„C16 Security“ ändern
parent
30440b645f
commit
57cd1c288f
1 changed files with 0 additions and 1 deletions
|
@ -11,7 +11,6 @@ The IT security system has several different types of employees and roles which
|
||||||
|
|
||||||
#### C16.3 Measures in place to protect the facility. How the premises where digital objects are held area secured.
|
#### C16.3 Measures in place to protect the facility. How the premises where digital objects are held area secured.
|
||||||
To premise where digital objects are held there is a multi-layered security system implemented that includes physical, electronic, and procedural controls.
|
To premise where digital objects are held there is a multi-layered security system implemented that includes physical, electronic, and procedural controls.
|
||||||
*
|
|
||||||
* The Physical security measures include surveillance cameras, access control systems, and perimeter security to prevent unauthorized entry.
|
* The Physical security measures include surveillance cameras, access control systems, and perimeter security to prevent unauthorized entry.
|
||||||
* The Electronic security measures include the firewall, intrusion detection system, and encryption to protect digital data from cyber threats.
|
* The Electronic security measures include the firewall, intrusion detection system, and encryption to protect digital data from cyber threats.
|
||||||
* The Procedural controls include security policies and procedures, employee training, and background checks to ensure that everyone who has access to the digital objects follows the appropriate security protocols.
|
* The Procedural controls include security policies and procedures, employee training, and background checks to ensure that everyone who has access to the digital objects follows the appropriate security protocols.
|
||||||
|
|
Loading…
Add table
Reference in a new issue