Академический Документы
Профессиональный Документы
Культура Документы
SECURITY
INTRODUCTION
The presentation is being carried out to lay down a solution to a
Internet
and
network
attacks
Unauthor
ized Informati
access on theft
and use Computer
security
issues
Hardwar
e and System
software failure
theft
SECURITY STRATEGIES
To cope up with the computer security issues, the
organization or an individual can use the following
security strategies to prevent the security of their system
and data or information.
These strategies will help the organization to improve
the level of security and safety of data.
PROACTIVE STRATEGY
This strategy includes a set of predefined steps that can be
they occur.
trusted personnel.
The best strategy for protecting the data from being accessed by an
unauthorized user.
The user authorization can be verified in any security system via piece of
Through this the important and relevant information can be safe from the
authorized users.
DISASTER RECOVERY PLANNING
A proper planning is a best strategy to overcome from the
The most of the worms and viruses try to exploit bugs and
management of vulnerabilities.
The vulnerabilities can be managed by through patching,
information.
RECOMMENDED SECURITY
STRATEGIES
To address the current issue the best strategy that would be
Disable add-ons
security issues with the proactive and reactive plans without causing
any disturbance in the operations of the organization.
THANK YOU