First Page | Document Content | |
---|---|---|
![]() Date: 2012-01-09 07:33:48Auditing Access control Identity management Information technology management Separation of duties Principle of least privilege Superuser Information security audit Security Computer security Data security | Add to Reading List |