Show Home Subjects Expert solutions Create Log in Sign up Upgrade to remove ads Only A$47.99/year
Terms in this set (7)Devices used purely for storage, like USB flash ("thumb") drives and external hard drives: May expose large amounts of data if compromised, so should also use protections like access passwords or PINs and whole-device data encryption Software on a portable device should be Installed or updated only from trusted sources to be certain that it is a legitimate version External labeling with a physical label, or configuring a device to display the owner's name and contact information on a login screen, is Generally considered a good idea, because it allows the device to be returned to its owner when found. However, always check organizational policies about the practice Enabling a device login password or PIN, and an inactivity timeout to force (re)login with that password or PIN after the device is idle for a defined period, is generally considered: Generally considered essential for any portable device Compared to fixed location (desktop) computers, physical security for portable devices is: Generally more necessary, because portable devices tend to be used in physical environments that are inherently less secure Ensuring data backups for data stored on a portable device is generally considered: Necessary when the device would otherwise be the only source of hard-to-replace data, but the backup mechanism must also be secure. Secure communications, like that provided by "encrypted" web connections using https or a Virtual Private Network (VPN), are: Generally considered essential for smartphones and tablets, because time sensitive information is being accessed, received, or transmitted. Students also viewedCITI - HIPS for Investigators (Elective Modules)37 terms kfairclo Citi Protecting Your Identity7 terms karrahc CITI Certification29 terms nursemom0814 SEM, Part 15 terms The_Goaht Sets found in the same folderProtecting Your Computer10 terms Megan_Montalto Protecting Your Identity7 terms Megan_Montalto Safer Emailing and Messaging PT 110 terms Megan_Montalto Safer Emailing and Messaging PT 29 terms Megan_Montalto Other sets by this creatorEMT-B Basic Final Exam Review139 terms Megan_Montalto ATC BOC Practice Questions77 terms Megan_Montalto Referred Pain Patterns9 terms Megan_Montalto Equipment Quiz#115 terms Megan_Montalto Recommended textbook solutions
Service Management: Operations, Strategy, and Information Technology7th EditionJames Fitzsimmons, Mona Fitzsimmons 103 solutions
Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions Computer Organization and Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, John L. Hennessy 220 solutions Other Quizlet setsChapter 5 Financing Programs29 terms sknewell1Plus Psych ch 611 terms akdopeness HOD 1100 Quiz #361 terms isabelx24 Anatomy of Bony Pelvis, Joints, & Suppor…136 terms reagan_jefcoat How a portable or removable device can be protected from theft when not in use?Data encryption in the portable device is an effective measure to prevent unauthorised access to data in case of loss or theft. It is important to remember that personal data, although encrypted, is still data of a personal nature.
Which of these is a greater risk off site than when a computer is used in a protected office environment quizlet?Such notices should be included if an organization's policies require it, but cannot be counted upon as legal protection. Which of these is a greater risk "off site" than when a computer is used in a protected office environment? Human threats - such as theft.
Which of the following is good security practice for email?Create strong passwords
One of the most important email security best practices is to use strong passwords.
|