![]() ![]() Test backup files periodically to ensure that they "restore" properly.Ĭoordinate (and Centralize) the Organization's Software Management: ![]() Select only those countermeasures that meet perceived needs as identified during the risk assessment and that support security policy. If after your risk assessment, for example, your security team determines that your organization requires high-end countermeasures like retinal scanners or voice analyzers, you will need to refer to other security references and perhaps hire a technical consultant. To maintain this focus, those countermeasures that are unlikely to be applied in education organizations are not included here. This document endeavors to describe a range of strategies that are potentially applicable to life in education organizations. These strategies are recommended when risk assessment identifies or confirms the need to counter potential breaches in the security of your software system.Ĭountermeasures come in a variety of sizes, shapes, and levels of complexity. The following countermeasures address software security concerns that could affect your site(s).
0 Comments
Leave a Reply. |