logo

SEO Expert for Desklib: Titles, Meta Descriptions, and Organizational Procedures

   

Added on  2020-11-02

3 Pages1077 Words153 Views
 | 
 | 
 | 
Question 6:Explain a specific organisational policy or procedure that relates tosystem securityfor each of the following areas:·privacy·data.PrivacyA specific procedure to keep sensitive client information private may be to allocate only a small number of staff with the required elevated authorisations to access the information. To further increase system security, a procedure could be to only grant these users access on specific devices on the company’s local network.DataAn organisational procedure to improve the security of company data could be to ensure that all access to that data is via an encrypted connection and that all backups and storage of said data is safely encrypted. Additionally, a company could use a reverse proxy to increase the system security.Question 7:In two to three paragraphs discuss security features of a server operating system, and how they relate to the protection of privacy, ethics and copyright information.Security features of server operating systems vary greatly depending on the versions and brands of operating system, but they all look to serve the same purpose of protecting the function of the system and the privacy of the data. The security of a server is crucial for successful operation in an organisation, hence why such an emphasis has been placed on system security within server operating systems. Let’s explore two main features and their role in the security of the system.The first main security feature included in most server operating systems is the optional use of encryption. The purpose here is to protect the privacy of private or sensitive data from unauthorisedusers. This also falls inline with the code of ethics which provides confidence to those owning or supplying the private or sensitive data. The second main feature is the firewall. This is a main defence against malicious intent looking to compromise the system and/or the information on the system. Like the afore mentioned encryption method, this feature looks to ensure the privacy of private or sensitive information as well as helping to ensure the preservation of the data. Question 8:For each of the following, write a single paragraph outlining organisational communication processes and procedures that are required for:·Privacy – requests to change information·Copyright – ensuring that content in an organisational website does not infringe copyright legislation·Ethics – cultural awareness.Privacy
SEO Expert for Desklib: Titles, Meta Descriptions, and Organizational Procedures_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Technology
|9
|823
|463

Data Security | Fraud Detection | Report
|6
|1113
|20

Target Data Breach: Threats, Protections, and Legal/Ethical Issues
|8
|1725
|99

Principles of Information Security: Role of People and Physical Security in Data Centers
|10
|2296
|423

Enabling Fine-Grained Access Control Over Encrypted Data
|3
|824
|16

IoT in Healthcare: Advantages, Disadvantages, Future Scope and Mitigation Techniques
|10
|638
|407