Evaluate the design, implementation and monitoring of logical access controls to ensure the confidentiality, integrity, availability and authorized use of information assets.

 
  • 评估逻辑访问控制的设计、实施和监控,确保信息资产的机密性、完整性、有效性和经授权地使用。
今日热词
目录 附录 查词历史