This core principle of information security ensures information is available only to authorized persons.
What is confidentiality
This type of information must be encrypted when transmitted.
What is protected Personally Identifiable Information (PII)
This device helps when you're concerned about protecting your network from networks-based attacks.
What is anomaly based IDS
This core principle of information security ensures information is not accidentally or maliciously changed
What is integrity
These types of devices must have whole disk encryption.
What are mobile devices and/or laptops
You should use this policy when you want to implement a new device on the network.
What is change management plan
This core principle of information security ensures computers and information are effective in supporting the mission.
What is availability
This tool can be used on a server to check for weak passwords.
What is John the Ripper
This access control list should be placed as close to the source as possible.
What is an extended acl