Thursday, February 28, 2019

Introduction to Information Systems Security Essay

A LAN, or local area communicate, is a multitude of computers ranging from small to large within a single office or building. Security and gravel control has to be robust to secure data, applications, and private records. Unauthorized access to the network is a massive security assay for the infrastructure. One way to garnish the risk of access is to implement access doors with key cards to only allow authorized personnel. So if there was a breach in security its only limited to consume personnel. The workstation knowledge domain is where a user discharge connect to the business network through the local area network. This can be done by laptops, phones, tablets, and desktops. Each workstation requires a user ID and befallword. To prevent unauthorized access pass word protection should be enabled.A strong password should constitute of uppercase, lowercase letters and special characters. If a workstation is idle for a original amount of time there should be automatic scr een lock, which requires the user to reenter their password for access. Certain user should only have the ability to cook up changes like downloading and installing something to internet access. This along with an anti-virus program will reduce threats like viruses and malware. So if a virus was present on a workstation it will be removed before it spreads throughout the network. The user domain is the employees who access the organization network and IT infrastructure.thither should be a insurance policy in place that defines what the employee can do inside the organization. A employee handbook would be beneficial and should list all of the guidelines and procedures. Many smack threats can be avoided by the lack of knowledge and security violations. Reminders like emails and cyclic meetings can help employees be more aware about threats and technology updates. If there is a security violation the employee should be under run into and have a meeting with their supervisor. Empl oyees daily usage should in addition be supervised periodically to find any abnormal activity. There also should be warning in place when employees are move to operate during restricted hours.

No comments:

Post a Comment