5 you decide to prepare a security checklist for

This preview shows page 5 - 6 out of 6 pages.

5. You decide to prepare a security checklist for Personal Trainer. Prepare a list of securityissues that the firm should evaluate and monitor. Be sure to organize the items into categoriesthat match the six security levels.
2) Network
Joshua KimProject 6the store. In case an admin is not present, a general manager can use his or hercredentials to adjust directory files and data on our computers.5) Procedural-This relates to operational security. This relates to operational security such ashaving all documents shredded professionally and having 24 hour surveillance onour waste/dumpsters in the back. We do not want dumpster divers or strangers tolook through our trash.6) User-User security relates to password protection, social engineering, andmanagement. All credit card machines will have covers to hide inputs for pinnumbers and our computers will never have a saved password option. Not onlythat, there will be a image of a clean drive and all computers will be wiped monthlythrough automation and all downloaded files be erased after 30 minutes.AccessPass cards will have the customer’s face on them to prevent identity theftand our future mobile app will be only be linked through a three step verificationthat will be through phone & email verification on top of a verbal confirmation onnext visit.
End of preview. Want to read all 6 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
AllaWebb
Tags
Computer Security, Credit card, Personal computer, personal trainer, Joshua Kim

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture