Vorgehensweise bei der Erstellung einer unternehmensweiten IT Security Policy.
Sven SchumannPublished in: Datenschutz und Datensicherheit (2002)
Keyphrases
- security policies
- access control
- network security
- security management
- distributed systems
- security requirements
- security architecture
- security concerns
- access control systems
- network management
- access control policies
- home network
- fine grained
- computer networks
- unauthorized access
- machine learning
- security measures
- mobile devices