All items in our computer storage need protection. Whether it's from internal or external threats all of our data is critical and needs to be protected. There are several different methods or approaches to maintaining file integrity. One of which is an Access Matrix, this table holds information about files for who should have the ability to access which files. A matrix can be organized in many different ways making it flexible to define for each physical location or each specific user.
No comments:
Post a Comment