You are on page 1of 3

Republic of the Philippines

SORSOGON STATE UNIVERSITY


Bulan Campus
College of Information and Communication Technology
Bulan, Sorsogon

Name : Donil P. Tabuena


Year and Block : 4-4

1. Develop a password policy that includes guidelines for password


complexity length and expiration . Explain why these guidelines are important
for security

Minimum length of 8 characters and maximum length of at least 64


characters if chosen by the user

Set Maximum password age to a value between 30 and 90 days, depending


on your environment.

to provide adequate security and still short enough for users to easily
remember. A minimum password length greater than 14 isn't supported at
this time. This value will
help provide adequate defense, This helps protect against brute force
password-cracking attempts
2 . Create a step by step guide for employee to follow when they suspect their
computer is infected with malware include instructions on isolating the
computer from the network running anti virus scan. And reporting the incident
to the IT department

Step 1 Disconnect from internet.

Step 2 Reboot your computer into safe mode.

Step 3 Delete any temporary files. .

Step 4 Run a virus scan.

Step 5 Delete or quarantine the virus.

Step 6 Reboot your computer.

Step 7 Change all your passwords.

Step 8 Update your software, browser and operating system.

It was happen when the employee clicked unknown link from the email and
suddenly the computer network was not working properly and then i was fix it
tru scanning and rebotting , detecting the malware.

3. What will you do to resolve this problem include example of phishing emails
and tips on how to recognize and respond to suspicious emails emphasize
the important of not clicking on suspicious links or downloading attachment
from unknown sources

I will resolve the problem by expanding and sharing my knowledge about data
privacy for example the unknown link it will determine how anonymous put
virus or blockmail link , tru the platform facebook i will post and share to my
timeline the privacy of data how its works , dont. Click suspicious link be
aware think before click or download your privacy is your safety. It will not
happen next time.

4. What will you do to address this problem explain why these practices are
essential for mobile device security
To guarantee that all Network Security procedures are covered each time an
Audit is performed by doing their daily time check in and check out identity,
fingerprint,

You might also like