COMPUTER THREATS SECURITY
COMPUTER SECURITY POLICIES EXAMPLES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
The policy must be enforceable
|
|
The policy must be strict
|
|
The policy must be written in several languages
|
|
The policy must be voluntary
|
|
The policy must be capable of being implemented
|
Detailed explanation-1: -There are three primary characteristics of a good security policy: Most important, the policy must be enforceable and it must apply to everyone. The policy must be capable of being implemented through system administration procedures and through the publication of acceptable-use guidelines or other appropriate methods.
Detailed explanation-2: -Which one of the following is an important characteristic of an information security policy? A) Identifies major functional areas of Information. Information security policies are high-level plans that describe the goals of the procedures. Polices are not guidelines or standards, nor are they procedure or controls.
Detailed explanation-3: -You know that to be effective, cybersecurity policies must: be usable, evolve over time, account for human error, be standardized and followed by everyone, take a multidisciplinary approach, plan for exceptions, and explain how to handle incidents.