Information Technology Reference
In-Depth Information
16.13 Use of cryptography
16.14 Public access protections
16.15 Collaborative computing
16.16 Transmission of security parameters
16.17 Public key infrastructure certificates
16.18 Mobile code
16.19 Voice-over-Internet protocol
16.20 Secure name/address resolution service (authoritative source)
16.21 Secure name/address resolution service (recursive or caching resolver)
16.22 Architecture and provisioning for name/address resolution service
16.23 Session authenticity
17. System and information integrity
17.1 System and information integrity policy and procedures
17.2 Flaw remediation
17.3 Malicious code protection
17.4 Information system monitoring tools and techniques
17.5 Security alerts and advisories
17.6 Security functionality verification
17.7 Software and information integrity
17.8 Spam protection
17.9 Information input restrictions
17.10
Information accuracy, completeness, validity, and authenticity
17.11
Error handling
17.12
Information output handling and retention
Search WWH ::




Custom Search