IT Governance, Risk, and Compliance

Mar 6 2009   7:50PM GMT

Physical Token Protection – Part I



Posted by: Robert Davis
Tags:
Availability
CIA
Confidentiality
Functionality
Identification
Information Security Management
Integrity
ISM
IT Security
Laws and Regulations
Token
Usability

Organizationally, information security normally is considered a program enabling and optimizing IT security services for the entity in order to satisfy business requirements, while simultaneously providing strategic and tactical IT security infrastructure management that complies with applicable laws and regulations. Cascading from the generally accepted risk management goal of adequately addressing threats, opportunities, and weaknesses, a primary security risk assessment objective is to provide recommendations that maximize confidentiality, integrity and availability protection reflective of the operating environment; while sustaining usability and functionality. Though IT security advice generally focuses on enhancing data and information protection, equal attention should be given to physical identification credentials utilized for accessing IT objects.

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: