概要
安全技术 | 安全架构 | 安全策略 | 安全管理 | 软件的脆弱性 |
---|---|---|---|---|
加密技术(Encryption Technology) | 安全域架构(Security Domain Architecture) | 访问控制策略(Access Control Policy) | 信息安全管理体系(Information Security Management System, ISMS) | 缓冲区溢出(Buffer Overflow) |
防火墙(Firewall) | 分层安全架构(Layered Security Architecture) | 数据加密策略(Data Encryption Policy) | 风险管理(Risk Management) | SQL注入(SQL Injection) |
入侵检测和防御系统(IDS/IPS, Intrusion Detection/Prevention Systems) | 零信任架构(Zero Trust Architecture) | 密码策略(Password Policy) | 事件管理(Incident Management) | 跨站脚本(XSS, Cross-Site Scripting) |
反病毒和反恶意软件(Antivirus and Anti-Malware) | 基于风险的安全架构(Risk-Based Security Architecture) | 备份和恢复策略(Backup and Recovery Policy) | 访问控制(Access Control) | 跨站请求伪造(CSRF, Cross-Site Request Forgery) |
访问控制(Access Control) | 事件响应架构(Incident Response Architecture) | 安全事件响应策略(Incident Response Policy) | 培训与意识(Training and Awareness) | 未授权访问(Unauthorized Access) |
公钥基础设施(PKI, Public Key Infrastructure) | 加密和密钥管理架构(Encryption and Key Management Architecture) | 移动设备安全策略(Mobile Device Security Policy) | 合规管理(Compliance Management) | 配置错误(Configuration Errors) |
虚拟专用网络(VPN, Virtual Private Network) | 合规与审计架构(Compliance and Audit Architecture) | 使用政策(Acceptable Use Policy) | 供应链安全管理(Supply Chain Security Management) | 敏感数据泄露(Sensitive Data Exposure) |
数据丢失防护(DLP, Data Loss Prevention) | 端点安全架构(Endpoint Security Architecture) | 物理安全策略(Physical Security Policy) | 数据保护(Data Protection) | 不安全的依赖项(Insecure Dependencies) |
安全信息和事件管理(SIEM, Security Information and Event Management) | 数据丢失防护架构(Data Loss Prevention Architecture, DLP) | 第三方访问策略(Third-Party Access Policy) | 物理安全(Physical Security) | |
多因素认证(MFA, Multi-Factor Authentication) | 身份与访问管理架构(Identity and Access Management Architecture, IAM) | 员工培训和意识策略(Security Training and Awareness Policy) | 持续改进(Continuous Improvement) | |
端点检测和响应(EDR, Endpoint Detection and Response) | ||||
云安全技术(Cloud Security Technologies) | ||||
区块链技术(Blockchain Technology) | ||||
威胁情报(Threat Intelligence) |
信息安全技术(Information Security Technology)
信息安全技术(Information Security Technology)是用于保护信息和信息系统免受各种威胁和攻击的一系列技术措施。它们旨在确保信息的机密性