What procedure is applied to run security objects?

devquora
devquora

Posted On: Feb 22, 2018

 

Different security objects are run with the assistance of Key Performance Indicators (KPI). For example in case of a Windows Patch, if the KPI agreed is 99%, it means that 99% of the computers will have the latest patch within a duration of one month of its release.

    Related Questions

    Please Login or Register to leave a response.

    Related Questions

    Cyber Security Interview Questions

    What is risk, vulnerability and threat?

    Start by explaining vulnerability, and threat and lastly risk...

    Cyber Security Interview Questions

    Differentiate between Asymmetric and Symmetric encryption.

    Asymmetric encryption utilizes different keys for encryption and decryption process...