Presentation slides
Protection of Information Assets
Temple University
What is the difference between identity management and access management?
Why is it important to a business to care about the difference between identity management and access management?
What is the one interesting point you learned from the readings this week? Why is it interesting?