HAdams_InformationSecurityChecklist_013111 - Information...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Information Security Checklist 1 Preventive Y N N/A Authentication Controls: Has a username/password been established? Is there a voice recognition service? Is the use of USB devices/biometric techniques required? Authorization Controls: Do you have the necessary credentials to access the resource? Do all devices have a network interface card (NIC)? Are digital certificates used for authorization? Training: Do employees understand/follow security procedures? Do employees understand why security measures are important? Have employees been trained to follow safe computing practices? Have employees been educated about social engineering attacks? Controlling Physical Access: Does the building have adequate locks? Are there guards posted at the entryways? Is there a code/security card needed to gain access to building/computer facilities? Controlling Remote Access: Is the Internet Protocol (IP) filter using border routers?
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 2

HAdams_InformationSecurityChecklist_013111 - Information...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online