Information Systems Auditing
Monday, January 7, 2013
Information Security Policies
Should include policies related to the following;
Mobile devices
Access control (linked elsewhere)
Computer forensics (linked elsewhere)
E
ncryption
Third party
Clear desk
Newer Post
Older Post
Home