Assets – The data associated and need to protect
Data Security – Protects the storage and transfer of data
EndPoints Security – Protect connection between devices and network
Application Security – access to application, access to network and Internal security
Network Security – Protect organization network from unauthorized network
Perimeter Security – Controls include physical and digital security methodologies
Human Layer – Access management controls and protect mission critical assets from human threats
Leave a comment