robert Stackowiak Carla Romano
- 68字
- 2021-07-02 23:59:24
Security considerations for the usage viewpoint
Following are the security considerations for implementing the usage viewpoint:
- Security monitoring continuously collects security-related data from events or activities, and analyzes it for security risks
- Security auditing collects, stores, and analyzes security-related information
- Security policy defines the usage and constraints for each user, role, and component
- Cryptographic support management stores, manages, grants, and revokes secure credentials, and provides global key management
推薦閱讀
- Clojure Programming Cookbook
- Java程序設計(慕課版)
- Oracle 11g從入門到精通(第2版) (軟件開發視頻大講堂)
- ASP.NET Core Essentials
- BeagleBone Media Center
- Creating Stunning Dashboards with QlikView
- PHP從入門到精通(第4版)(軟件開發視頻大講堂)
- Create React App 2 Quick Start Guide
- Buildbox 2.x Game Development
- Python Machine Learning Blueprints:Intuitive data projects you can relate to
- Go語言從入門到精通
- IPython Interactive Computing and Visualization Cookbook
- 深入淺出Python數據分析
- Python數據可視化之matplotlib實踐
- Python深度學習與項目實戰