0.4 / INTERNET AND WEB RESOURCES 5The 10 domains are as follows:• Acce terjemahan - 0.4 / INTERNET AND WEB RESOURCES 5The 10 domains are as follows:• Acce Bahasa Indonesia Bagaimana mengatakan

0.4 / INTERNET AND WEB RESOURCES 5T

0.4 / INTERNET AND WEB RESOURCES 5
The 10 domains are as follows:
• Access control: A collection of mechanisms that work together to create a
security architecture to protect the assets of the information system.
• Application development security: Addresses the important security concepts
that apply to application software development. It outlines the environment
where software is designed and developed and explains the critical role software
plays in providing information system security.
• Business continuity and disaster recovery planning: For the preservation and
recovery of business operations in the event of outages.
• Cryptography: The principles, means, and methods of disguising information
to ensure its integrity, confidentiality, and authenticity.
• Information security governance and risk management: The identification
of an organization’s information assets and the development, documentation,
and implementation of policies, standards, procedures, and guidelines.
Management tools such as data classification and risk assessment/analysis are
used to identify threats, classify assets, and to rate system vulnerabilities so
that effective controls can be implemented.
• Legal, regulations, investigations and compliance: Computer crime laws and
regulations. The measures and technologies used to investigate computer
crime incidents.
• Operations security: Used to identify the controls over hardware, media,
and the operators and administrators with access privileges to any of these
resources. Audit and monitoring are the mechanisms, tools, and facilities that
permit the identification of security events and subsequent actions to identify
the key elements and report the pertinent information to the appropriate individual,
group, or process.
• Physical (environmental) security: Provides protection techniques for the
entire facility, from the outside perimeter to the inside office space, including
all of the information system resources.
• Security architecture and design: Contains the concepts, principles, structures,
and standards used to design, monitor, and secure operating systems, equipment,
networks, applications, and those controls used to enforce various levels
of availability, integrity, and confidentiality.
• Telecommunications and network security: Covers network structures; transmission
methods; transport formats; security measures used to provide availability,
integrity, and confidentiality; and authentication for transmissions over
private and public communications networks and media.
In this book, we cover each of these domains in some depth.
0.4 INTERNET AND WEB RESOURCES
There are a number of resources available on the Internet and the Web to support
this book and to help one keep up with developments in this field.
0/5000
Dari: -
Ke: -
Hasil (Bahasa Indonesia) 1: [Salinan]
Disalin!
0.4 / INTERNET AND WEB RESOURCES 5
The 10 domains are as follows:
• Access control: A collection of mechanisms that work together to create a
security architecture to protect the assets of the information system.
• Application development security: Addresses the important security concepts
that apply to application software development. It outlines the environment
where software is designed and developed and explains the critical role software
plays in providing information system security.
• Business continuity and disaster recovery planning: For the preservation and
recovery of business operations in the event of outages.
• Cryptography: The principles, means, and methods of disguising information
to ensure its integrity, confidentiality, and authenticity.
• Information security governance and risk management: The identification
of an organization’s information assets and the development, documentation,
and implementation of policies, standards, procedures, and guidelines.
Management tools such as data classification and risk assessment/analysis are
used to identify threats, classify assets, and to rate system vulnerabilities so
that effective controls can be implemented.
• Legal, regulations, investigations and compliance: Computer crime laws and
regulations. The measures and technologies used to investigate computer
crime incidents.
• Operations security: Used to identify the controls over hardware, media,
and the operators and administrators with access privileges to any of these
resources. Audit and monitoring are the mechanisms, tools, and facilities that
permit the identification of security events and subsequent actions to identify
the key elements and report the pertinent information to the appropriate individual,
group, or process.
• Physical (environmental) security: Provides protection techniques for the
entire facility, from the outside perimeter to the inside office space, including
all of the information system resources.
• Security architecture and design: Contains the concepts, principles, structures,
and standards used to design, monitor, and secure operating systems, equipment,
networks, applications, and those controls used to enforce various levels
of availability, integrity, and confidentiality.
• Telecommunications and network security: Covers network structures; transmission
methods; transport formats; security measures used to provide availability,
integrity, and confidentiality; and authentication for transmissions over
private and public communications networks and media.
In this book, we cover each of these domains in some depth.
0.4 INTERNET AND WEB RESOURCES
There are a number of resources available on the Internet and the Web to support
this book and to help one keep up with developments in this field.
Sedang diterjemahkan, harap tunggu..
Hasil (Bahasa Indonesia) 2:[Salinan]
Disalin!
0,4 / INTERNET DAN WEB SUMBER 5
10 domain adalah sebagai berikut:
• Kontrol akses: Sebuah koleksi mekanisme yang bekerja sama untuk menciptakan
. arsitektur keamanan untuk melindungi aset sistem informasi
• keamanan pengembangan aplikasi: Alamat konsep keamanan penting
yang berlaku untuk pengembangan perangkat lunak aplikasi. Ini menjelaskan lingkungan
di mana perangkat lunak ini dirancang dan dikembangkan dan menjelaskan perangkat lunak peran penting
bermain dalam menyediakan sistem keamanan informasi.
• kelangsungan bisnis dan pemulihan bencana perencanaan: Untuk pelestarian dan
. pemulihan operasi bisnis dalam hal pemadaman
• Kriptografi: Prinsip-prinsip , berarti, dan metode menyamarkan informasi
untuk memastikan integritas, kerahasiaan, dan keaslian.
• tata keamanan informasi dan manajemen risiko: Identifikasi
aset informasi organisasi dan pengembangan, dokumentasi,
dan implementasi kebijakan, standar, prosedur, dan pedoman .
alat manajemen seperti klasifikasi data dan penilaian risiko / analisis yang
digunakan untuk mengidentifikasi ancaman, mengklasifikasikan aset, dan untuk menilai kerentanan sistem sehingga
bahwa kontrol yang efektif dapat diimplementasikan.
• Hukum, peraturan, investigasi dan kepatuhan: hukum dan kejahatan Komputer
peraturan. Langkah-langkah dan teknologi yang digunakan untuk menyelidiki komputer
insiden kejahatan.
• Operasi Keamanan: Digunakan untuk mengidentifikasi kontrol atas hardware, media,
dan operator dan administrator dengan hak akses ke salah satu dari
sumber daya. Audit dan pemantauan adalah mekanisme, peralatan, dan fasilitas yang
memungkinkan identifikasi peristiwa keamanan dan tindakan selanjutnya untuk mengidentifikasi
elemen kunci dan melaporkan informasi yang berkaitan dengan yang sesuai individu,
kelompok, atau proses.
• Fisik (lingkungan) keamanan: Memberikan perlindungan teknik untuk
seluruh fasilitas, dari perimeter luar ke dalam ruang kantor, termasuk
. semua sumber daya sistem informasi
• Keamanan arsitektur dan desain: Berisi konsep, prinsip, struktur,
dan standar yang digunakan untuk merancang, memantau, dan sistem operasi yang aman , peralatan,
jaringan, aplikasi, dan kontrol-kontrol yang digunakan untuk menegakkan berbagai tingkat
. ketersediaan, integritas, dan kerahasiaan
• Telekomunikasi dan keamanan jaringan: Meliputi struktur jaringan; transmisi
metode; format transportasi; langkah-langkah keamanan yang digunakan untuk menyediakan ketersediaan,
integritas, dan kerahasiaan; dan otentikasi untuk transmisi melalui
jaringan komunikasi pribadi dan publik dan media.
Dalam buku ini, kita menutupi masing-masing domain secara mendalam.
0,4 INTERNET DAN WEB SUMBER
Ada sejumlah sumber daya yang tersedia di Internet dan Web untuk mendukung
buku ini dan untuk membantu satu mengikuti perkembangan di bidang ini.
Sedang diterjemahkan, harap tunggu..
 
Bahasa lainnya
Dukungan alat penerjemahan: Afrikans, Albania, Amhara, Arab, Armenia, Azerbaijan, Bahasa Indonesia, Basque, Belanda, Belarussia, Bengali, Bosnia, Bulgaria, Burma, Cebuano, Ceko, Chichewa, China, Cina Tradisional, Denmark, Deteksi bahasa, Esperanto, Estonia, Farsi, Finlandia, Frisia, Gaelig, Gaelik Skotlandia, Galisia, Georgia, Gujarati, Hausa, Hawaii, Hindi, Hmong, Ibrani, Igbo, Inggris, Islan, Italia, Jawa, Jepang, Jerman, Kannada, Katala, Kazak, Khmer, Kinyarwanda, Kirghiz, Klingon, Korea, Korsika, Kreol Haiti, Kroat, Kurdi, Laos, Latin, Latvia, Lituania, Luksemburg, Magyar, Makedonia, Malagasi, Malayalam, Malta, Maori, Marathi, Melayu, Mongol, Nepal, Norsk, Odia (Oriya), Pashto, Polandia, Portugis, Prancis, Punjabi, Rumania, Rusia, Samoa, Serb, Sesotho, Shona, Sindhi, Sinhala, Slovakia, Slovenia, Somali, Spanyol, Sunda, Swahili, Swensk, Tagalog, Tajik, Tamil, Tatar, Telugu, Thai, Turki, Turkmen, Ukraina, Urdu, Uyghur, Uzbek, Vietnam, Wales, Xhosa, Yiddi, Yoruba, Yunani, Zulu, Bahasa terjemahan.

Copyright ©2024 I Love Translation. All reserved.

E-mail: