The document defines and describes several key terms used in information security including infrastructure, framework, implementation, evaluation, behavior, review, media, and case of rados. It provides definitions for each term in a hierarchical outline format with multiple levels of sub-points.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
23 views24 pages
In Dice
The document defines and describes several key terms used in information security including infrastructure, framework, implementation, evaluation, behavior, review, media, and case of rados. It provides definitions for each term in a hierarchical outline format with multiple levels of sub-points.