Business Studies, asked by prasanthhari39155, 2 months ago

controls over information​

Answers

Answered by itzPapaKaHelicopter
2

Monitoring• User access – failed login attempts• Unauthorized access attempts through firewalls, routers & VPN• System usage – thresholds• Is someone monitoring, reporting & remediating.

 \\  \\  \\  \\  \\ \sf \colorbox{gold} {\red(ANSWER ᵇʸ ⁿᵃʷᵃᵇ⁰⁰⁰⁸}

Answered by akkhansa
0

Explanation:

Monitoring• User access – failed login attempts• Unauthorized access attempts through firewalls, routers & VPN• System usage – thresholds• Is someone monitoring, reporting &

Similar questions