WARNING:
JavaScript is turned OFF. None of the links on this concept map will
work until it is reactivated.
If you need help turning JavaScript On, click here.
This Concept Map, created with IHMC CmapTools, has information related to: SCIS_12F8W2_C693XP71_TG_Week2_Draft_v3, Controls Uses Data Security, Data Backups Provide Redundancy, Acquisition Identification which may lead to Preliminary IT Due Diligence, Detailed IT Due Diligence which includes IT Vendor Management, Network Defense Via Scheduled Auditing, Software Testing Guarantees SDLC Continuation, Threats Like Natural Disasters, Unified Electronic Health Records Such as Tertiary Hospital, Network Integrity Through Network Security, Metrics Track Performance, Network Defense Via Hardening/Patching, Encryption Uses Full Disk Encryption, Redundancy Enhances Database Security, Queries Saved as Stored Procedures, Network Security Uses DLP, Distributed Database Management System Provides Redundancy, Unified Electronic Health Records Such as Primary Care Clinic, Threats Like Manmade disasters, Firewalls Uses Stateful Inspection, Distributed Database Management System Uses Role-based Access Control