Page 32 - Basis
P. 32

Lesson 3 – Authorization strategy







     • What should we protect?



          Hardware, software, bussiness data, people private information…






     • What categories do we want to protect?




         System data, human capital data, finantial data…






     • Againts wich threats need protection ?



          Hackers, human failures, disasters …






     • What measures would be appropriate for our interests ?





 1.Haz clic en "Insertar"/   Procedures, password policy, restricted permissions…

 2.Escribe texto en
   27   28   29   30   31   32   33   34   35   36   37