Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: l with the description. (2 points) A. Authentication B. Authorization C. Defense - in- Depathth D. Demilitarized zone (DMZ) E. Encryption F. Firewall G. Host and application hardening H. Log analysis I. Packet filtering J. Privacy policy K. Router L. Training ________ The process of transforming normal text, called plaintext, into unreadable gibberish, called ciphertext. ________ Restricting access of users to specific portions of the system as well as specific tasks ________ The process of turni...
View Full Document

{[ snackBarMessage ]}

Ask a homework question - tutors are online