X hits on this document

Powerpoint document

HHS Cybersecurity Program Training Information Security for Information Technology (IT) Administrato... - page 84 / 158

352 views

0 shares

0 downloads

0 comments

84 / 158

U.S. Department of Health and Human Services

Identification and Authorization - Organizations must identify information systems users, process acting on behalf of users, or devices and authenticate (or verify) the identities of those users, processes or devices, as a prerequisite to allowing access to organizational information systems.

Access Control - Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems) and to the types of transactions and functions that authorized users are permitted to exercise.

Page 4 of 5

Using Security Controls

Standards

Document info
Document views352
Page views352
Page last viewedSat Dec 03 20:51:11 UTC 2016
Pages158
Paragraphs2058
Words16945

Comments