Library items tagged: compliance

Many organisations are looking to have some form of penetration testing performed on their systems. This may simply be to evaluate existing security measures and to find gaps where security needs improvement, but increasingly it is performed to comply with security standards when connecting to public sector networks or processing payment details.
Anonymous
Table of Figures 1 Introduction 1.1 Preamble 1.1.1 The RADIUS Servers 1.1.2 The Network 1.1.3 The Authentication Database 2. The eduroam(UK) Service Technical Specification Requirements 2.1 Common Requirements 2.2 Home Organisation Requirements