Please enable JavaScript.
Coggle requires JavaScript to display documents.
Group 2 - Coggle Diagram
Group 2
1) e) How to apply file and folder permission
v) In the Enter the object names to select text box, type the name of the user or group that will have access to the folder
iv) Click Add...
vi) Click OK
iii) Click Edit
vii) Click OK on the Security window
ii)Select the Security tab
i) Access the Properties dialog box
viii) Continue with Setting Permissions below
c) Click Edit
d) In the Group or user name section, select the user(s) you wish to set permissions for
b) Select the Security tab
e) In the Permissions section, use the checkboxes to select the appropriate permission level
a) Access the Properties dialog box
f) Click Apply
g) Click Okay
1) a) Explain Security Policy
Written document in an organization outlining how to protect the organization from threats.
Security policy is important to help organazition to keep their files or information save from others.
Protect their assets likes IT equipment, such as servers, computers and hard drives.
1) b) Identify Security Policy requirement
Availability = Users should be able to access information, file, or systems when needed.
Integrity = Data should be intact, accurate and complete
Confidentiality = Controling who gets to read the informations
1.C) How to apply username and password :
1.C) How to apply username and password
Under the Password area, choose Add.
Enter the new password in the first two text fields. You have to do it twice to make sure you type the password correctly.
5.Select Sign-in options from the left.
In the Password hint field, enter something that will help you remember the password should you forget it, and then select Next.
Choose Make changes to my account in PC settings.
Hit Finish to complete the new password setup.
Open User Accounts.
You can now exit out of any windows you opened to make the password, like Settings or PC settings.
Select User Accounts
Open Control Panel. The easiest way to do that in Windows 10 is by executing control from the Start menu or Run dialog box.
1.D) How to discover password requirements
When you create password on the page/app you are using, they will give you hint on the password requirements.
The most commons password requirements are:
8-32 characters
Contains at least 1 letter and 1 number
Must not match User ID
Case sensitive, and can include special characters
Consider using a longer, multi-word passphrase
2) Describe Security Procedures
a.Identify Security Procedures
A security procedure is a set of steps that must be followed in order to complete a certain security duty or function. Procedures are typically developed as a set of actions to be performed in a consistent and repeatable manner to achieve a specific goal.
b. How to apply protecting data
1: Back up your data early and often.
2: Implement file- level and share-level security.
3: Documents should be password-protected.
4: Encrypt your data with EFS.
5: Encrypt your hard drive
6: Use a public key infrastructure (PKI).
7: Use steganography to conceal data
8: Use IP security to protect data in transit.
9: Secure wireless transmissions
10: Retain control by utilizing rights management.