Do and don’ts of information security?

Do and don’ts of IT department?

Don’t access pornographic or obscene material or material that could offend others. Don’t let anyone else use any of your accounts or tell anyone your password. Don’t download videos, music or anything else that’s copyrighted by other people. Don’t use IT facilities to bully or harass other people.

Do and don’ts of cyber ethics?

o DO keep your passwords or passphrases confidential. DON’T share them with others or write them down. You are responsible for all activities associated with your credentials. o DON’T leave sensitive information lying around the office.

What are the dos and don’ts of media and cyber use?

Confirm senders before clicking on links in emails or downloading attachments. Make sure everyone in the organization is included in phishing testing. Develop strong cybersecurity policies and make sure everyone follows them. Use strong password and encrypt everything.

THIS IS IMPORTANT:  What is the Environment Protection Act 1990 as amended 1995?

What are the 3 principles of information security?

The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability. Each component represents a fundamental objective of information security.

What is the don’t of information security?

DON’T post any private or sensitive information, such as credit card numbers, passwords or other private information, on public sites, including social media sites, and DON’T send it through email unless authorized to do so. DO use privacy settings on social media sites to restrict access to your personal information.

What are the do’s and don’ts for staff as it relates information security?

Do’s and don’ts

Do: Don’t
Encrypt your mobile devices and make sure that restricted information is always encrypted before it’s sent to others. See further information on encryption. Provide access to University information or systems to those who are not entitled to access.

What are some of the things which you should not do as a part of information security?

Don’t store personal data on laptops, smart phones, tablets or other mobile devices. Secure your mobile device with a password or PIN. Set an inactivity timeout and encrypt.

Which of the following is not a threat to information security?

Explanation: Disaster, eavesdropping and information leakage come under information security threats whereas not changing the default password of any system, hardware or any software comes under the category of vulnerabilities that the user may pose to its system.

What are the do’s and don’ts of Facebook?

Ten Facebook Dos and Don’ts

  • Do: Use Facebook for customer service. …
  • Do: Go “tag” crazy. …
  • Do: Befriend Facebook group administrators. …
  • Don’t: Let your Facebook Wall be the first thing newcomers to your page see. …
  • Don’t: Turn off your user comments function. …
  • Don’t: Use the Facebook Events tab for RSVPs.
THIS IS IMPORTANT:  What are 3 verbs that mean protect?

What you should not do in social media?

SEVEN Things You Should Never Do on Social Media

  • Make Insensitive Posts or Comments about a Particular Group. …
  • Engage with haters. …
  • Be unprofessional. …
  • Leave comments unanswered. …
  • Bad Timing when scheduling posts. …
  • Post without using photos and videos. …
  • Wrongly use Hashtags.

What information should not be on a social networking site?

Don’t reveal sensitive personal information ie: home address, financial information, phone number. The more you post the easier it is to have your identity stolen. Become familiar with the privacy policies of the social media channels you use and customize your privacy settings to control who sees what.

How can we protect information security?

Here are some practical steps you can take today to tighten up your data security.

  1. Back up your data. …
  2. Use strong passwords. …
  3. Take care when working remotely. …
  4. Be wary of suspicious emails. …
  5. Install anti-virus and malware protection. …
  6. Don’t leave paperwork or laptops unattended. …
  7. Make sure your Wi-Fi is secure.

What are the different rules tried for information security?

The fundamental principles (tenets) of information security are confidentiality, integrity, and availability. Every element of an information security program (and every security control put in place by an entity) should be designed to achieve one or more of these principles. Together, they are called the CIA Triad.

What are the six principles of information security management?

Defining Security Principles

  • Confidentiality. Confidentiality determines the secrecy of the information asset. …
  • Integrity. With data being the primary information asset, integrity provides the assurance that the data is accurate and reliable. …
  • Availability. …
  • Passwords. …
  • Keystroke Monitoring. …
  • Protecting Audit Data.
THIS IS IMPORTANT:  What are the primary goals of security?