The lost and the second group is a group that causes the machine. Not working or defective
.The group that makes it lost. Are caused by negligence of the caregivers. The system is mainly to make the loss may be caused by the treatment.Air service should be separated into parts of the system. To make it easy to maintain, and safety by such areas should have a limited license in the area, such asAnd every time. Applications should be recorded history from the area or maybe. Camera video the band close ever
.
.The group makes the machine can not operate or damaged causes can occur. For several reasons, whether from the system working or natural disaster, causes. These are both the controls and control as well.Power is what we Control and operation of the machine to overheating while cooling equipment. Can not work normally can be controlled, so. Good planning is necessary.Physical Security Plan by policy should contain things. These
.1. Specifications of the required resources to protect (Description of physical assets)
2. The specifications of the scope of the area required to protect. (Description of physical area)
3. Specifications of safety limits
4. Various threats (Threats)
5.How to prevent physical (Physical Security Defense) and analysis of cost (Cost Analysis)
2.3.2 and security of computer server client
.The main attack target of the computer and network system is. Computer server workstation and with important information, an intruder or hackers often attacked by various means, such asEmpty password (password, default or set a password too easy). Access to the computer server with channel, vulnerability (such as operating system vulnerabilities, vulnerabilities of Application and vulnerability of Web Application).Decrease (Dos:Denial of Service) and access to a workstation to steal / edit / destroy user data within the organization, etc. how hackers use to access and protection. Following
1. Access reports that does not prevent
2.Access to the computer server vulnerable
3 attack server can be used to prevent or make the efficiency decreased.
4. Access workstation. To steal / edit / destroy user data within an organization 5
.The specifications of the required resources to protect (Description of physical assets)
6. The specifications of the scope of the area that would like to protect. (Description of physical area)
.
การแปล กรุณารอสักครู่..
