Hi All,

*Description:-    *
*
*
*1-                I need information regarding the IDENTITY MANAGEMENT in 
information security as applied in Enterprise level.*
*
*
*                  How the modules in identity management looks appear in 
real time(Enterprise level).*
*
*
*                  How the polices and procedures will be applied and what 
type of regulatory standards to be followed.*
*
*
*I need the information regarding this identity management.*
*
*
*2-              In Auditing there are two types:Internal and External.*
*
*
*As a Information system auditor, how the auditing going to happen in both 
internal and external in-terms of systems(Enterprise level).*
*
*
*How the polices, standards  procedures will be applied in auditing.*
*
*
*
*
*Regards*
*Harish .M*
*
*
*
*

-- 
You received this message because you are subscribed to the Google Groups 
"NForceIT" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send an email to [email protected].
For more options, visit https://groups.google.com/groups/opt_out.


Reply via email to