Monday, February 4, 2019
Essay --
Exercise 11.2 Learning about PoliciesFor this assignment, utilizing the resources given in this example as well as the information I gathered from the IT section where I used to work the following are my epitomeMy analysis in regards to trade protection Policy is that whatever organization it is, its classical to implement a sound security form _or_ system of government that defines what is permitted and what is non. The security policy boils down to outlining the acceptable use of the companys computer, internet, email, and any aspect of the system. It involves practices that reduce the insecurity of getting information into the wrong hands or preventing unwanted programs or individuals from disrupting service. This can be achieved three ways One, Physical security by limiting access to a companys computer or networking device by housing critical device in a secured area. Second, Hardware Security which is network devices such as router & firewall that has a built in virus scanner or access rule. Rules which define the list of what activities or programs is allowed and not allowed and thirdly, Application ...
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment