Donny Koh

6%
Flag icon
Numerous countermeasures can help ensure confidentiality against possible threats. These include encryption, network traffic padding, strict access control, rigorous authentication procedures, data classification, and extensive personnel training.
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
Rate this book
Clear rating