Please enable JavaScript.
Coggle requires JavaScript to display documents.
Group 7 - Coggle Diagram
Rasyidah Binti Roslan
1.a Explain Security Policy
-A security policy us a collection of rules,guidelines and checklists.
-Having a written security policy empowers an organization to take appropriate action to safeguard its data.
1.b Identify Security Policy Requirement >Focus on the why,who,where and what during the policy development process.
Networks technicians and the organizatins management must work together to develop a security policy that ensures that data and equipment are protected against all security threats.
Key Areas to Adress in Creating Security Policy
1.Process for handling network security incidents
2.Event viewer,system log files or security log files
3.Network access to resources through account permission
4.Usernames,passwords,biometrics and smart cards
5.General security framework for implementing network security
6.Process to audit existing network
- Describe Security Procedures
(a) A security procedure is a set sequence of necessary activities that performs a specific security task or function. The procedures are normally designed as a series of steps to be followed as a consistent and repetitive approach or cycle to accomplish an edit result.
2.(b) How to apply protecting data
- Apply Software Updates
- Software companies often release updates that patch bugs and vulnerabilities when they are discovered. Don't putt off software updated , especially on operating system.
2.Protect passwords
- Create strong passwords and
never using the same password.
- Disable Lock-Screen
Notifications
- Turning off lock screen app
notifications on smartphone is a
simple way to hide personal
information.
- Lock Your App
- Once you've set lock on your phone, go a step further and lock your actual apps. App lockers provide an extra level of security for your apps.
- Keep Your Browsing to Yourself
- If you use free WiFi hotspots in
public places, Use a Virtual Private
Network (VPN)
- Encrypt Your Data
- It's not only useful for protecting
information on your computer, but
also for making sure text message
emails on phone.
7.Back It Up
- If something should happen to the data you create on your devices or network, you lose it all, you can recover quickly without hassle if it's backed up.
-
-
-
-