Lecture Security and Control



Download 0.85 Mb.
View original pdf
Page7/13
Date23.03.2021
Size0.85 Mb.
#56158
1   2   3   4   5   6   7   8   9   10   ...   13
securing information systems
SECURITY AND CONTROL
Security Policy:

Policy ranking information risks, identifying acceptable
security goals, and identifying the mechanisms for
achieving these goals


Management Information Systems
Lecture 10 Security and Control
ESTABLISHING A MANAGEMENT FRAMEWORK FOR
SECURITY AND CONTROL
Security Profiles fora Personnel System
Figure 10-5


Downtime:
Period of time in which a system is not
operational

Fault-tolerant computer systems:
Redundant
hardware, software, and power supply components to
provide continuous, uninterrupted service

High-availability computing:
Designing to maximize
application and system availability

Management Information Systems
Lecture 10 Security and Control
ESTABLISHING A MANAGEMENT FRAMEWORK FOR
SECURITY AND CONTROL
Ensuring Business Continuity


Load balancing:
Distributes access requests across
multiple servers

Mirroring:

Download 0.85 Mb.

Share with your friends:
1   2   3   4   5   6   7   8   9   10   ...   13




The database is protected by copyright ©ininet.org 2024
send message

    Main page