首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Smart firms can minimize their risks by conducting weakness appraisals, choosing experienced security personnel and establishin
Smart firms can minimize their risks by conducting weakness appraisals, choosing experienced security personnel and establishin
admin
2010-06-11
42
问题
Smart firms can minimize their risks by conducting weakness appraisals, choosing experienced security personnel and establishing-and then enforcing-robust security policies and procedures.
First, recruit responsible, experienced network administrators consultants and in-house security officers, experts’ advice. Run background checks on any individuals who will be given privileged access to your company’s computer system, lf your firm lacks the resources to properly monitor security around-the-clock, consider giving the job to a qualified security company.
Security personnel should conduct regular tests to search for weakness and stay informed of software upgrades and updates, especially for popular programs such as Microsoft Office. Remember, hackers read security bulletins and manufacturer releases shout program flaws, too.
Finns with slack security are easy prey for what experts call "social engineering" crimes, the oldest form of hacker attacks. In these schemes, individuals assume false identifies (as utility workers, telephone repairers, messengers, or computer technicians) to deceive employees into disclosing their passwords and other information. Some hackers even take temporary positions on night cleaning crews so they can browse files, poke through trash or install devices to extract information.
To combat such break-ins, instruct employees to report unfamiliar visitors and refrain from typing their password and other confidential data when others are nearby. Company telephone and communications closets should remain locked at all times, too.
Employees also should be told to fever reveal passwords (even when asked by a network administrator). Other reckless behavior to be avoided includes keeping "password reminders" on monitors, tacked to cork boards, or trader keyboards Under no circumstances should employees select easy-to-guess passwords such as their nickname or the name of their child, spouse, pet or car
Whenever possible, encourage employees to create seven-character passwords consisting of small and capital letters, numbers and symbols. Such passwords prove tough for hackers; they can take months to crack. Conversely, short four-letter passwords, composed entirely of small letters, are straightforward to crack and can be deduced in only a few minutes. Hackers sometimes employ "dictionary attacks"--running programs that lay every word in the dictionary--to crack passwords.
One solution to password management problems is what’s called "two-factor access." Employees are given security tokens that display regularly changing information that must be typed during log-in. The employees then type their own password to further verify their identity.
This passage is mainly about______.
选项
答案
how to minimize the risks of the network
解析
参见文章第一段,其大意是:明智的公司可采取下列措施来最大限度地降低危险;进行弱点评估,选择有经验的安全监控员,建立并执行一套有效的安全策略和步骤。文章后面的各段提出了具体的措施方法。
转载请注明原文地址:https://jikaoti.com/ti/49MMFFFM
0
大学英语六级
相关试题推荐
Successfulbusinesstendstocontinueimplementingtheideasthatmadethemsuccessful.Butinarapidlychangingworld,ideaso
A、TheFederalgovernment.B、Individualschools.C、Respectivestates.D、Localcommunities.CWhoisresponsiblefortheeducationa
A、Atalocalhospital.B、Inadepartmentstorewarehouse.C、Inanewlyinstalledhouse.D、Inarestaurant.CM:Everythingisnow
A、Payattentiontoothers’self-esteem.B、Beagoodlistener.C、Behaveinadeterminedway.D、Bespecific.CWhichisnotaskill
A、Theyarenotappreciated.B、Thebossdoesnotlistentotheiradvice.C、Self-esteemishurt.D、Theyarepoorlypaid.DWhichst
A、Michael’sparentsgotdivorced.B、KarenwasadoptedbyRayAnderson.C、Karen’smotherdiedinacaraccident.D、Atruckdriver
A、Hefailedtofinishtheexperimentthatday.B、Hehasn’thadtimetodotheexperiment.C、Hedidonlypartoftheexperiment.
Moralityinbusinesshasthreedistinctfaces,______(每一个都在确保商业成功中起着特有的作用)
Forcenturiesthegypsieshavelivedasaunfetteredpeoplewhotraveled【S1】______throughhalfthecountriesofthew
Forcenturiesthegypsieshavelivedasaunfetteredpeoplewhotraveled【S1】______throughhalfthecountriesofthew
随机试题
肝硬化患者肝功能减退的临床表现不包括
依据《刑法》的相关规定,以下情形构成贪污罪的有:
下列有关票据权利的表述中,正确的有()。
公司制期货交易所通常是由()出资组建、股份可以按照有关规定转让、以营利为目的的企业法人。
阅读下面的文百文,回答后面的问题。唐临,京兆长安人,周内史瑾孙也。其先自北海徙关中。伯父令则,开皇末为左庶子,坐谄事太子勇诛死。,临少与兄皎俱有令名……出为万泉丞。县有轻囚十数人,会春暮时雨,临白今请出之,令不许。临日:“明公若有所疑,临请自当其罪。”令
灞桥纸是:1957年5月在陕西省西安市灞桥出土的,是()时制造的。
开发大型软件时,产生困难的根本原因是()。
在考生文件夹下打开文档Word.docx。某高校学生会计划举办一场大学生网络创业交流会的活动,拟邀请部分专家和老师给在校学生进行演讲。因此,校学生会外联部需制作一批邀请函,并分别递送给相关的专家和老师。请按如下要求,完成邀请函的制作:调整邀请函中内
rain
Hepatitis(肝炎)means"inflammation(发火)oftheliver",anditsmostcommoncauseisinfectedwithoneof5viruses,calledhepat
最新回复
(
0
)