Description
The organization:
Supplemental
Information system entry and exit points include, for example, firewalls, electronic mail servers, web servers, proxy servers, remote-access servers, workstations, mobile devices, and notebook/laptop computers. Spam can be transported by different means including, for example, electronic mail, electronic mail attachments, and web accesses. Spam protection mechanisms include, for example, signature definitions.
Reference Item Details
Related: AT-2,AT-3,SC-5,SC-7,SI-3
Category: SYSTEM AND INFORMATION INTEGRITY
Family: SYSTEM AND INFORMATION INTEGRITY
Baseline Impact: MODERATE,HIGH