Protect with passwords. This may seem like a no-brainer, but many cyber attacks succeed precisely because of weak password protocols. Access to all equipment, wireless networks and sensitive data should be guarded with unique user names and passwords keyed to specific individuals. Design safe systems. Reduce exposure to hackers and thieves by limiting access to your technology infrastructure. Minimize points of failure by eliminating unnecessary access to hardware and software, and restricting individual users’ and systems’ privileges only to needed equipment and programs. Conduct screening and background checks. While rogue hackers get most of the press, the majority of unauthorized intrusions occur from inside network firewalls. Screen all prospective employees from the mailroom to the executive suite. Provide basic training. Countless security breaches occur as a result of human error or carelessness. You can help build a corporate culture that emphasizes computer security through training programs that warn of the risks of sloppy password
The process of hiding information by altering the actual information into different representation for sample an APA as 1? X. - Almost all cryptography system depend on a key such as a password like the number or a phrase that can be used to encrypt or decrypt a message. - The traditional type of cryptosystem used on a computer network is called a symmetric secret key system.
Type of Security Measures : a) Data Backup b) Cryptography c) Antivirus d) Anti-spyware e) Firewall f) Human Aspects
Dear friend > System Security Measures Type of Security Measures : a) Data Backup b) Cryptography c) Antivirus d) Anti-spyware e) Firewall f) Human Aspects Data Backup : - The Backup system is needed to backup all data and application in the computer. With the backup system, data can be recovered in case emergency. Depending on the importance of the information, daily, weekly or biweekly backups from hard disk can be performed. Cryptography : - The process of hiding information by altering the actual information into different representation for sample an APA as 1? X. - Almost all cryptography system depend on a key such as a password like the number or a phrase that can be used to encrypt or decrypt a message. - The traditional type of cryptosystem used on a computer network is called a symmetric secret key system. Antivirus : - Antivirus is a program that protects a computer against viruses by identifying and removing any computer viruses found. - It will identify, prevent and eliminate computer viruses and other malicious software. Anti-Spyware : - Anti-spyware software is a program that detects, quarantines and removes spyware to prevent them from getting into your computer. Firewall : - A firewall is a hardware or software that protects a network’s resources from intrusion by users on another network such as internet. A firewall restricts information that comes to your computer from another computer. It gives you more control over the data on your computer and provides a defense against people or programs that try to connect to your computer without invitation. Human Aspects : - Measures that can prevent from theft are by using locks, smart-card or password. Prevent portability by restricting the hardware from being moved. Detect and guard all exits and record any hardware transported. Thanks
**BASIC SYSTEM SECURITY MEASURES** Basic System Security Measures are 1. Password Protection: All accounts and resources must be protected by passwords which meet the following requirements, which must be automatically enforced by the system: (a) Must be at least eight characters long. (b) Must NOT be dictionary or common slang words in any language, or be readily guessable. (c) Must include at least three of the following four characteristics, in any order: upper case letters, lower case letters, numbers, and special characters, such as *!@#$%^&*. (d) Must be changed at least once per year. 2. Software Updates: Systems must be configured to automatically update operating system software, server applications (webserver, mailserver, database server, etc.), client software (web browsers, mail clients, office suites, etc.), and malware protection software (antivirus, anti-spyware, etc). For Medium or High Availability systems, a plan to manually apply new updates within a documented time period is an acceptable alternative. 3. Firewall: Systems must be protected by a firewall that allows only those incoming connections necessary to fulfill the business need of that system. Client systems which have no business need to provide network services must deny all incoming connections. Systems that provide network services must limit access to those services to the smallest reasonably manageable group of hosts that need to reach them. 4. Malware Protection: Systems running Microsoft or Apple operating systems must have antivirus and anti-spyware software installed and it must be configured to automatically scan and update. Thanks