1/9
A collection of flashcards focused on key terms and definitions related to responsibilities and parameters in IT policies.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Defining Responsibilities
The process of assigning specific roles and responsibilities to staff for the implementation of policies.
Password Policies
Rules governing the creation and protection of passwords to ensure security against unauthorized access.
Acceptable Software Policy
A policy that defines who can install software and the approved process to install software, preventing illegal or unsafe installations.
Acceptable Use Policy (AUP)
A policy that defines the acceptable and unacceptable actions of users on a company’s IT systems.
Device Hardening Parameters
Measures put in place to make IT systems more secure against threats by defining technical configurations and maintenance.
Complex Passwords
Passwords that include a mix of uppercase, lowercase, numbers, and symbols to enhance security.
Protection of Passwords
Mechanisms to ensure that passwords are kept confidential, such as avoiding writing them down.
Monitoring of IT Systems
The practice of tracking user activities on IT systems to ensure compliance with policies.
Consequences of Breaching IT Policies
Potential disciplinary actions faced by employees who violate acceptable use or software policies.
Device Hardening
The process of securing devices by configuring their settings to reduce vulnerabilities.