Showing Page:
1/1
Concepts of information security are to take a rules-based approach. Starting with Physical Security, the
next few chapters in Part 2 will take you through the basics of setting up security procedures for your
personal computer or those of your colleagues, if you work in a small group. Information on the
technical aspects of security for larger organizations or more experienced users is featured in Part 5 of
this Handbook. If you are comfortable with the concepts introduced here, you may decide to build on
your knowledge by consulting Part 5 Security for Technical Administrators. Having your computer
stolen is certainly inconvenient. It may also be expensive if you have no (or insufficient) insurance. In
some cases, the loss of data could expose your business or personal secrets to others. In extreme cases,
a stolen computer could put you out of business. Fortunately, by following a number of simple and
inexpensive measures, you can dramatically reduce the chance that your laptop or desktop will be
stolen.

Unformatted Attachment Preview

Concepts of information security are to take a rules-based approach. Starting with Physical Security, the next few chapters in Part 2 will take you through the basics of setting up security procedures for your personal computer or those of your colleagues, if you work in a small group. Information on the technical aspects of security for larger organizations or more experienced users is featured in Part 5 of this Handbook. If you are comfortable with the concepts introduced here, you may decide to build on your knowledge by consulting Part 5 – Security for Technical Administrators. Having your computer stolen is certainly inconvenient. It may also be expensive if you have no (or insufficient) insurance. In some cases, the loss of data could expose your business or personal secrets to others. In extreme cases, a stolen computer could put you out of business. Fortunately, by following a number of simple and inexpensive measures, you can dramatically reduce the chance that your laptop or desktop will be stolen. Name: Description: ...
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4