Sayee Srinivasan

  • Citations Per Year
Learn More
Information Security curricula usually cover traditional security topics such as network security, cryptography, and operating system security. With the heavy reliance on computing technology for many of the day to day functions by people and businesses, criminals have joined the fray. Consequently, security aspects require developing adequate policies to(More)
Policies and procedures communicate and control access to information assets and other resources. Developing effective policies and procedures involves understanding the environment within which one is working. They should encompass multiple layers. The level of trust needed for various levels of the organization must be determined. Policies are developed(More)
  • 1