There are multiple different access control schemes that can be implemented within an organization. Which type of scheme restricts access based on sensitivity levels and is typically associated with the military?
Attacks, Threats, and Vulnerabilities | |
Architecture and Design | |
Implementation | |
Operations and Incident Response | |
Governance, Risk, and Compliance |