project01 - 6. Secure intellectual property and proprietary...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
These are some recommendations for securing the Information system from outsider or internal employees who might have malicious intention to harm the system. 1. Prevent unauthorized access to any computer in the organization 2. Control Access and Security to Network. 3. Instantaneously locks computer system when user walks away 4. Automatically generates passwords (Windows and applications) for the user 5. Eliminate IT help desk password-related calls
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 6. Secure intellectual property and proprietary information 7. Maintain access controls through central administrative appliance 8. Protects corporate, employees, customer and patient data 9. Reduces risks associated with hiring contractors, temporary employees, and maintenance staff. 10. Promotes Adherence to Compliance Regulations – HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley Act...
View Full Document

This note was uploaded on 03/15/2012 for the course CIS CIS120 taught by Professor Zales during the Spring '12 term at Harrisburg Area Community College.

Ask a homework question - tutors are online