This is a raw security requirements collection effort Answer questions such as: What security levels do my clients require ...

This is a raw security requirements collection effort          Answer questions such as:               What security levels do my clients require of me               What information sets do I have?  How sensitive to the company are they?               Who are the users of the information?  How complex is the security model I must implement given                   user access requirements and information sensitivity levels.  Security considerations are (at a high level): authentication,  encryption,  access, integrity, and privacy.  These break down further into a core set of issues and actions that must be considered: disabling resources, managing content, isolating data, resources or access, software updating and security, staff roles, change and configuration management, intrusion detection and vulnerability analysis.
English
English (United States)
日本語
Japanese
한국어
Korean