answersLogoWhite

0

Following are various examples of management and procedural controls. • Build any system from original, clean master copies. Boot only from original diskettes whose write protection has always been in place. • USB port enabled devices should not be used until it has been scanned on a stand-alone machine that is used for no other purpose and is not connected to the network. • Antivirus software should update virus definitions frequently. • Have vendors run demonstrations on their personal machines. • Scan before any new software is installed, as commercial software occasionally is supplied with a Trojan horse. • Insist that field technicians scan their disks on a test machine before they use any of their disks on the system. • Ensure all servers are equipped with an activated current release of the virus-detection software. • Ensure bridge, router and gateway updates are authentic. • Exercise an effective back up plan. • Educate users so they will heed these policies and procedures. For example many viruses and worms today are propagated in the form of e-mail attachments. • Review antivirus policies and procedures at least once a year. • Prepare a virus eradication procedure and identify a contact person. Technical controls Technical methods of preventing viruses can be implemented through software. The following actions can reduce the risk of infection to hardware and operating systems, • Use boot virus protection (i-e., built-in, firmware-based virus protection). • Use remote booting, local hard drive of the system is not used for the boot up process. Use a hardware-based password. • Use write-protected tabs on diskettes. • Ensure insecure protocols are blocked by the firewall from external segments and the internet.

User Avatar

Wiki User

16y ago

What else can I help you with?

Related Questions

Recommend at least five practices to control the un-authorized access to your online business?

Recommend at least five practices to control the un-authorized access to your online business.


What is the actual or possible loss of control unauthorized disclosure or unauthorized access to?

breach


What is the actual or possible loss of possible control unauthorized disclosure or unauthorized access to pii?

breach


What is the actual or possible loss of control unauthorized disclosure or unauthorized access to PII?

Breach


Why do people attempt to gain unauthorized access?

Curiosity, control, money.


Personal Information may be compromised by?

All of the above. Actual or possible loss of control; Unauthorized disclosure; and Unauthorized access


What terms refers to the prevention of unauthorized disclosure of keys?

Access control


What security measures are in place to prevent unauthorized access through the back door lock?

Security measures such as strong locks, key control, access control systems, surveillance cameras, and alarms are in place to prevent unauthorized access through the back door.


Is a type of access control used to protect systems from unauthorized access?

Yes, access control is a critical security measure designed to protect systems from unauthorized access. It involves implementing policies and mechanisms that regulate who can view or use resources within a computing environment. Common types include role-based access control (RBAC), mandatory access control (MAC), and discretionary access control (DAC). By enforcing these controls, organizations can safeguard sensitive information and maintain system integrity.


Which statement best describes the definition of a PII breach?

The actual or possible loss of control, unauthorized disclosure, or unauthorized access to physical or electronic PII


A PII breach is an actual or possible loss of control unauthorized access of personal information where?

Breach


Five practices To control the un-authorized access to your online business?

Five core principles of privacy protection * Notice/Awareness * Choice/Consent * Access/Participation * Integrity/Security * Enforcement/Redress.