官术网_书友最值得收藏!

Recommended operational policies

Information security policies can be broken down into three categories:

  • Technical controls: The security controls (that is, safeguards or countermeasures) for an information system that are primarily implemented and executed by the information system through mechanisms contained in the hardware, software, or firmware components of the system
  • Management controls: The security controls (that is, safeguards or countermeasures) for an information system that focuses on the management of risk and the management of information system security
  • Operational controls: The security controls (that is, safeguards or countermeasures) for an information system that primarily are implemented and executed by people (as opposed to systems)

More information on information security policies is as follows:

主站蜘蛛池模板: 兴义市| 通化县| 海兴县| 喀喇| 梨树县| 保康县| 陇南市| 鹿泉市| 逊克县| 临猗县| 介休市| 永宁县| 晴隆县| 汤原县| 晋州市| 巴塘县| 泾川县| 宜宾市| 保康县| 滦平县| 耿马| 慈利县| 顺平县| 清水县| 安平县| 靖西县| 泰和县| 宁夏| 裕民县| 武义县| 日土县| 法库县| 潮安县| 石家庄市| 鄂托克前旗| 陆丰市| 新竹县| 深水埗区| 黄浦区| 若尔盖县| 巴林左旗|