IAD’s Top 10 Information Assurance Mitigation Strategies

Abstract: Provides guidance for organizations to secure and manage networks, thus making the networks defensible, and recommends proactive mitigation advice to counter cyber threats.

Date Published:

Last Reviewed: 10 February 2016

Identifier: MFS-U-OO-814950-15

Creator: Vulnerability Solutions

Dissemination Control: N/A

Length: 2 page(s)

Format: pdf

Type: Reference/Overview; Factsheet

Tags: Mitigations; Top Mitigation Strategies; Application Whitelisting; Privileges; Communication; Host Intrusion Prevention System - HIPS; Network; Anti-Virus; Baseline; Domain Name System - DNS; Software; Anti-Exploitation