CIS 598 Week 7 Discussion
"Technology Security" Please respond to the following:
- Do you think that there is a need for classifying individual parts of a network? What is its importance in real-based applications? How can information asset security be enhanced by control techniques?
- How are the exposure and issues of logical access control explored with the help of access control software?
"Technology Security" Please respond to the following:
- Do you think that there is a need for classifying individual parts of a network? What is its importance in real-based applications? How can information asset security be enhanced by control techniques?
- How are the exposure and issues of logical access control explored with the help of access control software?
No comments:
Post a Comment
Note: only a member of this blog may post a comment.