Security within a completed application involves allowing users access to the appropriate data and processes.
Access to data can be by:
Access to processes can be:
The organization's standard security package should control access. You may want to augment the standard package with other security procedures.
Copyright © 2013 CA.
All rights reserved.
|
|