首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Smart firms can minimize their risks by conducting weakness appraisals, choosing experienced security personnel and establishin
Smart firms can minimize their risks by conducting weakness appraisals, choosing experienced security personnel and establishin
admin
2010-06-11
58
问题
Smart firms can minimize their risks by conducting weakness appraisals, choosing experienced security personnel and establishing-and then enforcing-robust security policies and procedures.
First, recruit responsible, experienced network administrators consultants and in-house security officers, experts’ advice. Run background checks on any individuals who will be given privileged access to your company’s computer system, lf your firm lacks the resources to properly monitor security around-the-clock, consider giving the job to a qualified security company.
Security personnel should conduct regular tests to search for weakness and stay informed of software upgrades and updates, especially for popular programs such as Microsoft Office. Remember, hackers read security bulletins and manufacturer releases shout program flaws, too.
Finns with slack security are easy prey for what experts call "social engineering" crimes, the oldest form of hacker attacks. In these schemes, individuals assume false identifies (as utility workers, telephone repairers, messengers, or computer technicians) to deceive employees into disclosing their passwords and other information. Some hackers even take temporary positions on night cleaning crews so they can browse files, poke through trash or install devices to extract information.
To combat such break-ins, instruct employees to report unfamiliar visitors and refrain from typing their password and other confidential data when others are nearby. Company telephone and communications closets should remain locked at all times, too.
Employees also should be told to fever reveal passwords (even when asked by a network administrator). Other reckless behavior to be avoided includes keeping "password reminders" on monitors, tacked to cork boards, or trader keyboards Under no circumstances should employees select easy-to-guess passwords such as their nickname or the name of their child, spouse, pet or car
Whenever possible, encourage employees to create seven-character passwords consisting of small and capital letters, numbers and symbols. Such passwords prove tough for hackers; they can take months to crack. Conversely, short four-letter passwords, composed entirely of small letters, are straightforward to crack and can be deduced in only a few minutes. Hackers sometimes employ "dictionary attacks"--running programs that lay every word in the dictionary--to crack passwords.
One solution to password management problems is what’s called "two-factor access." Employees are given security tokens that display regularly changing information that must be typed during log-in. The employees then type their own password to further verify their identity.
The expression "around-the-clock" (Line 4, Para. 2) most probably means______.
选项
答案
continuing 24 hours a day
解析
参见文章第二段后半部分,If your firm lacks the resources to properly monitor security around-the-clock, consider giving the job to a qualified security company.其大意是:如果本公司缺乏全天候24小时监控安全系统的资源,则要考虑将这件工作委托给有资质的安全防护公司。
转载请注明原文地址:https://kaotiyun.com/show/vvKK777K
0
大学英语六级
相关试题推荐
Whathavemadepeoplecertainofthepurityofbottledwater?Atleastonesampleofathirdofbottledwaterbrandstestedby
Inthe1980s,whenaccidentshappened,injuredcustomerscould______.Manufacturersmentionedinthepassagewereobligedto
Ingeneral,oursocietyisbecomingoneofgiantenterprisesdirectedbyabureaucraticmanagementinwhichmanbecomesasmall,
TheEnglish,asarace,areverydifferentfromallothernationalities,includingtheirclosetneighbors,theFrench,Belgians,
TheauthorconsidersthatFrance______.Withwhatconclusion,regardingFrenchmother,isthereaderleft?
A、Theyaregoodatlearningfromothernations.B、Theyareabletograspgrowthopportunities.C、Theyattachgreatimportanceto
TheestablishmentoftheThirdReich(第三帝国)influencedeventsinAmericanhistorybystartingachainofeventswhichculminated
TheSecurityCouncilisthemostpowerfulbodyintheUN.Itisresponsibleformaintaininginternationalpeace,andforrestori
IBMresearchersareattemptingtowarmuphuman-computerrelationships.Forexample,IBM,InternationalBusinessMachines,hasb
A、Itismorecomfortablethanaconventionaltrain.B、Itdoesn’trequiremuchtrackmaintenance.C、Itdoesn’tremaininanystat
随机试题
对全肺切除术后病人,正确的护理措施是
为促进学生良好思想品德的形成,某班开展了“每周一星”的评比活动,通过评价一周内每一位学生的日常行为表现,选择表现好、进步大的学生作为当周小明星,并将照片贴在“明星墙”上以示奖励,这种德育方法属于()。
老师领取了3000元工资后,在商店里购买一件商品,实际支付80元,在这里货币执行的职能是()。
群众去机关单位办理手续时。往往准备的资料齐全.却被办事人员告知材料不全,表格填写不规范,导致群众空跑多趟。如果你所在的机关存在这种现象。你该怎么解决?
下列权利中,属于公民监督权的是()
阅读下列一组材料:材料1中国自20世纪70年代末期即以超过8%的年均速度高速前进。近两年我国CDP平均年增超过9%,而世界经济平均年增5%左右,西方发达国家年均增长2.5%,就好比世界迈出一步,我们就已经迈出了两步;发达国家迈出一步,我们就已迈出
在VBA中要定义一个100元素的整型数组,正确的语句是
定义学生选修课程的关系模式如下:S(S#,Sn,Sd,Sa)(其属性分别为学号、姓名、所在系、年龄);C(C#,Cn,P#)(其属性分别为课程号、课程名、先选课);SC(S#,C#,G)(其属性分别学号、课程号和成绩)。检索选修了课程号为2且成绩不
Youmaysaythatthebusinessofmarkingbooksisgoingtoslowdownyourreading.Itprobablywill.That’soneofthe【C1】______
Agoodtranslatorisbydefinitionbilingual.Theoppositeisnot(1)true,however.Abornandbredbilingualwillstillneedt
最新回复
(
0
)