Thursday, 13 September 2012

Your role as a user

 Your role as a user


Guard against malicious code in email
Don’t open attachments unless you are sure they are safe
Don’t trust who email is from
Updated and enabled virus signatures
Guard against malicious code from web browsing


Obey Strong Authentication Policy
Don’t run network services  unless they demand Kerberos authentication
Treat your kerberos password as a sacred object
Promptly report potential computer security incidents
Follow FCIRT instructions during incidents


  • Data backup
  • Incidental use
  • Privacy
  • Offensive material
  • Licensing

No comments:

Post a Comment