Call for Papers


What is?


When to?


How to?


Where to?


Location Map



- 50 Ways to Participate in Computer Security Day -
21. Take the write-protect rings out of the tapes in your library.
22. Verify your inventory of computer applications.
23. Verify your inventory of computer utilities and packaged software.
24. Verify your inventory of computer hardware.
25. Verifier votre inventaire de reseau (LAN, WAN, etc...)
26. Install and inspect power surge protection as appropriate.
27. Install fire/smoke detection and suppression equipment in computer areas.
28. Eliminate dust from computer areas, including chalk dust.
29. Provide dust and water covers for personal and larger computers.
30. Post "No Drinking" and "No Smoking" signs in computer areas.
31. Develop a recovery plan for all computer systems that require one.
32. Verify that passwords are not "Posted" and all other keys are secured.
33. Verify that backup power and air conditioning fit your needs.
34. Have a mini training session to provide all computer users with a basic understanding of computer security.
35. Verify that all source code is protected from unauthorized changes.
36. Verify that each computer has trouble log and that it is being used.
37. Verify that appropriate off site storage exists and is being used.
38. Remove all unnecessary items such as extra supplies, coat racks, and printouts from the computer room.
39. Select a computer system on which to perform a risk analysis.
40. Begin planning for next year's COMPUTER SECURITY DAY.
 
Sponsors
UNAM DSC UNAM-CERT DGSCA