Friday, 24 June 2016
What a Security Model should contain ?
Underlying System infrastructure (Hardware, including the Networking layer and components)
User Authentication
User Authorization
Auditing
Data encryption
System hardening against specific attacks
No comments:
Post a Comment
Note: only a member of this blog may post a comment.
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: only a member of this blog may post a comment.