Security Guidelines Assignment

Verified

Added on  2021/01/04

|5
|933
|144
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Security
Guidelines

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
Presenting the set of security guidelines for safety of several corporations....................................1
REFERENCES................................................................................................................................3
Document Page
Presenting the set of security guidelines for safety of several corporations
Physical access: It refers to the context pertain in computer security which refers to the
capability of people to physically attain access the system of computer. Accordance with
Gregory White “the physical access to a computer system, the knowledgeable hacker would be
capable to find-out the relevant information required to the organization's computer systems and
network. Furthermore, the physical access security relatively essential for security of the relevant
information, as even with the best network, mobile data and data security, are crucial for
securing the businesses and it is correct that without the physical access the business is not
secure(Peltier, 2016). In case if somebody attain the physical access to the set-up at business
location, access to the entire of organisation's assets is only the concern of time. Ready networks
can be make unauthorised access to organisation's set-up more risky than a bank theist.
Logon access: The basic computer use, logon refers to the process perform to go for
accessing the operating system or application, generally in a remote computer. Generally the
logon needs that the user must know a user ID and its password. Although, the user ID must
conform to a limited extent, it means the ID must of eight characters and the password must
pertain at least one digit and not match a common language word. The user ID may be freely
known and will be visual only when enter by keyboard or any other input device. The password
is requires to be kept as secret (and will not display as it is entered). Several websites made
mandatory for users to get register before using the site. only registered users are able to enter the
site by logging on. furthermore, Logon mainly used as a qualifier as in "logon process". The
content word form is two words: to log on(Hu & Kent, 2012). sin UNIX-based operating
systems, logon is called login. The process is known as "the logon." and the content word form is
to log in.
Malware prevention: It refers to the short malicious software which is specialized for
damaging or disrupting a system. Steal information or may destroy data. It is the wide terms use
for describing the malicious programs. There are different sorts of malware, including
computers worm, computer infections, Trojan steed, adware, spyware, ransomware, scareware,
and secondary passage. A curtailed type of noxious programming, is a kind of programming that
has been especially intended to access or harm a computer, for the most part without the
information of the proprietor. There is type of software’s like hijackers, ransomware, or several other
malicious software — continues to be the usual, are used by organisations.
1
Document Page
Prevention of Malware:
Don't use illegal downloaded software on desktop.
Don not install free software without checking it.
Don't click or Downloaded the untrusted and open email attachments.
Never ignore the security warnings from windows or the antivirus programs.
Use antivirus programs
Don't use the insecure web browser.
Auditing: The computer auditing refers to the systematic process use to determine
whether the information system of organisation, information technology process that pertain the
relevant details, controls and activities(Ali, Khan & Vasilakos 2015). It would achieve the IT
objectives and would thereby automatically enhance the ability of organisation to accomplish
their organisational goals. Furthermore, the auditing of computer is specialized field but there is
requirement of specialization in contexts like computer assisted audit techniques (CAATs), IT
governance, risk and informations system control etc.
Appropriate usage: Computer usage, the appropriate usage policy policy pertain some
following aspects.
Follow-up of general guidelines.
Individual Responsibility
Security
intellectual property
Hacking
Malicious Activities
Impersonation and anonymity
Commercial, political and non-university activities
De Minimis Usage
Systems Updates: It refers to the process of updating the apps as well as the whole
system. The process begins with the downloading the new version of the apps or software or the
whole system. The n the old version will automatically replaced after the downloading and
installing the new version of the system or software. It ensures the new features as well as
enhances the rapidity of functioning of the system or software.
2

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
REFERENCES
Books and Journals:
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for
effective information security management. Auerbach Publications.
Hu, V. C., & Kent, K. A. (2012). Guidelines for access control system evaluation metrics. US
Department of Commerce, National Institute of Standards and Technology.
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and
challenges. Information sciences, 305, 357-383.
3
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]