Channels
uber
SSIDS
Security protocols
Some scanning attempts are intrusive while some are non-intrusive.
Some scanning attempts may be credentialed while some may be non-credentialed.
False positive is possible!
Safer scanning
More accurate results
Customized auditing
The private key is lost by a user.
The former is primarily for third party access to data
The latter is primarily for helping internal users
security policy
virus
56
(non-disclosure) pact
quarterly
Andragogical
Acceptable use policy
After monthly patch updates.
Access to resources
Policies identify what tools and procedures are needed.
Balance protection with productivity.
resistance
technical
Live boot media
Deterrent control
Social media sites use popup ads.
Elasticity
SLE
Policies communicate a unanimous agreement of judgment.
MTTR
Employees should not give out their company email address unless requested.
Guideline
Qualitative risk calculation
MOU
Privilege management
External threat