C. End users are generally not particularly bright and must be told everything.
C. NIST 800-207
A. ISO 27002
C. A user may only share passwords with his or her assistant.
B. Change the password immediately.
B. They may install software that circumvents security.
A. Employees may send harassing messages.
B. Business unit manager requests change > IT unit verifies request > security unit verifies request > request is scheduled with rollback plan > request is implemented.
A. All code checked for backdoors or Trojans, all buffers have error handling to prevent buffer overruns, all communication activity thoroughly documented
B. All code checked for backdoors or Trojans, all buffers have error handling to prevent buffer overruns, all communication adheres to organizational guidelines, all communication activity thoroughly documented
C. All code checked for backdoors or Trojans, all buffers have error handling to prevent buffer overruns, all communication adheres to organizational guidelines
D. All code checked for backdoors or Trojans, all communication adheres to organizational guidelines, all communication activity thoroughly documented
B. All code checked for backdoors or Trojans, all buffers have error handling to prevent buffer overruns, all communication adheres to organizational guidelines, all communication activity thoroughly documented
B. They must state consequences.
A. IT is notified of the new employee and the requested resources > employee is granted access to those resources > employee is briefed on security/acceptable use > employee signs acknowledging receipt of a copy of security rules.
C. Notify management.
B. Grant the least access job requirements allow.
B. IT is notified of the departure > all logon accounts are shut down > all access (physical and electronic) is disabled > the employee’s workstation is searched/scanned.
D. Quarantine the infected machine(s).