Which principle states that users should have access only to the specific data and resources needed to perform required tasks?
Which is related to privacy?
A security event in which an intruder gains or attempts unauthorized access to a system is called:
Which access control method uses attributes and rules evaluated by a central Policy Decision Point (PDP)?
What is the potential impact of an IPSec replay attack?
What principle states that individuals should only have the minimum set of permissions necessary to carry out their job functions?
What does Personally Identifiable Information (PII) pertain to?
A weighted factor based on the probability that a threat will exploit a vulnerability is called:
Which document provides a high-level overview of a Disaster Recovery Plan?
Limiting access based on data sensitivity and user authorization is known as: