The Different Faces of Policy Enforcement

By on

The traditional “triple A’s” of access security, Authentication, Authorization, and Accounting, have been joined by a newcomer - Auditing. Like its predecessors, auditing is most effective when enforced, rather than being voluntary.

The importance of enforcing access based on auditing has escalated, as malware has gotten smarter. Worms and trojans are indifferent to traditional user authentication. Like parasites, they attach themselves onto systems whose users unwittingly connect them to the company. With this type of ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Copyright © SC Magazine, US edition

Most Read Articles

Log In

|  Forgot your password?