COMPUTER THREATS SECURITY
TYPES OF COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Risk Acceptance
|
|
Risk Avoidance
|
|
Risk Transferrence
|
|
Risk Deterrence
|
Detailed explanation-1: -An acceptable use policy (AUP) is a document that outlines the rules and restrictions employees must follow in regard to the company’s network, software, internet connection and devices.
Detailed explanation-2: -An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources. Many businesses and educational institutions require employees or students to sign an AUP before being granted a network ID.
Detailed explanation-3: -An Acceptable Use Policy is an important document that can demonstrate due diligence with regards to the security of your IT network and the protection of sensitive data in the event of a breach or regulatory audit. This importantly protects the organisation from legal actions.