16
Chapter 1. Security Overview
Access control lists (ACLs)
File integrity auditing software
1.2.3. Administrative Controls
Administrative controls define the human factors of security. It involves all levels of personnel within
an organization and determines which users have access to what resources and information by such
means as:
Training and awareness
Disaster preparedness and recovery plans
Personnel recruitment and separation strategies
Personnel registration and accounting
1.3. Conclusion
Now that you have learned a bit about the origins, reasons and aspects of security, you can determine
the appropriate course of action with regards to Red Hat Linux. It is important to know what factors
and conditions make up security in order to plan and implement a proper strategy. With this informa 
tion in mind, the process can be formalized and the path becomes clearer as you delve deeper into the
specifics of the security process.






footer




 

 

 

 

 Home | About Us | Network | Services | Support | FAQ | Control Panel | Order Online | Sitemap | Contact

web hosting comparison

 

Our partners: PHP: Hypertext Preprocessor Best Web Hosting Java Web Hosting Inexpensive Web Hosting  Jsp Web Hosting

Cheapest Web Hosting Jsp Hosting Cheap Hosting

Visionwebhosting.net Business web hosting division of Web Design Plus. All rights reserved