Академический Документы
Профессиональный Документы
Культура Документы
PGPM-10 Section B Learning Group 5 Group Members: Sarthak Banik Mayurakshi Sengupta Poulami Roy Saborna Banerjee Govind Jaiswal Debasish Pramanik
Learning Group 5
Pranab Deb
22
16-11-2011
6 Components of IT Security
What is IT Security?
Network Security Risk Management Confidentiality Compliance
Business Continuity
Learning Group 5
Access Control
33
16-11-2011
44
16-11-2011
Learning Group 5
55
16-11-2011
Imagine
Learning Group 5
66
16-11-2011
Learning Group 5
77
16-11-2011
Learning Group 5
88
16-11-2011
Learning Group 5
99
16-11-2011
Learning Group 5
1010
16-11-2011
Use Linux Use Updated antivirus in Windows Use genuine Windows and keep your windows update on Use a good Firewall Keep your profile in windows password protected
Learning Group 5
1111
16-11-2011
Learning Group 5
1212
16-11-2011
What is hacking??
Hacking is not a crime, its about how you hack and what do you hack. But for now let us discuss the negative side of Hacking. Almost any device on earth connected to a network can be hacked.
Learning Group 5
1313
16-11-2011
Perform attack-and-penetration tests Launch user-awareness campaigns Configure firewalls appropriately and have them reviewed independently Implement strong password policies Remove all comments in website source code Remove all default Disable all unnecessary services from all devices Test and example pages Learning 1515 16-11-2011 Ensure physical access to the organisation and its systems is secure Group 5 Source-http://www.xatrix.org/article/10-simple-ways-to-stop-hackers-or-at-least-slow-them-down/2318/
Learning Group 5
1616
16-11-2011