Nt1310 Unit 3 Research Paper

1087 Words5 Pages
Deliverables When discussing the risks, threats, and vulnerabilities within a workstation domain, we must not only know the potential issues, but we must also know what can be done to alleviate those issues. Risk, Threat, or Vulnerability Mitigation Lack of user awareness Conduct security awareness training User apathy toward policies Conduct annual security awareness training, implement acceptable use policy, update staff manual and handbooks Security policy violations Place employee on probation CDs and USB drives disable all CD drives and USB ports File sharing Disable all websites to where only work relates sites can be accessed Passwords ensure all passwords are kept safe and secure by training all employees. E-mail only allow…show more content…
AUP, security policy, Data classification policies, Security management practices, Access control systems and methodology, Telecommunications and networking security, Cryptography Security architecture and models, Operations security, Application and systems development security, Physical security, Business continuity and disaster recovery planning, Laws, investigation, and ethics. 5) Explain how availability can be achieved within the workstation domain with security controls and security countermeasures. AUP, security policy, Data classification policies, Security management practices, Access control systems and methodology, Telecommunications and networking security, Cryptography Security architecture and models, Operations security, Application and systems development security, Physical security, Business continuity and disaster recovery planning, Laws, investigation, and ethics. http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_049173.hcs p?dDocName=bok1_049173 6) Although users of desktop applications may not be creating mission-critical data. Other data represents a resource that if lost could result in a permanent loss of information or productivity. Explain what countermeasures and best practices to be implemented to avoid this potential

More about Nt1310 Unit 3 Research Paper

Open Document