Implements and maintains security devices and software
--security products require monitoring and maintenance in order to provide their full value.
carries out security assessments
--security assessments enable the business to understand the risks it faces, and make sensible business decisions about products and services it considers purchasing, and risk mitigation strategies it chooses to fund versus risks it chooses to accept, transfer, avoid.
configures and maintains security labels in mandatory access control(MAC) environment.
--MAC environment,mostly found in government and military agencies, have security labels set on data objects and subjects.
Sets initial passwords for users
Reviews audit logs
2009年6月11日星期四
订阅:
博文评论 (Atom)
没有评论:
发表评论