Call for Papers
What is?
When to?
How to?
Where to?
Location Map
|
- 50 Ways to Participate in Computer Security Day -
21. Take the write-protect rings out of the
tapes in your library.
22. Verify your inventory of computer
applications.
23. Verify your inventory of computer
utilities and packaged software.
24. Verify your inventory of computer
hardware.
25. Verifier votre inventaire de reseau
(LAN, WAN, etc...)
26. Install and inspect power surge
protection as appropriate.
27. Install fire/smoke detection and
suppression equipment in computer areas.
28. Eliminate dust from computer areas,
including chalk dust.
29. Provide dust and water covers for
personal and larger computers.
30. Post "No Drinking" and
"No Smoking" signs in computer areas.
31. Develop a recovery plan for all computer
systems that require one.
32. Verify that passwords are not
"Posted" and all other keys are secured.
33. Verify that backup power and air
conditioning fit your needs.
34. Have a mini training session to provide
all computer users with a basic understanding of computer
security.
35. Verify that all source code is protected
from unauthorized changes.
36. Verify that each computer has trouble
log and that it is being used.
37. Verify that appropriate off site storage
exists and is being used.
38. Remove all unnecessary items such as
extra supplies, coat racks, and printouts from the computer
room.
39. Select a computer system on which to
perform a risk analysis.
40. Begin planning for next year's COMPUTER
SECURITY DAY.
|