1 / 6

Responsibilities

Carry out regular backups of critical data Using multiple connections to the Internet and other network locations Using redundancy Load balancing data – more than one server. Responsibilities. Systems and Procedures. User should: Not write down their passwords Change passwords periodically

brand
Download Presentation

Responsibilities

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Carry out regular backups of critical data • Using multiple connections to the Internet and other network locations • Using redundancy • Load balancing data – more than one server Responsibilities

  2. Systems and Procedures • User should: • Not write down their passwords • Change passwords periodically • Use a STRONG password • Upper / lower case, use of numbers / symbols, 8 or more characters, not dictionary words • Sign an agreement accepting corporate policy and acknowledging laws such as Data Protection Act and Computer Misuse Act

  3. Disaster Recovery • Multiple threats • Fire • Flood • Server failure • Loss of Internet connection • Attempted Intrusion • Theft

  4. Security Measures • All security software kept up-to-date • Firewalls checked regularly • Privileges updated and checked regularly • Business decisions should not compromise the network and vice versa

  5. Securing Data • Authorisation techniques • Permissions and control lists • Backup / restoration • Encryption • Biometrics • Vetting and control of personnel • CCTV • Lock and key security

  6. Malware • Viruses • Worms • Trojans • Spyware • Adware (non-malicious) • Phishing • Spam

More Related