term1 Definition1term2 Definition2term3 Definition3
Please sign in to your Google account to access your documents:
Confidentiality Counter measures
Encryption, Network Traffic Padding,Strict Access Control, Rigorous Authentication procedures,data classification, extensive personnel training
CONFIDENTIALITY Breaches
Failing to properly encrypt a transmission,failing to fully authenticate a remote system before transmitting data, leaving open secured access points,accessing malicious code that opens backdoor, misrouted faxes, documents left on printers, walking away from access terminal while data is displayed on monitor.
Other concepts of confidentiality
Need help typing ? See our FAQ (opens in new window)
Please sign in to create this set. We'll bring you back here when you are done.
Discard Changes Sign in
Please sign in to add to folders.
Sign in
Don't have an account? Sign Up »
You have created 2 folders. Please upgrade to Cram Premium to create hundreds of folders!