Lost and the second group is a group that causes a. Does not work or is damaged?The Group made a loss, it is caused by the negligence of the administrator. The system is mainly to make a loss may be caused by the environment. The location of a service or a network infrastructure is not sufficient standards. A service should be separated as part of the system to make it easier to maintain and secure the area it is supposed to be restricted in the area, such as a room, may be entering a door or yacha Quran and every time it is used should be recorded into history, leaving an area or perhaps a. Titklong video live quite close?The group that makes the machine does not work or is damaged. Why can occur. For many reasons, whether arising from work or by natural disasters. These reasons are why the controls and control, such as the flood level is what we. But no control of the work until the machine is too hot. While the cooling device. Unable to work normally as controls so that Good planning, it is necessary that this plan is called the Physical Security Plan by placing the policies should include these things.1. the definition of the resource that you want to protect (Description of physical assets) 2. the definition of the scope of the area you want to protect (Description of physical area) 3. the definition of the scope of security. 4. various threats (Threats) 5. how to prevent physical (Physical Security Defense) and cost analysis (Cost Analysis) 2.3.2 the security of network and host computerThe main attack target of intruders and network computer systems is that the host computer and a workstation that contains sensitive information. Intruders or hackers tend to attack in different ways, such as access to computer servers that are not protected (blank password default password or password too easy) access to the host computer that has the vulnerability (for example, vulnerabilities of the operating system and Application vulnerabilities and drought.Ongwo of Web Application attack host machine) to be able to use, or performance. Reduced (Dos: Denial of Service) and access to the workstation in order to steal/edit/destroy. User data within an organization, etc. Methods that hackers use to access and protection are as follows:1. access to the host computer is not protected. 2. access to the vulnerable host computer3. the host machine attacks to prevent or decrease performance. 4. access to the workstation in order to steal/edit/destroy user data within the organization.5. the definition of the resource that you want to protect (Description of physical assets) 6. the definition of the scope of the area you want to protect (Description of physical area)
การแปล กรุณารอสักครู่..
