COMPUTER THREATS SECURITY
COMPUTER SECURITY POLICIES EXAMPLES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Defines how a system can be secured through specific rules or requirements
|
Network forensics
|
|
Anti malware software
|
|
Packet sniffing
|
|
Network Policies
|
Explanation:
Detailed explanation-1: -A network security policy delineates guidelines for computer network access, determines policy enforcement, and lays out the architecture of the organization’s network security environment and defines how the security policies are implemented throughout the network architecture.
Detailed explanation-2: -Keeping cloud-based systems secure requires sound security policies as well as the layering of such security methods as firewall architecture, access controls, Virtual Private Networks (VPNs), data encryption or masking, threat-intelligence software, and disaster recovery programs.
There is 1 question to complete.