System and Information Integrity activities
ensure technology assets (e.g.,
desktops, software) that contain Controlled Unclassified Information (CUI) are
continuously monitored to detect violations of the authorized security state.
Further, electronic mail (e-mail), a common
attack vector, is monitored and protected to detect malicious activity.
This course will cover:
·
Objective
·
Levels and Practices
·
Readiness Checklist System and
Information Integrity
·
Sample Policy System and
Information Integrity
·
Sample Artifacts System and
Information Integrity
·
Quiz