Access control, in one form or another, is
considered by most information systems security professionals to be the
cornerstone of their security programs. The various features of physical,
technical, and administrative access control mechanisms work together to
construct the security architecture so important in the protection of an
organization’s critical and sensitive information assets.
This domain includes:
- Concepts/methodologies/techniques
- Effectiveness
- Attacks
[more coming up...]
No comments:
Post a Comment