answersLogoWhite

0

It provides step-by-step procedures to harden routers and other network devices.

It defines a process for managing security violations.

It creates a basis for legal action if necessary.

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

Which three statements accurately describe attributes of a security policy?

It creates a basis for legal action if necessary It defines a process for managing security violations It defines acceptable and unacceptable use of network resources


WHAT IS THE three internal product attributes that could affect reliability?

speed, memory, security, and connection


What information security policy outlines the implementation of a security program within the organization?

General - General Security Policy is also known as the Enterprise Information Security Policy, organizational security policy, IT security policy or information security policy.


What is one of the three main areas of America's social policy?

social security


What are the three main areas of social policy?

Three main areas of social policy is Social Security, Federal Insurance Contributions Act (FICA), and National Health Insurance.


What are the three states of SELinux?

Enforcing - The default state, wherein SELinux security policy is enforced. No user or program will be able to do anything not permitted by the security policy. Permissive - The diagnostic state, wherein SELinux sends warning messages to a log but does not enforce the security policy. You can use the log to build a security policy that matches your requirements. Disabled - SELinux does not enforce any security policy because no policy is loaded.


When was Center for Security Policy created?

Center for Security Policy was created in 1988.


Which school of thought attributes collective security?

Liberalism


What are your three main attributes?

You will probably have more than three attributes. However, you should choose the attributes that also relate well with the position for which you are applying.


How do you write an information security policy?

This mainly depends on the requirements defined by the companies security rules and definition that should be implemented with the security policy. Some examples on how to write the policy can be found at the "ComputerWorld" article entitled "How to Write an Information Security Policy".


When was Munich Conference on Security Policy created?

Munich Conference on Security Policy was created in 1962.


What are the three levels of formal interagency committees of the National Security Council?

principles, deputies, and interagency policies