From 57cd1c288fac4dc8a5aa9a2f04134f65c0e7ce79 Mon Sep 17 00:00:00 2001 From: Brus Date: Wed, 10 May 2023 13:52:07 +0000 Subject: [PATCH] =?UTF-8?q?=E2=80=9EC16=20Security=E2=80=9C=20=C3=A4ndern?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- C16-Security.md | 1 - 1 file changed, 1 deletion(-) diff --git a/C16-Security.md b/C16-Security.md index 81972ea..780b2cf 100644 --- a/C16-Security.md +++ b/C16-Security.md @@ -11,7 +11,6 @@ The IT security system has several different types of employees and roles which #### C16.3 Measures in place to protect the facility. How the premises where digital objects are held area secured. To premise where digital objects are held there is a multi-layered security system implemented that includes physical, electronic, and procedural controls. -* * The Physical security measures include surveillance cameras, access control systems, and perimeter security to prevent unauthorized entry. * The Electronic security measures include the firewall, intrusion detection system, and encryption to protect digital data from cyber threats. * The Procedural controls include security policies and procedures, employee training, and background checks to ensure that everyone who has access to the digital objects follows the appropriate security protocols.