Wednesday, May 29, 2019

Essay --

Exercise 11.2 Learning about PoliciesFor this assignment, utilizing the resources given in this exercise as well as the information I gathered from the IT department where I used to work the following are my analysisMy analysis in regards to security Policy is that whatsoever organization it is, its important to implement a sound certificate policy that defines what is permitted and what is not. The security policy boils down to outlining the acceptable use of the companys computer, internet, email, and any verbal expression of the system. It involves practices that reduce the risk of getting information into the wrong hands or preventing unwanted programs or individuals from disrupting service. This can be achieved three ways One, Physical security by limiting access to a companys computer or networking device by housing critical device in a secured area. Second, Hardware Security which is network devices such as router & firewall that has a built in virus scanner or access rule. Rules which define the list of what activities or programs is allowed and not allowed and thirdly, occupation ...

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.