MUS 152 Lecture Notes - Lecture 15: Network Security, Information Security, Risk Assessment
Document Summary
Running head: security policy content and risk 1. Security policy content and risk (shiffman& jochum2011)security system defined as the well-written strategy about protecting and maintaining the availability of the work available and the resources that the work has. The following is the list of each section in the security policy that needs to be addressed: password policy, risk assessment, administrative responsibilities, user responsibility, e-mail system, internet policy, backup and restore, hacking detection. This one happens to be a paramount aspect of the security system. However, the only way through which the hacker"s job can be made easier is them having access to the password. Therefore, the password should not include any of the following; place, phone number, proper noun, passwords of the same character, etc. (peltier2004). http://www. mhpcc. edu/accounts/password_policy. html. The assessment will give out a road roadmap on how to secure network infrastructure. However, while performing an assessment, answer as many questions as possible to improve the security of the system (peltier2004).