Description
In this module, you learn about limiting access, sharing sensitive information, protecting data, and securing systems. You will gain an understanding of the need-to-know principle, giving minimal access to users, separating different responsibilities, having multiple people control important tasks, and safeguarding information through methods like secret sharing and split knowledge. You will also review approaches like defense in depth, validating inputs, hiding data, and using encryption to keep information safe. Finally, you will cover concepts like layering and simplifying mechanisms for better security.
Risk Management Framework Mission-Business Prepare Step
Risk Management Framework Organizational Roles and Responsibilities
Risk Documentation
Physical Site Design
Risk Management Framework System Roles and Responsibilities
Legal and Ethical Requirements
Introduction to Risk


