Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Custom Search
 
  

IDENTIFICATION TECHNIQUES

Once security measures and information management practices are established, the AIS technical manager should consider methods of personal identification of individuals for authorized access to the AIS facility. The identification of each individual allowed to use a system is a necessary step in safeguarding the data contained in that system.

For a broader knowledge of personal identification and identification techniques, refer to Guidelines on

Evaluation of Techniques for Automated Personal Identification, FIPS PUB 48.

SUMMARY

AIS security is everyone's job. The key word is PROTECT: take all reasonable measures to protect our AIS assets. Be sure you know what to do if a fire breaks out, the air conditioning goes off, the power goes down (with or without an UPS), or an unauthorized person is in your computer facility.

Learn the AIS terminology and requirements. Keep alert; early detection of problems is the key to minimizing damage and destruction.

Security of all types should be a continuous matter with every AIS technical manager. In this chapter, we have scratched only the surface of the material available on classified security, physical security, and security and privacy of data. It is a subject with which everyone should be completely up-to-date. Study the material presented and referenced in this chapter to become knowledgeable in AIS security.







Western Governors University
 


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business