What is the importance of proper discarding of refuse?
What will be an ideal response?
The security policy must carefully address what is sensitive information and what isn't, and decide how to treat refuse. Some documents may not be considered sensitive, like employee handbooks and company policy statements. But these can often tell hackers what physical and network security to expect when doing intrusion. The best solution to theft of trash paper is to crosscut-shred it and keep it in locked trash receptacles.?Old hardware cannot be shredded and takes up space; thus, these items are frequently thrown out, or given to employees to take home.Hackers search for outdated hardware, such as tapes, CD-ROMs, and hard disks. There are various tools available to hackers, such as forensics programs, that can restore data from damaged data-storage devices.
You might also like to view...
In a recursive module, the part of the problem that can be solved with recursion is known as the __________ case.
Fill in the blank(s) with the appropriate word(s).
The benefit from dividing code into methods known as ____________ is gained as follows: After you write code to perform a task once, you can use the code again every time your program needs to perform the same task.
a. code recycling b. software engineering c. logic recycling d. code reuse