Defenses
Computer access control.
Application security.
Antivirus software
Secure coding
Secure by default
Secure by design
Secure operating systems
Authentication.
Multi-factor authentication
Authorization.
Data-centric security.
Encryption.
Firewall.
Intrusion detection system.
Mobile secure gateway.
Runtime application self-protection (RASP).
Last updated