Importance Of Computer Security
Words: 400
Pages: 1
89
89
DownloadImportance of computer security
Introduction
Explain the logical security measures that you would implement in a small business to guarantee the integrity/safety of computer equipment. Information security must be complete, since logical safety and physical safety must be taken into account, since there are both logical and physical threats, logical security uses electronic measures and permits within the operating system or rules Access to network layers, such as firewalls (firewalls), routers and switchs.
Developing
The computer security plan is the graphic expression of the designed computer security system that constitutes and establishes the organizational and functional principles of said activity an entity. For example, considering what was addressed in the computer security plan, in a small business of at least 35 fixed and 15 eventual workers, you could have at least 20 PC clients and a main server. Perform inventory of computer equipment and areas that use equipment connected to the company’s network.
Orient the technical support area on the logical security plan, these measures are to ensure that only authorized users are capable of performing actions or accessing information on a network or specific equipment. Create password input to each module of the main system to control access to all users of the programs and data, for example the warehouse area will only have access to the modules of the main system relevant to its function.
Wait! Importance Of Computer Security paper is just an example!
Guarantee that the various operators cannot modify the information or the programs that do not compete, without having absolute supervision over them. Ensure that each process or procedure uses the assets, resources and applications that correspond to it. Verify that the shared information is received by the authorized receiver. Ensure information integrity. Guarantee the altebility for data transmission from different access points.
Ensure contingency measures for data transmission. Guide the mandatory disinfection of external devices before use in computer technologies. Installation of firewall. Establish protection standards such as: identification, authentication and authorization for users. Restriction of access to programs and files.
conclusion
Restriction of modification of programs and files that do not correspond. Safety in data use, files and correct programs in and by correct procedure. Information transmitted is received by the recipient to which it has been sent. Use Firewall barriers. Scan with antivirus computer equipment. Account assignment standards (hierarchical priorities). Maintenance of computer equipment periodically.
Subscribe and get the full version of the document name
Use our writing tools and essay examples to get your paper started AND finished.