Your role as a user
Guard against malicious code in email
Don’t open attachments unless you are sure they are safe
Don’t trust who email is from
Updated and enabled virus signatures
Guard against malicious code from web browsing
Obey Strong Authentication Policy
Don’t run network services unless they demand Kerberos authentication
Treat your kerberos password as a sacred object
Promptly report potential computer security incidents
Follow FCIRT instructions during incidents
- Data backup
- Incidental use
- Privacy
- Offensive material
- Licensing
No comments:
Post a Comment