What is the importance of proper discarding of refuse?

What will be an ideal response?


The security policy must carefully address what is sensitive information and what isn't, and decide how to treat refuse. Some documents may not be considered sensitive, like employee handbooks and company policy statements. But these can often tell hackers what physical and network security to expect when doing intrusion. The best solution to theft of trash paper is to crosscut-shred it and keep it in locked trash receptacles.?Old hardware cannot be shredded and takes up space; thus, these items are frequently thrown out, or given to employees to take home.Hackers search for outdated hardware, such as tapes, CD-ROMs, and hard disks. There are various tools available to hackers, such as forensics programs, that can restore data from damaged data-storage devices.

Computer Science & Information Technology

You might also like to view...

To float the document window in the display area, drag the document ________ tab.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

With _________ authentication an opponent would have difficulty generating ciphertext that when decrypted would have valid error control bits.

A. checksum B. CMAC C. cipher block chaining D. internal error control

Computer Science & Information Technology

Draw a statechart describing the behavior of the AnnounceTournamentControl object based on the sequence diagrams of Figures 5-26 through 5-28. Treat the sending and receiving of each notice as an event that triggers a state change.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Describe the process that the admissions office of your university uses to admit new students as a workflow. Decompose the process into tasks, and describe the task interaction using a diagram similar to Figure 19.9.

What will be an ideal response?

Computer Science & Information Technology