Sunday, March 17, 2019
Essay --
Exercise 11.2 Learning about PoliciesFor this assignment, utilizing the resources given in this come as well as the information I gathered from the IT subdivision where I used to work the following are my abridgmentMy analysis in regards to shelter Policy is that whatever organization it is, its consequential to implement a sound security insurance that defines what is permitted and what is non. The security policy boils down to outlining the acceptable use of the companys computer, internet, email, and any aspect of the system. It involves practices that reduce the happen of getting information into the wrong hands or preventing unwanted programs or individuals from disrupting service. This can be achieved three ways One, Physical security by limiting access to a companys computer or networking device by housing critical device in a secured area. Second, Hardware Security which is network devices such as router & firewall that has a built in virus scanner or access rule. Rul es which define the list of what activities or programs is allowed and not allowed and thirdly, Application ...
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment