Question

While no single set of rules or guidelines is the “best” for any specific environment, there...

While no single set of rules or guidelines is the “best” for any specific environment, there are general best practices that should result in a secure environment. What best practices would you follow for implementing an information security program at your organization?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Please find the list of best practices we follow for information security program at organization.

1. We would need a fire-wall which provides barrier between the our network and stranger which helps us to protect our data.

2. We would need to have passwords on all required places and it needs to modified after certain interval because most of the time only the week/stolen passwords resulted in security issues.

3. We should be having a regular backups often to ensure data can be retrieved even when there is breach happens.

4.We would need to educate our employees to understand what all are the security features we have and how to make use of it.

5. We would need to have verification like voice recognition, fingerprint scans, biometrics, face recognition, behavioral biometrics to ensure they are from the organization.

Add a comment
Know the answer?
Add Answer to:
While no single set of rules or guidelines is the “best” for any specific environment, there...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • If an organization is going to have a chance at a successful security program they need...

    If an organization is going to have a chance at a successful security program they need to develop policies that provide direction for all security efforts and guide the conduct of the users. These policies need to be well written to provide the organization with solid guidance to support their security objectives. Identify and briefly describe the three types of security policies. Your response should include a discussion of where each should be used. Where should policy writers look to...

  • lity che any From your 11. National Patient Safety Goals (NPSGs) are a. rules set by...

    lity che any From your 11. National Patient Safety Goals (NPSGs) are a. rules set by CDC and overseen by OSHA. b. standards set by NAACLS for educational programs. c. The Joint Commission's specific safety requirements. d. voluntary guidelines and protocol written by CLSI.

  • Write a one - page summary that clearly and concisely describes a company’s social media guidelines...

    Write a one - page summary that clearly and concisely describes a company’s social media guidelines (detailed below) so that it can and is likely to be used by rank - and - file employees to guide them in official and personal use of electronic communications. Your summary should identify any holes in the guidelines and suggest an appropriate solution(s). Overview of the Assignment Many companies have rules governing how employees should use social media, both in and ou t...

  • I have synaptic installed already just dont know how set these rules i am using linux...

    I have synaptic installed already just dont know how set these rules i am using linux mint Install the program Synaptic. If Synaptic is already installed in your distro you are lucky. For those of us without a pre-installed Synaptic look around in your desktop for information about how to install program. In most distros it has a name like "Software Center" or something similar. Within the Software Center you will find Synaptic and instructions for installation. Go to the...

  • Network Security Class Questions Which statement best describe the term “Network Enumeration”? (...

    Network Security Class Questions Which statement best describe the term “Network Enumeration”? (NOT SURE) Network Enumeration means by hackers scout target leverage techniques over the phone to make the target reveal critical information such as SSN, credit information Network Enumeration means “case the joint” this is another form of intelligence gathering Enumeration identifies and poorly protected resource shares are exploited to gain access Network Enumeration describe the motivation of a hacker and the level of ingenuity of the hackers All...

  • Give your opinion on what you believe to be the greatest IT security concern facing businesses...

    Give your opinion on what you believe to be the greatest IT security concern facing businesses today and explain the main reason(s) why you believe such is the case. Additionally, propose at least one security control that a business could consider implementing in order to protect against the IT security concern in question. Read the article titled "10 security best practice guidelines for consumers". Next, identify the security practice guideline that you believe consumers should. educate themselves with the most...

  • Information technology (IT) infrascruture security policies are represented in many types of policy documents, depending on...

    Information technology (IT) infrascruture security policies are represented in many types of policy documents, depending on the organization’s network and infrastructure needs. These differences stem from different cyber security risks. They also present organizations with different choices to define and make in their security policies. 1. What are some best practices organizations can observe when creating and maintaining domain policies? 2. LAN security policies often center on issues concerning connectivity; this includes determining how devices adhere to the network. What...

  • Pick a specific company, research the situation, what credible information was published about the offense, and...

    Pick a specific company, research the situation, what credible information was published about the offense, and what the company stated are lessons learned from the incident. If you were a CIO or CISO how would you protect your environment? Remember to cite your sources. If you are defining terms and referencing the any published material directly, you should use quotation marks quote your passage in line with the (author, date, page number). For extra credit, discuss reputation and financial impacts...

  • #1) Select the best choice. For security controls, gap analysis involves comparing the present state of...

    #1) Select the best choice. For security controls, gap analysis involves comparing the present state of controls with a desired state of controls. At a minimum, common baseline security controls should be in place. Any gaps to various types of controls should be clearly documented, for example - "Information security responsibilities", which: a. Defines the program to provide initial and ongoing security education across the organization. b. Reduces risk from known vulnerabilities being exploited. c. Defines how staff will execute...

  • please explain the answers Choose any public company of your liking to analyze answering the following...

    please explain the answers Choose any public company of your liking to analyze answering the following questions Use a single space 12 point font when writing. Your assignment should be about 1100+ words Respond to the following questions 1. What is an organization and analyze organizations purpose, values, mission and vision. (3 points) 2. What are the managerial tasks and activities and give examples of tasks and activities analyzing the organization of your choice. (1 point) 3. What are the...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT