- Audit trails - provide evidence or wrong doing and enable retracing of errors
- Encryption - prevents access to unauthorised personnel
- Physical security - prevention
- Biometrics
- Access levels (full rights, read only, write only, update, delete, append, no access)
Protecting against external threats:
- Firewalls
- Access logs
- Virus checkers
- Physical secutiry
Legislation goes some way to disuade people trying to gain access to your information, but does not actually prevent this happening.
No comments:
Post a Comment