Part 7 Flashcards Preview

Information Security Fundamentals > Part 7 > Flashcards

Flashcards in Part 7 Deck (10)
Loading flashcards...
0

Train Employees: _____

Develop a Culture of Security

1

One of the greatest security assets is a business’s own employees, but only if they have been properly trained to comply with ____and to identify potential security problems.

security policies

2

Many employees don’t understand the significance of various security policies and implementations. As men- tioned previously, they consider these policies nothing more than an _____.

inconvenience

3

Gaining the support and allegiance of employees takes time, but it is time well spent. Begin by carefully explaining the reasons behind any ____

security implementation.

4

One of the reasons could be ensuring employee _____, but focus primarily on the security issues.

productivity

5

File sharing using LimeWire and eMule might keep employees away from work, but they can also open up holes in a ____.

firewall

6

Downloading and installing _____can install malicious software that can infect user systems, causing their computers to function slowly or not at all.

unapproved software

7

Identify and Utilize ____of the Operating System and Applications

Built-In Security Features

8

Many organizations and systems administrators state that they cannot create a secure organization because they have limited resources and simply do not have the funds to purchase robust security tools. This is a ridicu- lous approach to security because all operating systems and many applications include ____ that require no organizational resources other than time to identify and configure these tools.

security mechanisms

9

For Microsoft Windows operating systems, a terrific resource is the online Microsoft ____ Library.33 Under the Solutions Accelerators link you can find security guides for all recent Microsoft Windows operating systems. Figure 1.6 shows the table of contents for Windows 2008 Server.

TechNet