Page 32 - Basis
P. 32
Lesson 3 – Authorization strategy
• What should we protect?
Hardware, software, bussiness data, people private information…
• What categories do we want to protect?
System data, human capital data, finantial data…
• Againts wich threats need protection ?
Hackers, human failures, disasters …
• What measures would be appropriate for our interests ?
1.Haz clic en "Insertar"/ Procedures, password policy, restricted permissions…
2.Escribe texto en