answersLogoWhite

0

No. A security policy identifies your security goals, risks, levels of authority, designated security coordinator and team members, responsibilities for each team member, and responsibilities for each employee.

Quoted from Network+ Guide to Networks

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

What has the author Wing N Toy written?

Wing N. Toy has written: 'Computer hardware/software architecture' -- subject(s): Computer architecture, Software architecture


The TCP IP suite of protocols is implemented by?

TCP/IP protocols are implemented by software, except for the bottom physical layer, which is implemented in hardware.


What are information technology areas?

Hardware Software Networking Security


What is firewall?

firewall is a hardware or software solution to enforce security policies. In the physical security analogy,


How could one describe computer security?

Computer security basically refers to the preventive and resistive measures taken to protect information, ensure integrity of the system and to prevent unauthorized access to information or computing resources. Computer security is required to protect hardware, software, sensitive information and it is enforced using software solutions (antivirus, firewall, encryption, digital certificates, authentication and authorization protocols etc) or hardware solutions (firewall, antivirus, biometrics etc). Along with hardware and software security solutions, formulating and enforcing strict policies and educating about threats are very important for computer security.


What is meant by server in an organization?

Computer architecture is the structure and organization of a computer's hardware or software system. Software engineering is the technological and managerial discipline concerned with systematic production and maintenance of software products. Computer Architecture is the science and art of selecting and interconnecting hardware components to create computers that meet functional, performance and cost goals. Computer architecture is not about using computers to design buildings.


What is the name of the security software tool or hardware based security system that protects an individual computer?

anti virus.


Is VDU hardware or software?

A VDU is hardware.


What are the hklm subkeys?

there are 5 subkey of HKLM .i.e. SAM. Security, Software, Hardware and System


Describe how it architecture and it infrastructure are interrelated?

Information technology (IT) architecture and infrastructure are analogous to opposite sides of the same coin. This is because software design must be compatible and supportive of the hardware architecture itself.


Is scanner a hardware or software?

A scanner is both hardware and software, the device itself is hardware (all devices are hardware) but the driver(a program) that runs it is software.


What is enterprise architecture?

Enterprise architecture is a computer term for the type of computer systems used to support a company. It encompasses both the hardware and the software used by the business for its day to day work.