August 2018
Beginner
594 pages
22h 33m
English
Technical security controls utilize technology to provide security for a software system. These controls are implemented through technical solutions such as software, firmware, or hardware. We will discuss some of the technical security controls available to us later in this chapter, but examples include the use of encryption, hashing, authentication, authorization, logging, monitoring, utilizing proper communication protocols, hardware/network protection, and database security.