Monday, March 30, 2015

Data Security – An Overview for Executive Board Members [Part 4:Application Security]

Introduction In this section we’ll move on from Network Security (discussed in the last part) to the topic of Application Security. So far we’ve covered issues surrounding the security of basic access to devices (Access Control) and networks (Network Security), now we’ll look at an oft-overlooked aspect of a good Data Security model: how applications […]

No comments:

Post a Comment