11.07.2015 Views

Summary

Summary

Summary

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

10 IT Essentials: PC Harware and Software Companion GuideFigure 9-1Security PyramidAfter completing this section, you will meet these objectives:■■■■Explain what is required in a basic local security policy.Explain the tasks required to protect physical equipment.Describe ways to protect data.Describe wireless security techniques.Explain What Is Required in a Basic Local SecurityPolicyAlthough local security policies may vary between organizations, all organizations shouldask the following questions:■■■What assets require protection?What are the possible threats?What should be done in the event of a security breach?A security policy should describe how a company defines security issues:■■■■■A process for handling network security incidentsA process for auditing existing network securityA general security framework for implementing network securityBehaviors that are allowedBehaviors that are prohibited

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!