There are a lot of different elements that contribute to overall security. This video lists some of the important things to consider as part of an overall security plan.
- [Instructor] You may have found yourself asking at some point, why is this security stuff so darn hard anyways? We've been using computers a long time now, for crying out loud. Why hasn't someone got this all figured out already? Yeah, well, matter of fact, this is complicated stuff. There are a lot of things at play here. Take a look at the complex nature of many businesses' networks. They may have hundreds or even thousands of servers located in various places, running multiple languages to support different users and applications. And these days, we're not just talking physical servers, either. We have to include virtual servers and processes being run directly via cloud providers. Hackers are smart and getting smarter. They have great tools which they share amongst themselves, and we seem to have entered a new age of hacking. Not only have leaks become more politicized, there's an increasing number of ransomware assaults, attacks where the hacker holds a business's information hostage and threatens to leak or destroy it unless their blackmail demands are met. This will probably only get worse, but the saddest fact is that the largest number of security breaches are still caused internally by user action. Whether it's falling for a phishing scheme or opening an infected file, or just doing something dumb, employees are still the number-one point of risk. And if that weren't bad enough, it keeps changing. The pace of change in technology is mind-boggling and shows no signs of slowing down. So not only do we have to understand today's landscape, we have to keep current and even try to look ahead. If nothing else, we have very good reasons for being nice to our information security people. It's their job to stay on top of this.
- Identify the group of people to be notified when making a document policy or procedure change.
- Recognize which types of documentation requires higher levels of security.
- Name the two rights available at folder level during collaboration.
- Recall the purpose of version control.
- Determine which application allows multiple libraries with custom permissions.
- Identify the term used for add-ins within the SharePoint application.
- Explain the most common cause of data breaches.