What security requirements does SoftCart use for optimum implementation?
There are several parts to security. A few of them are: Network Security: Keeps control of who has access to the companies network. This is typically taken care of by the ISP and is controlled through the use of sophisticated routers and firewalls. Server Security: Limited to the security built into the operating system and consists of user IDs, passwords, and permissions. Set up properly, a UNIX system, coupled with the network security, can be very secure.
Related Questions
- Are there different certification requirements for managers than for technically oriented information assurance or information security personnel?
- What are the key user requirements of fast, wheeled military/security amphibious vehicles?
- What are the instructor requirements for teaching Fundamentals of Network Security?