List five good information security practices that prevent attacks on the desktop.

What will be an ideal response?


Good information security practices that prevent attacks on the desktop, such as:
·      Keeping antivirus software up to date
·      Using spyware detection software
·      Working with systems administrators to keep the operating system and applications up to date with patches and updates
·      Not opening suspect e-mail attachments
·      Avoiding social engineering attacks by not providing critical information over the phone or e-mail
·      Not downloading and installing unauthorized software or software from untrusted sources
·      Protecting passwords and classified information

Computer Science & Information Technology

You might also like to view...

What punctuation is used to separate the two cell references in a range?

A. Period (.) B. Semi-colon (;) C. Comma (,) D. Colon (:)

Computer Science & Information Technology

Buttons, text boxes, and other tools that are found on a form are called ________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A search engine uses a _____ that you type in to find pages on the web?

A. ?search expression B. ?query C. ?both a. and b. D. ?neither a. nor b.

Computer Science & Information Technology

What type of forensic investigation typically has the highest evidentiary standards?

A. Administrative B. Criminal C. Civil D. Industry

Computer Science & Information Technology