X hits on this document

Powerpoint document

HHS Cybersecurity Program Training Information Security for Information Technology (IT) Administrato... - page 84 / 158

566 views

0 shares

0 downloads

0 comments

84 / 158

U.S. Department of Health and Human Services

Identification and Authorization - Organizations must identify information systems users, process acting on behalf of users, or devices and authenticate (or verify) the identities of those users, processes or devices, as a prerequisite to allowing access to organizational information systems.

Access Control - Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems) and to the types of transactions and functions that authorized users are permitted to exercise.

Page 4 of 5

Using Security Controls

Standards

Document info
Document views566
Page views566
Page last viewedFri Jan 20 21:01:02 UTC 2017
Pages158
Paragraphs2058
Words16945

Comments