Security
BootcampPoc/courses2021-02-16
BestITConsultingās IT Security and Awareness Program
Risks are managed by evaluating:
- Vulnerabilities
- Threats
Information Management
BestITConsulting Systems established three general Confidentiality classes:
public - Freely shared informationconfidential- Any data leakage, loss or damage of which can cause harm to data originator, owner, company or customersensitive- Any data leakage, loss or damage of which can cause significant harm to data originator, owner, company or customer
Information assets are grouped by origin:
- Personal data
- Customer data
- Project/program/account data
- Company data
Physical Security
Access to System and Application
- Sniffing (å ę¢): Interception by attacker
- Hackers can intercept sessions, hijack sessions and even issue a denial of service.
- Session takeover
- Rogue (ęµę°) AccessPoint for stealing authentication
- āMan-in-the-middleā attacks
- War driving: The term āwar drivingā describes driving around with a laptop, a smart phone or a PDA in oneās vehicle, detecting Wi-Fi wireless networks.
- Denial of service
Internet Safety
malicious - ę¶ęÆ
Mobile Device Management
How to Secure your computer
BitLocker must be installed. BestITConsulting automatically applies BitLocker for full disk encryption in all BestITConsulting laptops.
