Tuesday, 25 March 2014

Technologies and Methodologies Evaluation

Write a 3- to 4-page evaluation of security technologies and methodologies used to mitigate information management risks. Define the following technologies and discuss how you would implement these in a company.

  • Firewalls
  • Intrusion prevention systems
  • Intrusion detection systems
  • Access control
  • Cryptographic tools and processes

No comments:

Post a Comment