• Focuses on protecting information and systems. It includes
    • confidentiality and integrity of data
    • managing who can do what under privilege management
    • protecting systems
    • controls to detect security events
Menu