Skip to main content

The Security Cycle

This article from 2013 describes some basic steps to take when securing a network. (CSC: Inventory of Authorized and Unauthorized Devices)

Language
Persian
ILR Level
2+/3
ACTFL Proficiency
Superior
Material Type
Language Learning Object
Modality
Reading
Topic
Defense/Security
Learning Objectives
Maintenance & Improvement
Publication Year
2014
LLO Logo