Most technical security controls, or processes, do little without people in control. Firewalls require administrators to install and configure them. Access request systems need managers to review who should have access to the target application or database. Secure...
CITATION STYLE
Blum, D. (2020). Identify and Align Security-Related Roles. In Rational Cybersecurity for Business (pp. 31–60). Apress. https://doi.org/10.1007/978-1-4842-5952-8_2
Mendeley helps you to discover research relevant for your work.