FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A network policy
A
Acceptable use policy
B
Data theft
C
Virus
D
Phishing
Explanation: 

Detailed explanation-1: -An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources. Many businesses and educational institutions require employees or students to sign an AUP before being granted a network ID.

Detailed explanation-2: -An acceptable use policy usually: Includes specific rules, such as no video pirating. Outlines consequences for breaking the rules, such as warnings or suspension of access. Details an organization’s philosophy for granting access (for example, internet use is a privilege that can be revoked, rather than a right)

Detailed explanation-3: -Why do companies have Acceptable Use Policies? Acceptable Use Policies are a fundamental part of information security and a document that can render proof of “due diligence.” These regulations provide safety for the network and protect sensitive customer data in the event of regulatory breach audits.

Detailed explanation-4: -Accessing data, a server or an account for any purpose other than conducting Our business, even if you have authorized access, is prohibited. Introduction of malicious programs into the network or server (e.g., viruses, worms, Trojan horses, e-mail bombs, etc.) is prohibited.

Detailed explanation-5: -An acceptable use policy is a document that service owners use to outline all rules pertaining to service users. If someone breaks those rules, the AUP also outlines the consequences and any actions the service might take in response.

There is 1 question to complete.