MUS 152 Lecture Notes - Lecture 15: Network Security, Information Security, Risk Assessment

44 views4 pages
9 Nov 2017
School
Department
Course

Document Summary

Running head: security policy content and risk 1. Security policy content and risk (shiffman& jochum2011)security system defined as the well-written strategy about protecting and maintaining the availability of the work available and the resources that the work has. The following is the list of each section in the security policy that needs to be addressed: password policy, risk assessment, administrative responsibilities, user responsibility, e-mail system, internet policy, backup and restore, hacking detection. This one happens to be a paramount aspect of the security system. However, the only way through which the hacker"s job can be made easier is them having access to the password. Therefore, the password should not include any of the following; place, phone number, proper noun, passwords of the same character, etc. (peltier2004). http://www. mhpcc. edu/accounts/password_policy. html. The assessment will give out a road roadmap on how to secure network infrastructure. However, while performing an assessment, answer as many questions as possible to improve the security of the system (peltier2004).

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents