In: Computer Science
Assume that you are an IT Security Manager who needs to develop access control policies for the following areas: networking, server administration, database administration, and physical security. Choose one area and develop five actual policies that you could provide your employees. Please explain your choices and why these policies are important.Assume that you are an IT Security Manager who needs to develop access control policies for the following areas: networking, server administration, database administration, and physical security. Choose one area and develop five actual policies that you could provide your employees. Please explain your choices and why these policies are important.
Please upvote if you are able to understand this and if there is any query do mention it in the comment section.
Access control policies for physical security are as follows:
If this is required in some other way or some more information is required regarding this then please mention in the comment section otherwise please upvote.