What term refers to a holistic approach to IT security including diversification of vendors, controls (both administrative and technical) and user training?
Threats, Attacks and Vulnerabilities | |
Technologies and Tools | |
Architecture and Design | |
Identity and Access Management | |
Risk Management | |
Cryptography and PKI |