Main Description |
System or external request to secure IT resources or validate authority for access.
-
Secure IT resources: identifies one or more specific resources which need to be included in the security protection
scheme, or need to have their level and means of protection adjusted
-
Request to access: a communication soliciting access to a particular resource or class of resources.
|