Local security threats

If a person that is already inside the network then such a person already has greater access to computing resources than a person that outside the network. People that are inside the network need to be trusted. Careful selection of such people must be in place, this is done via rigid hiring process, careful management review, proper technical access and right HR policies.

Comments

Popular posts from this blog

Absolute and relative path in HTML pages

Errors

goto PHP operator