- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 103字
- 2021-06-30 19:15:45
Data
As we finished the previous section talking about data, we should ensure that data is always protected regardless of its current state (in transit or at rest). There will be different threats according to the data's state. The following are some examples of potential threats and countermeasures:
These are only some examples of potential threats and suggested countermeasures. A deeper analysis must be performed to fully understand the data path according to the customer's needs. Each customer will have their own particularities regarding data path, compliance, rules, and regulations. It is critical to understand these requirements even before the project is started.
推薦閱讀
- Kubernetes修煉手冊
- 樂學Windows操作系統(tǒng)
- 大學計算機應用基礎(chǔ)實踐教程(Windows 7+Office 2013)
- 網(wǎng)絡(luò)操作系統(tǒng):Windows Server 2003管理與應用
- WindowsServer2012Hyper-V虛擬化部署與管理指南
- 循序漸進學Docker
- 混沌工程:復雜系統(tǒng)韌性實現(xiàn)之道
- Linux操作系統(tǒng)應用編程
- AutoCAD 2014中文版從入門到精通
- Mastering Reactive JavaScript
- OpenStack系統(tǒng)架構(gòu)設(shè)計實戰(zhàn)
- 云原生落地:產(chǎn)品、架構(gòu)與商業(yè)模式
- 從零開始學安裝與重裝系統(tǒng)
- OpenHarmony開發(fā)與實踐:基于紅莓RK2206開發(fā)板
- Learning IBM Watson Analytics