Ten most horrible security mistakes by it professionals, Other Subject

The Ten most horrible Security Mistakes by IT Professionals

1.   by means of unencrypted protocols for organization systems, firewalls, routers, and PKI.

2.   Giving users passwords over the phone or exchanging them when the requester is not legitimate.

3.   Failing to preserve and test backups.

4.   Running avoidable services.

5.   Implementing firewalls with regulations that do not prevent unsafe incoming or Outgoing traffic.                                            

6.   Connecting systems to the Internet before hardening them

7.   Connecting test systems to the Internet with default accounts/passwords

8.   Failing to update systems when security holes are establish

9.   Failing to implement or update virus detection software

10. Failing to instruct users on what to do when they see a possible security problem

Posted Date: 10/12/2012 8:07:15 AM | Location : United States







Related Discussions:- Ten most horrible security mistakes by it professionals, Assignment Help, Ask Question on Ten most horrible security mistakes by it professionals, Get Answer, Expert's Help, Ten most horrible security mistakes by it professionals Discussions

Write discussion on Ten most horrible security mistakes by it professionals
Your posts are moderated
Related Questions
What do all the elements in a group have in common?

i hv to make powerpointpresentation , please give me some suggestion .....

Most opinions are that managed care is here to stay.  One of the attractive features of managed care is its ability to contain costs of health care services.  Discuss the following

Which of the following features characterizes haiku? a. The use of complex figures of speech to express the poet’s attitude b. The use of narrative to tell a story in verse c.

write a structured algorithm to calculate the cost of five cars (each). If the customs charge is 40percent and VAT is 15 percent

Peer counselling is the process whereby motivated and well-trained people undertake informal or organized activities with their peers (those similar to themselves in age, backgrou

Location Theory: Location theory, in economics and geography, theory concerned with the geographic location of economic activity; it has become an integral part of economic geogra

Question 1 List out the various steps involved in processing of an export order Question 2 Discuss the guidelines an exporter should follow while submitting documents to a

The constitutional rights guaranteed in the Bill of Rights are most highly protected during the trial stage of a criminal proceeding. This is when the adversarial process, which ch

Tasks: Develop an ontology for a product category (e.g. chocolate,but can not use the chocolate, find other product) Specify 2 intelligent functions/applications that the ontology