首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Smart firms can minimize their risks by conducting weakness appraisals, choosing experienced security personnel and establishin
Smart firms can minimize their risks by conducting weakness appraisals, choosing experienced security personnel and establishin
admin
2010-06-11
25
问题
Smart firms can minimize their risks by conducting weakness appraisals, choosing experienced security personnel and establishing-and then enforcing-robust security policies and procedures.
First, recruit responsible, experienced network administrators consultants and in-house security officers, experts’ advice. Run background checks on any individuals who will be given privileged access to your company’s computer system, lf your firm lacks the resources to properly monitor security around-the-clock, consider giving the job to a qualified security company.
Security personnel should conduct regular tests to search for weakness and stay informed of software upgrades and updates, especially for popular programs such as Microsoft Office. Remember, hackers read security bulletins and manufacturer releases shout program flaws, too.
Finns with slack security are easy prey for what experts call "social engineering" crimes, the oldest form of hacker attacks. In these schemes, individuals assume false identifies (as utility workers, telephone repairers, messengers, or computer technicians) to deceive employees into disclosing their passwords and other information. Some hackers even take temporary positions on night cleaning crews so they can browse files, poke through trash or install devices to extract information.
To combat such break-ins, instruct employees to report unfamiliar visitors and refrain from typing their password and other confidential data when others are nearby. Company telephone and communications closets should remain locked at all times, too.
Employees also should be told to fever reveal passwords (even when asked by a network administrator). Other reckless behavior to be avoided includes keeping "password reminders" on monitors, tacked to cork boards, or trader keyboards Under no circumstances should employees select easy-to-guess passwords such as their nickname or the name of their child, spouse, pet or car
Whenever possible, encourage employees to create seven-character passwords consisting of small and capital letters, numbers and symbols. Such passwords prove tough for hackers; they can take months to crack. Conversely, short four-letter passwords, composed entirely of small letters, are straightforward to crack and can be deduced in only a few minutes. Hackers sometimes employ "dictionary attacks"--running programs that lay every word in the dictionary--to crack passwords.
One solution to password management problems is what’s called "two-factor access." Employees are given security tokens that display regularly changing information that must be typed during log-in. The employees then type their own password to further verify their identity.
Name of the husband or wife is regarded as ______by the author.
选项
答案
an easy-to-guess password
解析
参见文章第六段最后—句,工作人员在任何情况下都不允许选用易猜的密码,例如,他们的外号或孩子、伴侣、宠物或车子的名字。在这里可以断定伴侣指的就是配偶及夫或妻的名字也是易猜的密码。
转载请注明原文地址:https://kaotiyun.com/show/cvKK777K
0
大学英语六级
相关试题推荐
Themainideaofthispassageisthat______.Themeaningoftheword"rejuvenate"inParagraph4iscloseto______.
A、Shehasn’tseenhersisterforyears.B、Shehasnotimetoenjoythesceneofthemountain.C、SheiseagertogobacktoColor
Fortyyearsagopeoplewereindifferenttothehealthoftheoceanbecause______.Tohaveabetterfuturefortheenvironment,
Withtoday’sadvancementsincommunicationscombinedwithcomputersandhandholddevices,wenowhavemultiplewaystoconnecta
A、Thewomanlikesarguing.B、Thewomanshouldgetajob.C、Thewomanshouldworkinafactory.D、Thewomanspendstoomuchmoney
TheEnglish,asarace,areverydifferentfromallothernationalities,includingtheirclosetneighbors,theFrench,Belgians,
Forme,scientificknowledgeisdividedintomathematicalsciences,naturalsciencesorsciencesdealingwithnaturalworld,and
Vitamins,likeminerals,arechemicals.Thereisabsolutelynotdifferenceinthechemicalstructure【S1】______ofthenatu
Untiltheverylatestmomentofhisexistence,manhasbeenBoundtotheplanetonwhichheoriginatedanddeveloped.Nowheha
A、Shewillsavethestampsfortheman’ssister.B、ShewillnolongergetlettersfromCanada.C、Shecan’tgivethestampstoth
随机试题
患者,女,2l岁。因前日淋雨觉身体不舒,现症见四肢痿软,身体困重,或麻木、微肿,尤以下肢多见,或足胫热气上腾,或有发热,胸痞脘闷,小便短赤涩痛,苔黄腻,脉细数。其中医治法是
鉴别原发性涎腺腺癌和转移性甲状腺癌的是区别未分化癌和恶性淋巴瘤与肉瘤的是
以下哪一项叙述是错误的:在B细胞介导的对胸腺依赖性抗原产生的体液免疫中
2018年7月12日,某市E化工厂发生爆炸事故,造成4人死亡、2人受伤。该化工厂主要生产工艺为利用电石生产乙炔气体,并利用电石水解后以氢氧化钙为主要成分的废渣,同时利用电石渣可以代替石灰石制水泥。此次发生事故的是2号电石临时仓库,该仓库系水泥仓库
根据《水土保持法》,位于省级重点预防保护区的建设项目,其水土流失防治标准应为()。
信用证项下不附有商业单据的是()。
某企业2012年6月15日自行建造的—条牛产线投入使用该牛产线建造成奉为3700万元,预计使用年限为5年,预计净残值为100万元。在采用年数总和法计提折旧的情况下,2012年该设备应计提的折旧额为()万元。
()关注的是所取得的工作效果与所付出的代价孰大孰小的问题,其重视的是实现工作目标的资源成本。
张教授:据世界范围的统计显示,20世纪50年代,癌症病人的平均生存年限(即从确诊至死亡的年限)是2年;而到20世纪末,这种生存年限已升至6年。这说明,世界范围内诊治癌症的医疗水平总体上有了显著的提高。李研究员:您的论证缺乏说服力。因为您至少忽视了这样一个
下列代码段声明了3个类c1assPerson{};c1assStudent:publicPerson{};c1assUndergraduate:Student{};下列关于这些类之间关系的描述中,错误的是(
最新回复
(
0
)