Friday, October 25, 2019
Essay --
Exercise 11.2: Learning about Policies For this assignment, utilizing the resources given in this exercise as well as the information I gathered from the IT department where I used to work the following are my analysis: My analysis in regards to Security Policy is that whatever organization it is, itââ¬â¢s important to implement a sound security policy that defines what is permitted and what is not. The security policy boils down to outlining the acceptable use of the company's computer, internet, email, and any aspect of the system. It involves practices that reduce the risk of getting information into the wrong hands or preventing unwanted programs or individuals from disrupting service. This can be achieved three ways: One, Physical security by limiting access to a company's computer or networking device by housing critical device in a secured area. Second, Hardware Security which is network devices such as router & firewall that has a built in virus scanner or access rule. Rules which define the list of what activities or programs is allowed and not allowed; and thirdly, Application ...
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.