Group 4
FAIZ ZAKWAN BIN REJMI
AHMAD ZULHLIMI FAIZ BIN MOHD ZAID
VANESSA ASUNG NYIAN
ANGELY CHUMAI ANAK JOSEPH

Describe Security Procedures :

Security Policies And Procedures

a. Explain Security Policy

c. How to Apply Username and Password

Your username is your identity online. People will make assumptions about you based on the name you choose, so pick wisely. Use a variation of your name that is easy for you to remember but difficult for others to associate with your name. Use symbols to simulate spaces and letters. Most websites won’t let you use a space in your username, but many will let you use the "_" character to mimic a space. Don’t use your birth year at the end of your username, especially if you are a minor, as it makes it very easy to identify how old you are. When it comes to password safety, the longer and more complex the password is, the better. You can follow a set of rules that a password must satisfy.

d. How to Discover Password Requirements

  • At least one uppercase letter.
  • Minimum of 8 characters.
  • At least one number.
  • At least one special character.

e. How to Apply File and Folder Permission

  1. Select the Security tab.
  1. Access the Properties dialog box.
  1. Click Add...
  1. Click Edit.
  1. In the Enter the object names to select text box, type the name of the user or group that will have access to the folder (e.g., 2125.engl.498.001 or username@uwec.edu).
  1. Click OK.
  1. Click OK on the Security window.
  1. Click OK on the Security window.
  • a written document in an organization outlining how to protect the organization from threats, including computer security threats, and how to handle situations when they do occur. A security policy must identify all of a company's assets as well as all the potential threats to those assets.

a. Identify Security Procedures

  • After implemented , the security procedure provide a set of established action for conducting the security affairs organization .
  • Procedure provide a starting point for implementing the consistencyneeded to decrease variation in security process
  • Normally designed as a series of steps to be followed or to cycle to accomplish end result .
  • Decreasing variation is also a good way to eliminate wasste , improve quality ,and increase performance within security department .
  • Is a set of a sequence of necessary activities that perform a specific security task or function .

b. How to apply protecting data

b. Identify Security Policy requirement

Integrity

Availability

Confidentiality

Controlling who gets to read information.

Assuring that information and programs are changed only in a specified and authorized manner.

Assuring that authorized users have continued access to information and resources.

  1. Lock Your Apps
  1. Keep Your Browsing to Yourself
  1. Disable Lock-Screen Notifications
  1. Encrypt Your Data
  1. Protect Passwords
  1. Back It Up
  1. Apply Software Updates