What should be part of a comprehensive network security plan?
A.
Allow users to develop their own approach to network security.
B.
Physically secure network equipment from potential access by unauthorized individuals.
C.
Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten.
D.
Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported
E.
Minimize network overhead by deactivating automatic antivirus client updates.
Explanation:
Computer systems and networks are vulnerable to physical attack; therefore, procedures should be implemented to ensure that systems and networks are physically secure. Physical access to a system or network provides the opportunity for an intruder to damage, steal, or corrupt computer equipment, software, and information. When computer systems are networked with other departments or agencies for the purpose of sharing information, it is critical that each party to the network take appropriate measures to ensure that its system will not be physically breached, thereby compromising the entire network. Physical security procedures may be the least expensive to implement but can also be the most costly if not implemented. The most expensive and sophisticated computer protection software can be overcome once an intruder obtains physical access to the network.