How system access is managed and secured
How authentication will be performed
How intrusion detection will be performed
How integrity is guaranteed with data transmission
How privacy is ensured
How auditing network vulnerabilities occur
How antivirus software and firewalls are kept up-to-date
How recovery from security breaches will be handled
0 comments:
Post a Comment