Briefly describe three of the seven elements of a network security policy.
What will be an ideal response?
Privacy policy-Describes what staff, customers, and business partners can expect for monitoring and reporting network use.
Acceptable use policy-Explains for what purposes network resources can be used.
Authentication policy-Describes how users identify themselves to gain access to network resources. Logon names, password conventions, and authentication methods should be described.
Internet use policy-Explains what constitutes proper or improper use of Internet resources.
Access policy-Specifies how and when users are allowed to access network resources. Policies should exist for both onsite and remote access to the network.
Auditing policy-Explains the manner in which security compliance or violations can be verified and the consequences for violations.
Data protection-Outlines the policies for backup procedures, virus protection, and disaster recovery.
You might also like to view...
An instance of a user-defined type is called a(n) .
a) class b) interface c) object d) None of the above.
The oval symbol in a flowchart is called the ____ symbol.
A. start/stop B. input/output C. process D. flow
A(n) ____________________ is the fundamental component of the computer system.
Fill in the blank(s) with the appropriate word(s).
The scope of a global static variable can be extended beyond the file in which it is declared.
Answer the following statement true (T) or false (F)