“Implementing Access Control” Please respond to the following IN YOUR OWN WORDS:
There are many ways to implement virtual access control. Access control is needed for networks, applications, databases, physical access, files, and so on…..
Choose one area (Network Security? Database Security? ) that is in need of access control and discuss at least 5 policies you would implement if you were an IT security manager.