Secure Engineering & Architecture

Mechanisms exist to implement security safeguards to protect system memory from unauthorized code execution.


Login

Secure Engineering & Architecture

Level N/A

Mechanisms exist to utilize honeypots that are specifically designed to be the target of malicious attacks for the purpose of detecting, deflecting and analyzing such attacks.


Login

Secure Engineering & Architecture

Level N/A

Mechanisms exist to utilize honeyclients that proactively seek to identify malicious websites and/or web-based malicious code.


Login

Secure Engineering & Architecture

Level N/A

Mechanisms exist to utilize a diverse set of technologies for system components to reduce the impact of technical vulnerabilities from the same Original Equipment Manufacturer (OEM).


Login

Secure Engineering & Architecture

Mechanisms exist to utilize virtualization techniques to support the employment of a diversity of operating systems and applications.


Login

Secure Engineering & Architecture

Mechanisms exist to utilize concealment and misdirection techniques for systems to confuse and mislead adversaries.


Login

Secure Engineering & Architecture

Level N/A

Automated mechanisms exist to introduce randomness into organizational operations and assets.


Login

Secure Engineering & Architecture

Automated mechanisms exist to change the location of processing and/or storage at random time intervals.


Login

Secure Engineering & Architecture

Mechanisms exist to distribute processing and storage across multiple physical locations.


Login

Secure Engineering & Architecture

Mechanisms exist to utilize non-modifiable executable programs that load and execute the operating environment and applications from hardware-enforced, read-only media.


Login