Purpose of Assignment
Students identify the necessary authentication
methodology for their selected business scenario and build an
appropriate access control strategy to secure the information systems.
Resources Required: Appendix F
· Complete the Access Control Policy portion of the Information Security Policy. Include the following:
- User enrollment
- Identification
- Authentication
- Privileged and special account access
- Remote access
· Refer to the Access Control Policy Template in Appendix F for the correct format for this assignment.
No comments:
Post a Comment
Note: only a member of this blog may post a comment.