CIS 560 WEEK 7 DISCUSSION
"Implementing Access Control" Please respond to the following IN YOUR OWN WORDS:
There are many ways to implement virtual access control. Access control is needed for networks, applications, databases, physical access, files, and so on…..
Choose one area (Network Security? Database Security? ) that is in need of access control and discuss at least 5 policies you would implement if you were an IT security manager.
CIS 560 WEEK 7 DISCUSSION
"Implementing Access Control" Please respond to the following IN YOUR OWN WORDS:
There are many ways to implement virtual access control. Access control is needed for networks, applications, databases, physical access, files, and so on…..
Choose one area (Network Security? Database Security? ) that is in need of access control and discuss at least 5 policies you would implement if you were an IT security manager.
CIS 560 WEEK 7 DISCUSSION
"Implementing Access Control" Please respond to the following IN YOUR OWN WORDS:
There are many ways to implement virtual access control. Access control is needed for networks, applications, databases, physical access, files, and so on…..
Choose one area (Network Security? Database Security? ) that is in need of access control and discuss at least 5 policies you would implement if you were an IT security manager.
CIS 560 WEEK 7 DISCUSSION
"Implementing Access Control" Please respond to the following IN YOUR OWN WORDS:
There are many ways to implement virtual access control. Access control is needed for networks, applications, databases, physical access, files, and so on…..
Choose one area (Network Security? Database Security? ) that is in need of access control and discuss at least 5 policies you would implement if you were an IT security manager.
No comments:
Post a Comment
Note: only a member of this blog may post a comment.