.

Tuesday, May 21, 2019

Introduction to Information Systems Security Essay

A LAN, or local area network, is a group of computers ranging from small to large within a single office or building. tribute and devil control has to be robust to secure data, applications, and confidential records. Unauthorized access to the network is a massive security risk for the infrastructure. One manner to shrivel the risk of access is to implement access doors with key cards to only allow authorized personnel. So if there was a breach in security its only limited to select personnel. The workstation domain is where a user fag connect to the business network through the local area network. This can be done by laptops, phones, tablets, and desktops. Each workstation requires a user ID and password. To prevent unauthorized access pass word protection should be enabled.A starchy password should consist of uppercase, lowercase letters and special characters. If a workstation is idle for a certain amount of time there should be automatic harbour lock, which requires the us er to reenter their password for access. Certain user should only have the ability to make changes like downloading and installing something to internet access. This along with an anti-virus program will reduce threats like viruses and malware. So if a virus was present on a workstation it will be removed before it spreads throughout the network. The user domain is the employees who access the organization network and IT infrastructure.There should be a policy in tramp that defines what the employee can do inside the organization. A employee handbook would be beneficial and should list all of the guidelines and procedures. Many smack threats can be avoided by the lack of knowledge and security violations. Reminders like emails and periodic meetings can help employees be more aware about threats and technology updates. If there is a security violation the employee should be under watch and have a meeting with their supervisor. Employees daily usage should also be supervised periodi cally to find any abnormal activity. There also should be warning in place when employees are trying to operate during restricted hours.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.