FOR INDIA'S BEST CA CS CMA VIDEO CLASSES CALL 9980100288 OR VISIT HERE
PREDICT YOUR RANK!
Answer below questions and predict your rank
  • How important it is for you to pass the exam in this attempt?
  • What percentage of course you have finished well so far roughly?
  • How many hours you study in a day?
  • How many times you have revised the topics you have finished
  • Have you taken online or pen drive or live class from a renowned faculty?
  • What percentage of the classes you have watched?
  • Have you attempted mock tests or practice tests yet?
  • Are you planning to attempt mock tests conducted by external bodies- ICAI, ICSI, ICMAI or other institute?
  • How many tests you have taken?
  • Did you manage to finish the test papers on time?
  • Are you strictly following study material provided by the exam conducting authority such as ICAI/ICSI/ICMAI/Other Body?
  • How is your health in general?
  • How is your food habit?
  • Any interest in yoga or exercise or play sports regularly?
  • Planning to sleep well nights before the exams?
  • Planning to have light food and water before exams?

What are basic system security measures??

Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 asked

    2       0 Answer Now Comment Report
6 Answers
1d6e89e2ba27fe3ffbb0156937592f65 answered

Thanks everyone for your answers, really good info! 

    0       0 Comment Report
Important Note โ€“ Preparing for IT?
CAKART provides Indias top faculty each subject video classes and lectures โ€“ online & in Pen Drive/ DVD โ€“ at very cost effective rates. Get video classes from CAKART.in. Quality is much better than local tuition, so results are much better.
Watch Sample Video Now by clicking on the link(s) below โ€“ 
For any questions Request A Call Back  
Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 answered

Protect with passwords. This may seem like a no-brainer, but many cyber attacks succeed precisely because of weak password protocols. Access to all equipment, wireless networks and sensitive data should be guarded with unique user names and passwords keyed to specific individuals. Design safe systems. Reduce exposure to hackers and thieves by limiting access to your technology infrastructure. Minimize points of failure by eliminating unnecessary access to hardware and software, and restricting individual usersโ€™ and systemsโ€™ privileges only to needed equipment and programs. Conduct screening and background checks. While rogue hackers get most of the press, the majority of unauthorized intrusions occur from inside network firewalls. Screen all prospective employees from the mailroom to the executive suite. Provide basic training. Countless security breaches occur as a result of human error or carelessness. You can help build a corporate culture that emphasizes computer security through training programs that warn of the risks of sloppy password

    0       0 Comment Report
Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 answered

The process of hiding information by altering the actual information into different representation for sample an APA as 1? X. - Almost all cryptography system depend on a key such as a password like the number or a phrase that can be used to encrypt or decrypt a message. - The traditional type of cryptosystem used on a computer network is called a symmetric secret key system.

    0       0 Comment Report
Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 answered

Type of Security Measures : a) Data Backup b) Cryptography c) Antivirus d) Anti-spyware e) Firewall f) Human Aspects

    0       1 Comment Report
Data?1494421730 answered

Dear friend > System Security Measures Type of Security Measures : a) Data Backup b) Cryptography c) Antivirus d) Anti-spyware e) Firewall f) Human Aspects Data Backup : - The Backup system is needed to backup all data and application in the computer. With the backup system, data can be recovered in case emergency. Depending on the importance of the information, daily, weekly or biweekly backups from hard disk can be performed. Cryptography : - The process of hiding information by altering the actual information into different representation for sample an APA as 1? X. - Almost all cryptography system depend on a key such as a password like the number or a phrase that can be used to encrypt or decrypt a message. - The traditional type of cryptosystem used on a computer network is called a symmetric secret key system. Antivirus : - Antivirus is a program that protects a computer against viruses by identifying and removing any computer viruses found. - It will identify, prevent and eliminate computer viruses and other malicious software. Anti-Spyware : - Anti-spyware software is a program that detects, quarantines and removes spyware to prevent them from getting into your computer. Firewall : - A firewall is a hardware or software that protects a networkโ€™s resources from intrusion by users on another network such as internet. A firewall restricts information that comes to your computer from another computer. It gives you more control over the data on your computer and provides a defense against people or programs that try to connect to your computer without invitation. Human Aspects : - Measures that can prevent from theft are by using locks, smart-card or password. Prevent portability by restricting the hardware from being moved. Detect and guard all exits and record any hardware transported. Thanks

    4       1 Comment Report
Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 answered

**BASIC SYSTEM SECURITY MEASURES** Basic System Security Measures are 1. Password Protection: All accounts and resources must be protected by passwords which meet the following requirements, which must be automatically enforced by the system: (a) Must be at least eight characters long. (b) Must NOT be dictionary or common slang words in any language, or be readily guessable. (c) Must include at least three of the following four characteristics, in any order: upper case letters, lower case letters, numbers, and special characters, such as *!@#$%^&*. (d) Must be changed at least once per year. 2. Software Updates: Systems must be configured to automatically update operating system software, server applications (webserver, mailserver, database server, etc.), client software (web browsers, mail clients, office suites, etc.), and malware protection software (antivirus, anti-spyware, etc). For Medium or High Availability systems, a plan to manually apply new updates within a documented time period is an acceptable alternative. 3. Firewall: Systems must be protected by a firewall that allows only those incoming connections necessary to fulfill the business need of that system. Client systems which have no business need to provide network services must deny all incoming connections. Systems that provide network services must limit access to those services to the smallest reasonably manageable group of hosts that need to reach them. 4. Malware Protection: Systems running Microsoft or Apple operating systems must have antivirus and anti-spyware software installed and it must be configured to automatically scan and update. Thanks

    0       1 Comment Report
Get Notifications
Videos
Books
Notes
Loading
Watch best faculty demo video classes

These top faculty video lectures will
help u prepare like nothing else can.