WARNING:
JavaScript is turned OFF. None of the links on this concept map will
work until it is reactivated.
If you need help turning JavaScript On, click here.
This Concept Map, created with IHMC CmapTools, has information related to: SCIS_12F8W2_C693XP71_TG_Week2_Draft_v4, Controls Uses Data Security, Acquisition Identification which may lead to Preliminary IT Due Diligence, Data Backups Provide Redundancy, Detailed IT Due Diligence which includes IT Vendor Management, Network Defense Via Scheduled Auditing, Software Testing Guarantees SDLC Continuation, Threats Like Natural Disasters, Network Integrity Through Network Security, Unified Electronic Health Records Such as Tertiary Hospital, Network Defense Via Hardening/Patching, Metrics Track Performance, Encryption Uses Full Disk Encryption, Queries Saved as Stored Procedures, Redundancy Enhances Database Security, Distributed Database Management System Provides Redundancy, Network Security Uses DLP, Distributed Database Management System Uses Role-based Access Control, Firewalls Uses Stateful Inspection, Threats Like Manmade disasters, Unified Electronic Health Records Such as Primary Care Clinic