risk while not imposing undue access restrictions on those who need access to resources. This paper includes the password policy, wireless use policy, information logging standard, user privilege policy, database credentials policy and acceptance encryption policy. This paper briefly explains about the scope and procedures of each and every policy. Introduction When defining policies and when living with them from day to day, the reasons for the policy should be kept in mind. A policy…
Words 2117 - Pages 9