Friday, 24 June 2016

What a Security Model should contain ?


  • Underlying System infrastructure (Hardware, including the Networking layer and components)
  • User Authentication
  • User Authorization
  • Auditing
  • Data encryption
  • System hardening against specific attacks

No comments:

Post a Comment

Note: only a member of this blog may post a comment.