11-2 Flashcards
you should never open an attachment that meets the following criteria
unkown source
active or executable code
animation or movie
is not legit
it is recommended that all Instant Mesaging be banned from all ____________ within an organization
computers
limmiting an organizations instant messaging to __________ only can be hard to enforce
buisness work
no private of confidential buisness information should be sent Via ___________
instant messaging.
some organizations simply decide to prohibit any changes to the _____________ for this reason
system configuration
limiting a users access privleges , as in the concept of _________ will help prevent the user downloading potentially hazardous material.
least privlage
BYOD, wearable devices, IOT all pose a new security risk when they connect to your network. in a highly secure environment it’s important to _____ all personal devices
Ban
2 alternatives for a BYOD that will give the organization more control would be ___________
CYOD (choose your own device)
COPE (company owned provided equipment)
the first incident of violating any user policy will result in a ____________
verbal warning
a second incident of violating a user policy will result in a __________
written warning
a third incident of violating a user policy will result in __________
suspension or termination
you must clearly list the consiquences for user policy violations as well as have users sign the _________ when on boarding
user policies
when an employee leaves its important to make sure all _________ are terminated, and all access to all systems is disconnected.. this includes physical access
logins
when an employee leaves make sure the following happens
login accounts closed keys returned all email, internet, wireless shutdown all access to mainframe accounts shutdown the employee harddrive searched.
if the employee has been up to no good its important for you to find out _____________
as quickly as possible