An Approach to Cybersecurity Risk Oversight for Corporate Directors
Data Matters
APRIL 23, 2018
Because discretionary access control policies share this transitive characteristic and also are particularly vulnerable to Trojan horse attacks, these policies should be limited to contexts with non-sensitive data or among a trusted subset of users. Mandatory Access Control. Role-Based Access Control.
Let's personalize your content