Used words
Security
Architecture
Network
Security:
Firewalls
Secure
Access
Controls:
Identity
and
Management
(IAM)
&
Multi-Factor
Authentication
(MFA)
Data
Encryption:
Full
Disk
Encryption
SSL
/
TLS
Endpoint
Antivirus
Anti-Malware
Software
Detection
Response
(EDR)
Incident
Management:
Plan
Procedures
Information
Event
(SIEM)
:
Collect
analyze
log
data
compliance
management.
Physical
Control
Systems:
Surveillance
Cameras:
CCTV/NVR
Application
-
Code
Review
Static
Analysis
Web
(WAF)
–
OWASP.
Awareness
Training:
Sending
regular
Mailers
to
all.
Phishing
Simulations:
enhance
awareness
on
social
engineering
attacks.
Classification
Handling:
Policy
Loss
Prevention
(DLP):
DLP
tools
monitor
prevent
unauthorized
transfers
PII.
Compliance
Auditing:
Regular
Periodic
security
audits
ensures
with
protection
laws
regulations
Vulnerability
Scanning:
Automated
vulnerability
scanning
tools.
Patch
Identify
apply
patches/firmware
upgrades
servers
/PC’s.
Create your own