The Interactive Information Security Policies

    Date05 Nov 2002
    3994
    Posted ByAnthony Pell
    Jenni Harrison submits, A free to access set of internet based information security policies. Fully comprehensive and with extensive search and navigation facilities. . . Jenni Harrison submits, A free to access set of internet based information security policies. Fully comprehensive and with extensive search and navigation facilities.

    Access Control is fundamental to Information Security as its function is to determine which persons or systems, are entitled to access the information concerned. Access control refers to the controls placed upon both physical access e.g. the keys to a room or building and also refers to the software controls used to restrict access to computer systems and data.

    You are not authorised to post comments.

    LinuxSecurity Poll

    Has your email account ever been pwned in a data breach?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    12
    radio
    [{"id":"53","title":"Yes","votes":"7","type":"x","order":"1","pct":87.5,"resources":[]},{"id":"54","title":"No","votes":"1","type":"x","order":"2","pct":12.5,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.