Question: Procedures to Protect IT Assets Develop a comprehensive plan and policies that include portable as well as fixed equipment. Protect the equipment itself with stringent

Procedures to Protect IT Assets
Develop a comprehensive plan and policies that include portable as well as fixed equipment.
Protect the equipment itself with stringent physical security measures to the premises.
Protect data using special encryption technology to encode confidential information so only the recipient can decipher it.
Stop unwanted access from inside or outside with special authorization systems. These can be as simple as a password or as sophisticated as fingerprint or voice identification.
Install firewalls, hardware or software designed to prevent unauthorized access to or from a private network.
Monitor network activity with intrusion-detection systems that signal possible unauthorized access, and document suspicious events.
Conduct periodic IT audits to catalog all attached storage devices as well as computers.
Use technology that monitors ports for unauthorized attached devices and turn off those that are not approved for business use.
Train employees to troubleshoot problems in advance, rather than just react to them.
Hold frequent staff-training sessions to teach correct security procedures, such as logging out of networks when they go to lunch and changing passwords often.
Make sure employees choose sensible passwords, at least six and ideally eight characters long, containing numbers, letters, and punctuation marks. Avoid dictionary words and personal information.
Establish a database of useful information and FAQ (frequently asked questions) for employees so they can solve problems themselves.
Develop a healthy communications atmosphere.
Create powepoint slides?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!