Key Points

 < Day Day Up > 

  • The concept of least privilege advocates that the most restricted amount of access to resources is the best. The best security posture, then, is Default DENY.

  • Security should be deployed in layers to thwart attackers. This is known as defense in depth.

  • Different techniques should be used together to cause attackers to change strategies constantly. This is known as diversity of defense.

  • Encryption, or the act of encoding information to make it impossible to read, is one of the most common methods of protecting data.

  • Typical types of attack modes are man-in-the-middle (with or without replay), denial of service, and the exploitation of programming errors.

  • Probably the most common form of security breach is the virus or Trojan horse. These are malicious programs that hide from the user and damage or steal data.

     < Day Day Up > 


    Data Protection and Information Lifecycle Management
    Data Protection and Information Lifecycle Management
    ISBN: 0131927574
    EAN: 2147483647
    Year: 2005
    Pages: 122

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net