expand for answer

URL (uniform resource locator)

An address for a specific Web page or document within a Web site.


Similar items:
Method by which the reference monitor mediates accesses to an information system resource. Resource is protected and not directly accessible by a subject. Satisfies requirement for accurate auditing of resource usage.
[view]
Stores the document in a central location and automatically asks the knowledge workers to access the document when it is their turn to edit the document.
[view]
Technical document describing interface controls and identifying the authorities and responsibilities for ensuring the operation of such controls. This document is baselined during the preliminary design review and is maintained throughout the information system lifecycle.
[view]
<p>Original Publication: <a target="_blank" href="https://cloudsecurityalliance.org/guidance">https://cloudsecurityalliance.org/guidance</a> <br>Original Document: <a target="_blank" href="https://downloads.cloudsecurityalliance.org/assets/research/security-guidance/security-guidance-v4-FINAL.pdf">https://downloads.cloudsecurityalliance.org/assets/research/security-guidance/security-guidance-v4-FINAL.pdf</a> <br></p><p>The issue with Original Document, is that it's not very Kindle compatible and is very hard on eyes. Document below has improved contrast and is easier to read.</p><p><strong>Kindle-Compatible PDF:<br></strong> <a target="_blank" href="https://www.sunflower-cissp.com/downloads/security-guidance-v4-FINAL/security-guidance-v4-FINAL_Sunflower.pdf">https://www.sunflower-cissp.com/downloads/security-guidance-v4-FINAL/security-guidance-v4-FINAL_Sunflower.pdf</a> <br><br></p><p><strong>File in DOCX format:<br></strong> <a target="_blank" href="https://www.sunflower-cissp.com/downloads/security-guidance-v4-FINAL/security-guidance-v4-FINAL_Sunflower.docx">https://www.sunflower-cissp.com/downloads/security-guidance-v4-FINAL/security-guidance-v4-FINAL_Sunflower.docx</a> </p>
[view]
A label that is applied to a resource to indicate its sensitivity or value to an organization and therefore designate the level of security necessary to protect that resource. The determination that certain information requires protection against unauthorized disclosure in the interest of national security, coupled with the designation of the level of classification Top Secret, Secret, or Confidential.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in