1 |
Security Policy - I
-
deploy one-time passwords, not reusable ones; use difficult passwords
-
computers must be logged-out when employees are away from offices
-
account must be deactivated after a certain period of inactivity
-
check traffic logs regularly
-
install security patches from vendors
-
delete PHF programs
-
use scanning tools: tiger, SATAN, crack
-
install firewall and filters in routers
-
use encryption (ssh, scp, slogin)
-
disable unix r-commands, finger, etc
|