1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
belka [17]
3 years ago
13

Online privacy and data security are a growing concern. Cybercrime is rampant despite the various security measures taken.

Computers and Technology
2 answers:
nignag [31]3 years ago
6 0

Answer:

The SANS Top 20 Critical Security Controls For Effective Cyber Defense

Explanation:

Password/PIN Policy

Developing a password and personal identification number policy helps ensure employees are creating their login or access credentials in a secure manner. Common guidance is to not use birthdays, names, or other information that is easily attainable.

Device Controls

Proper methods of access to computers, tablets, and smartphones should be established to control access to information. Methods can include access card readers, passwords, and PINs.

Devices should be locked when the user steps away. Access cards should be removed, and passwords and PINs should not be written down or stored where they might be accessed.

Assess whether employees should be allowed to bring and access their own devices in the workplace or during business hours. Personal devices have the potential to distract employees from their duties, as well as create accidental breaches of information security.

As you design policies for personal device use, take employee welfare into consideration. Families and loved ones need contact with employees if there is a situation at home that requires their attention. This may mean providing a way for families to get messages to their loved ones.

Procedures for reporting loss and damage of business-related devices should be developed. You may want to include investigation methods to determine fault and the extent of information loss.

Internet/Web Usage

Internet access in the workplace should be restricted to business needs only. Not only does personal web use tie up resources, but it also introduces the risks of viruses and can give hackers access to information.

Email should be conducted through business email servers and clients only unless your business is built around a model that doesn't allow for it.

Many scams and attempts to infiltrate businesses are initiated through email. Guidance for dealing with links, apparent phishing attempts, or emails from unknown sources is recommended.

Develop agreements with employees that will minimize the risk of workplace information exposure through social media or other personal networking sites, unless it is business-related.

Encryption and Physical Security

You may want to develop encryption procedures for your information. If your business has information such as client credit card numbers stored in a database, encrypting the files adds an extra measure of protection.

Key and key card control procedures such as key issue logs or separate keys for different areas can help control access to information storage areas.

If identification is needed, develop a method of issuing, logging, displaying, and periodically inspecting identification.

Establish a visitor procedure. Visitor check-in, access badges, and logs will keep unnecessary visitations in check.

Security Policy Reporting Requirements

Employees need to understand what they need to report, how they need to report it, and who to report it to. Clear instructions should be published. Training should be implemented into the policy and be conducted to ensure all employees understand reporting procedures.

Empower Your Team

One key to creating effective policies is to make sure that the policies are clear, easy to comply with, and realistic. Policies that are overly complicated or controlling will encourage people to bypass the system. If you communicate the need for information security and empower your employees to act if they discover a security issue, you will develop a secure environment where information is safe.

Butoxors [25]3 years ago
3 0

Answer:

anyone know if the other answer in right?

Explanation:

You might be interested in
Which of the following is NOT a Boolean Search term used to refine search engine results? A. AND B. With C. OR D. NOT
den301095 [7]
B. With. Width isn't a boolean comparative operator
7 0
4 years ago
Read 2 more answers
A(n) ____ is a client, server, or other device that can communicate over a network and is identified by a unique number, known a
Elden [556K]

Answer:

The answer is "node".

Explanation:

The network address is known as a logical or physical address, which defines a networking module/device from a network. It is an allocated numerical number, to every device requiring access to the list or is a member of it.

  • In network communication, it uses the nodes for store data, and there address, these addresses are described by the unique numbers.
  • These node stores data packets, which stores encrypted data.  
7 0
4 years ago
Can you plz type down a word.
ivanzaharov [21]

Answer:

ok? ok? ok? ok? ok? ok? ok? ok? ok?

5 0
3 years ago
Read 2 more answers
PLEASE HELP!! THIS IS DUE TODAY!!
boyakko [2]

Answer:

The piece of technology I use the most is my computer. I use my computer to study, look for useful information, and for entertainment.

Explanation:

Hope this helps <3

7 0
3 years ago
Read 2 more answers
What is the minimum recommended point size for presentation text?<br> 12<br> 24<br> 36<br> 48
Darya [45]
The answer would be 24
6 0
3 years ago
Other questions:
  • Security testing attempts to verify that protection mechanisms built into a system protect it from improper penetration.
    9·1 answer
  • Which of the following is NOT contained on the Slide Show toolbar?
    13·1 answer
  • A phone call costs $0.58 plus $0.15 cents per minute. If the total charge for the call was $4.78, how many minutes was the call?
    15·1 answer
  • Daniel owns a construction company that builds homes. To help his customers visualize the types of homes he can build for them,
    6·1 answer
  • Animations and transitions are added from the _____.
    11·2 answers
  • BST
    13·1 answer
  • Im lonnnelllly........................who want to date
    11·1 answer
  • Match the title of the work of fiction to the description given.
    8·1 answer
  • 2. Define a function squareArea that computes the area of a square given side length
    14·1 answer
  • The short-range two-way communication technology behind contactless payments is called ____.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!