- Architecting the Industrial Internet
- Shyam Nath Robert Stackowiak Carla Romano
- 68字
- 2021-07-02 23:59:24
Security considerations for the usage viewpoint
Following are the security considerations for implementing the usage viewpoint:
- Security monitoring continuously collects security-related data from events or activities, and analyzes it for security risks
- Security auditing collects, stores, and analyzes security-related information
- Security policy defines the usage and constraints for each user, role, and component
- Cryptographic support management stores, manages, grants, and revokes secure credentials, and provides global key management
推薦閱讀
- 大話PLC(輕松動漫版)
- Docker技術入門與實戰(第3版)
- Building a RESTful Web Service with Spring
- SQL Server 2012數據庫技術及應用(微課版·第5版)
- Scratch 3游戲與人工智能編程完全自學教程
- TypeScript實戰指南
- Eclipse Plug-in Development:Beginner's Guide(Second Edition)
- Spring Boot企業級項目開發實戰
- Clojure Reactive Programming
- 精通MATLAB(第3版)
- Building RESTful Python Web Services
- Go語言精進之路:從新手到高手的編程思想、方法和技巧(2)
- IBM Cognos Business Intelligence 10.1 Dashboarding cookbook
- Django Design Patterns and Best Practices
- 遠方:兩位持續創業者的點滴思考