Top Ten IA Mitigations

Abstract: Learn about how NSA’s Top 10 Information Assurance Mitigations obstruct the intrusion lifecycle into networks and have been applied in response to real intrusions in order to mitigate the threat techniques used.

Date Published:

Last Reviewed: 20 October 2016

Dissemination Control: N/A

Length: 11 page(s)

Format: pdf

Type: Reference/Overview; Presentation

Tags: IAS 2016; Information Assurance - IA; Information Technology - IT; Cybersecurity; Network Security; Defend; Mitigations