Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

all dearments as well as mpper managemmt. Th cornrnittee, resID1?hlitie.itel uba

ID: 424325 • Letter: A

Question

all dearments as well as mpper managemmt. Th cornrnittee, resID1?hlitie.itel uba lhe idlowing Developirg elear, detailed secuiy policy ad Prviing security tra ig scurity aareess for kzy decision makers and computerusers Perindiealy ssessing te secturily policy's efectivenes Developing aniire for sysem acess Oveseing enforeeneat of he security poley Designing an audt trai prneedure for incoring anogoing data Post the sccurity policy ia a sisible lace, pot copes next loal worsstations. 3. Raise empyswreness of sceurity problems 1. Revoke eed emplcyes passords and ID hedges immediately to Prevent atempts gt reta lil ?li 5. Keep sensirive cata, software, and printonts besed it secure loxaons 6. Exit rograms and systems frotever leave bgzed workations unaltended. Limit coputer aceess to authorized persotmel only 8. (ali pare cm munita·tion logs will L'an?nLniillio b lling periad cally The lagd lis alogeing calls with ers nane, call des.ination, anc time ch call.Irvestia ay ilng d sepis 0. Istall antivirus prograns, and make sure they ar ?O. Inslall only licensed sor wart Pure hase d Tom repu- I1. Makese ire prolecticn syde 12. Cherk environmental faclors, such as tempe aur 13. Use plysical security measurs such as coraer balts 4. Install firewalls and itrusin delecticn systems. f uxated automaticall table vers to date, und test them regularl and hrmidity levels 0? vurkstations. ID } acgcs.ar-l door kes5 ms and alarms are n comsider bonetrie seeurky measures

Explanation / Answer

Point 1 – setup of the committee consisting of the representative from different department is most important step as these representative specialised in different departments will be able to put more diversified views considering their team and will serve as a good communication to spread the message to their team.

Second to raise the awareness among employees, when the employees are involved and is informed, implementation become an easy task to proceed for and for their betterment.

Third revoking and updating the system immediately after termination of ex staff would definitely serve as an precaution against the possible cyber-attack or hijacking.

Fourth very important to install only licensed software’s as this would prevent the cyber crime that is open by so many fraud links and sides to hack the system and information.

Last, proper antivirus systems must be installed and must continue to update to prevent the possible virus that may hamper your information stored in the system.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote