1. Computer System Security
2. Computer Information and Data Security
3. Phishing
4. Internet Crime
5. Network Backup and Continuity Planning
Technologies can help your agency ensure the safety and integrity of your data, network, and business operations through detailed critical mission analysis and assisting you in planning for disasters such as terrorist events, hazmat incidents, weather emergencies, and other contingencies that arise that can disrupt your operations.
6.Web Based Notification and MessagingTechnologies can provide your agency with secure, remote hosted, web based messaging solutions allowing you to communicate critical messages to all or groups of your key personnel from any Internet connected PC.
7. Improper password use
Passwords are the simplest form of security. By leaving passwords blank or simple (i.e., password or admin), unauthorized users are practically invited to view sensitive data. Passwords are more secure when they contain both letters and numbers in a combination of upper-case and lower-case characters, and they should be changed periodically.
8. Plug and surf
Unfortunately, computers are not designed to be connected to the Internet straight out of the box. Before a phone line, Ethernet cable, or wireless card is anywhere near a new computer, install a line of defensive software. Ideally, this should include virus protection, multiple spyware scanners, and a program that runs in the background to prevent malicious software from ever being installed.
9. Ignoring security patches
Security holes may exist in your operating system. No software is perfect. Once an imperfection or hole is found, it's usually exploited within a very short period of time. Therefore, it is imperative to install security patches as soon as possible.
10.Scan TCP/UDP services
Turn off or remove unnecessary services. Unneeded services can be the entry point attackers use to gain control of your system.
=>For me this ten security are the were can we implement during the security of our computers and the data that we have in our computers.
No comments:
Post a Comment