„C16 Security“ ändern
parent
2f6adaf9da
commit
ae808a79bd
1 changed files with 2 additions and 0 deletions
|
@ -1,3 +1,5 @@
|
||||||
|
## Technical Infrastructure
|
||||||
|
##
|
||||||
C16.1 the levels of security required for differnt data and metadata and environments, and how these are supportet
|
C16.1 the levels of security required for differnt data and metadata and environments, and how these are supportet
|
||||||
For supporting the levels of the required security for data, metadata and environments we have implemented a multi-layered approach to security, which includes physical, technical and administrative controls. Physical controls involve securing access points, restricting visitor access, and monitoring who enters the premises. Strong encryption, a firewall and an antivirus software are used for technical control to secure networks. Administrative controls involve developing security policies and procedures, training employees, and conducting regular security audits.
|
For supporting the levels of the required security for data, metadata and environments we have implemented a multi-layered approach to security, which includes physical, technical and administrative controls. Physical controls involve securing access points, restricting visitor access, and monitoring who enters the premises. Strong encryption, a firewall and an antivirus software are used for technical control to secure networks. Administrative controls involve developing security policies and procedures, training employees, and conducting regular security audits.
|
||||||
|
|
||||||
|
|
Loading…
Add table
Reference in a new issue