Pages • 1
It454 Security Management IT454 Security ManagementThe GymAlexander NazarioAugust 8, 2016Table of ContentsInformation Security Management Purpose and Scope Security Requirements Perimeter Security Client and Server Security Back end Database security Front-end UNIX or Windows server’s security Client and Server Authentication Wireless and Remote Access Security Symmetrical key and public key encryption Outline the methods to secure VPN access to the network and the back end databases Securing.