Defines the set of capabilities that support the protection of an organization's hardware/software and related assets.
- Access Control
Defines the set of capabilities that support the management of permissions for logging onto a computer or network.
- Audit Trail Capture and Analysis
Defines the set of capabilities that support the identification and monitoring of activities within an application or system.
- Digital Signature
Defines the set of capabilities that guarantee the unaltered state of a file.
- Encryption
Defines the set of capabilities that support the encoding of data for security purposes.
- Identification and Authentication
Defines the set of capabilities that support obtaining information about those parties attempting to log on to a system or application for security purposes and the validation of those users.
- Intrusion Detection
Defines the set of capabilities that support the detection of illegal entrance into a computer system.
- Role / Privilege Management
Defines the set of capabilities that support the granting of abilities to users or groups of users of a computer, application or network.
- User Management
Defines the set of capabilities that support the administration of computer, application and network accounts within an organization.
- Verification
Defines the set of capabilities that support the confirmation of authority to enter a computer system, application or network.