A non-government or contractor system is an unclassified information system owned or operated by or for a contractor, which may process, store,...
READ MOREWhat is the compromise of information?
by Charles Fike | Nov 3, 2021
Compromise means disclosure of information to unauthorized persons or a violation of the security policy of a system, in which unauthorized...
READ MOREWhat is meant by adequate security?
by Charles Fike | Nov 3, 2021
Adequate security means protective measures commensurate with the consequences and probability of loss, misuse, or unauthorized access to or...
READ MOREWhat is MFA (Multifactor Authentication)?
by Charles Fike | Nov 3, 2021
MFA is Multifactor Authentication; it is a means of user authentication. In general, there are three ways to authenticate a user. First is...
READ MOREWhat is Cyber Hygiene?
by Charles Fike | Nov 3, 2021
Cyber hygiene is the activities taken to reduce the risk of compromise or cyber incidents. These activities include inventorying hardware and...
READ MORE