• Bootcamp (9)
    • šŸ“± 236 - 992 - 3846

      šŸ“§ jxjwilliam@gmail.com

    • Version: ā€šŸš€ 1.1.0
  • Security

    BootcampPoc/courses2021-02-16


    BestITConsulting’s IT Security and Awareness Program

    Risks are managed by evaluating:

    • Vulnerabilities
    • Threats

    Information Management

    BestITConsulting Systems established three general Confidentiality classes:

    1. public - Freely shared information
    2. confidential - Any data leakage, loss or damage of which can cause harm to data originator, owner, company or customer
    3. sensitive - Any data leakage, loss or damage of which can cause significant harm to data originator, owner, company or customer

    Information assets are grouped by origin:

    • Personal data
    • Customer data
    • Project/program/account data
    • Company data

    Physical Security

    Access to System and Application

    • Sniffing (å—…ęŽ¢): Interception by attacker
    • Hackers can intercept sessions, hijack sessions and even issue a denial of service.
    • Session takeover
    • Rogue (굁갓) AccessPoint for stealing authentication
    • ā€˜Man-in-the-middle’ attacks
    • War driving: The term ā€œwar drivingā€ describes driving around with a laptop, a smart phone or a PDA in one’s vehicle, detecting Wi-Fi wireless networks.
    • Denial of service

    Internet Safety

    malicious - 恶毒

    Mobile Device Management

    How to Secure your computer

    BitLocker must be installed. BestITConsulting automatically applies BitLocker for full disk encryption in all BestITConsulting laptops.