Defenses

Computer access control.

Application security.

  • Antivirus software

  • Secure coding

  • Secure by default

  • Secure by design

  • Secure operating systems

Authentication.

  • Multi-factor authentication

Authorization.

Data-centric security.

Encryption.

Firewall.

Intrusion detection system.

Mobile secure gateway.

Runtime application self-protection (RASP).

Last updated