September 2007
Intermediate to advanced
370 pages
13h 58m
English
1. Critical information assets that are electronically available only on individual machines are not the subject of this survey. Critical information assets include proprietary data, databases, trade secrets, human resources data, cost data, and other similar information.
2. All critical information assets accessible via networks (not media stored in repositories) are the subject of this survey.
3. The purpose of this survey is to collect preliminary information on the cyber protections at each site. These are categorized as:
a. Detection or Entry Control, such as
i. Passwords
ii. Sniffers
iii. Audits
iv. Real-time monitoring
v. Intrusion Detection System software
b. Delay, such as
i. Encryption
Read now
Unlock full access