COMPUTER THREATS SECURITY
COMPUTER SECURITY POLICIES EXAMPLES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
To allow staff to work remotely
|
|
Outline how staff are expected to behave
|
|
List staff responsibilities
|
|
Plan for what should happen in a disaster
|
Detailed explanation-1: -The basic purpose of a security policy is to protect people and information, set the rules for expected behaviors by users, define, and authorize the consequences of violation (Canavan, 2006). There are many standards available to keep the information secure and establish security policy.
Detailed explanation-2: -A: Three types of security policies in common use are program policies, issue-specific policies, and system-specific policies. Program policies are the highest-level and generally set the tone of the entire information security program. Issue-specific policies deal with a specific issues like email privacy.
Detailed explanation-3: -The U.S. Department of Defense has promulgated the Five Pillars of Information Assurance model that includes the protection of confidentiality, integrity, availability, authenticity, and non-repudiation of user data.