COMPUTER THREATS SECURITY
COMPUTER SECURITY POLICIES EXAMPLES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Minimum password age
|
|
Maximum password duration
|
|
Password complexity
|
|
No change is needed.
|
Detailed explanation-1: -Using the same password leaves you and your information vulnerable to financial and identity theft Identity theftThe crime of impersonating someone and using their private information, usually for financial gain., so it’s important to use a unique one for each of your accounts.
Detailed explanation-2: -When it’s time to change your password, what’s the best way to choose a new one? A. Add a number or special character to the end of your old password. Pick something easy to remember, such as a football team or your birthday.
Detailed explanation-3: -Inform your customers of how their data is being shared (and who it’s being shared with) Before you open up the gates for third parties to access your users’ data, you must inform them of your third-party data sharing practices in your website or app’s Privacy Policy and Terms of Use.
Detailed explanation-4: -Why is an Information Security Policy is Important? Creating an effective information security policy and that meets all compliance requirements is a critical step in preventing security incidents like data leaks and data breaches. ISPs are important for new and established organizations.