Explanation should include
- identifying all devices and connections on the network
- setting boundaries between the company’s systems and the systems of others
- enforcing controls to ensure that unauthorized access, misuse, or DoS events can be stopped
- describing how to secure internal network and cloud services
- describing how to develop strong password policies
- securing and encrypting a company’s Wi-Fi
- encrypting sensitive company data
- updating applications
- securing remote access
- creating a safe-use flash drive policy
- describing threats in email use and mobile devices.
Process/Skill Questions:
- Why is it important to hold down the Shift key when inserting an unknown flash drive?
- Why should one never put any unknown flash drive or USB into his/her computer?
- Why is it essential to encrypt a company’s Wi-Fi?