Unauthorized Usage/Access

 1.Unauthorized usage/access can involve authorized user attempting unauthorized access or unauthorized user attempting access.

 2.Solved by

 + Data classification

 + Strong Authentication

 + Information Rights Management

 + Encryption

 + Obfuscation,anonymization,tokenization and masking

 + Data Loss Prevention (DLP) system

 + TPM

 + Anti-Malware

 + Proper treatment or sanitization of data at end at life cycle.

 + Monitoring

Post a Comment

0 Comments