CIS 560 Week 1 Discussion Question
Access Control Objects and Impacts " Please respond to the following:
(Provide answers to both discussions.)
#1Three types of access control objects generally need to be protected: information, technology, and physical location. Provide an example of each object category and explain how you might protect it with software, hardware, and/or policies and processes.
#2 What is the possible impact to access control, access control policies, and technologies associated with access control, to an organization from conducting risk assessment?
Access Control Objects and Impacts " Please respond to the following:
(Provide answers to both discussions.)
#1Three types of access control objects generally need to be protected: information, technology, and physical location. Provide an example of each object category and explain how you might protect it with software, hardware, and/or policies and processes.
#2 What is the possible impact to access control, access control policies, and technologies associated with access control, to an organization from conducting risk assessment?
CIS 560 Week 1 Discussion Question
Access Control Objects and Impacts " Please respond to the following:
(Provide answers to both discussions.)
#1Three types of access control objects generally need to be protected: information, technology, and physical location. Provide an example of each object category and explain how you might protect it with software, hardware, and/or policies and processes.
#2 What is the possible impact to access control, access control policies, and technologies associated with access control, to an organization from conducting risk assessment?
Access Control Objects and Impacts " Please respond to the following:
(Provide answers to both discussions.)
#1Three types of access control objects generally need to be protected: information, technology, and physical location. Provide an example of each object category and explain how you might protect it with software, hardware, and/or policies and processes.
#2 What is the possible impact to access control, access control policies, and technologies associated with access control, to an organization from conducting risk assessment?
No comments:
Post a Comment
Note: only a member of this blog may post a comment.