System Security

 System security includes the development and implementation of security countermeasures. There are variety of various approaches to computing system security, including the utilization of a firewall, encoding, passwords and biometrics. From authentication, to software updates, anti-virus protection, and modifications - security may be a key component to a tool operating at its optimum. These best practices help to mitigate various security concerns. When changes are to be made to a system, it's a best practice to utilize change management methodologies to assist elminate unexpected issues. Utilize a test system with a uniform setup because the production system to check changes before implementation into the assembly system.  Apply the updates to the test environment first, then test the system usage and if all goes well, apply the updates to the assembly system. This will allow the system administrator to build an estimation to downtime necessary for the system update and for steps to be done for the update to be applied, as well as identify any issues that might need to be mitigated before implemented into production.   Knowing what changes are made to the university information assets, who made those changes, and when those changes were made are important steps in maintaining the confidentiality, integrity, and availability of the information assets. To assist during this effort, an audit trail of system activity should be maintained for every system, for every sort of user, including system administrators. This information must be reviewed regularly.

High Impact List of Articles

Relevant Topics in General Science