One classification of data running for a set time
Access approval clearance for all users or nondisclosure agreements
Need-to-know for all information within the system
Direct access only to the system
A physical control
A logical control
A compensating control
An administrative control
Applying journalized transactions to an earlier copy of a database
Having a mirror copy of the database in case of interruption
Doing hourly backups of the database to prevent failure
Having all transactions recorded in a transaction file and updated in batch mode at a later time
High-security defense model
Deterrent-based security model
Layered defense model
Trusted systems security model
Be quickly achieved
Take a long time
Ensure a separation of responsibilities
Not involve vendors
Call law enforcement.
Terminate the employee.
Set up awareness training.
Review organizational policy.