Wednesday, May 29, 2019
Essay --
Exercise 11.2 Learning about PoliciesFor this assignment, utilizing the resources given in this exercise as well as the information I gathered from the IT department where I used to work the following are my analysisMy analysis in regards to security Policy is that whatsoever organization it is, its important to implement a sound certificate policy that defines what is permitted and what is not. The security policy boils down to outlining the acceptable use of the companys computer, internet, email, and any verbal expression of the system. It involves practices that reduce the risk of getting information into the wrong hands or preventing unwanted programs or individuals from disrupting service. This can be achieved three ways One, Physical security by limiting access to a companys computer or networking device by housing critical device in a secured area. Second, Hardware Security which is network devices such as router & firewall that has a built in virus scanner or access rule. Rules which define the list of what activities or programs is allowed and not allowed and thirdly, occupation ...
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.