To access: Get File: Top Ten IA Mitigations
Abstract: Learn about how NSA’s Top 10 Information Assurance Mitigations obstruct the intrusion lifecycle into networks and have been applied in response to real intrusions in order to mitigate the threat techniques used.
Date Published: 21 November 2016
Last Reviewed: 20 October 2016
Dissemination Control: N/A
Length: 11 page(s)