Saturday, 24 December 2016

security fundamentals

vulnerabilities, threat, risk and controls relationship
Asset and risk identification
Confidentiality, integrity and availability
Authentication, authorisation and accounting
Policy, procedures, guidelines and standards
IT security versus application security versus and information security
Encryption/decryption/public key infrastructure
Ecommerce security issues and solutions

No comments:

Post a Comment