Source:IBM
In this paper, EMA examines the broad domains of controls enterprises must consider in order to build a solid foundation for IT security management: Countering threats, Resolving vulnerabilities (in more than just software), Managing application risks, Protecting sensitive information, Managing and enforcing identity, access and entitlements, Managing events and responding to incidents, Stretching the boundaries: Extending to domains such as physical security, and fostering a more secure culture.
(Is this item miscategorized? Does it need more tags? Let us know.)
http://whitepapers.zdnet.com/abstract.aspx?docid=2839299&promo=590&tag=nl.e590&cval=widl2&ctype=default
Aucun commentaire:
Enregistrer un commentaire