1. OBJECTIVE
Telecommuting, especially in the home office modality, is widely used by several organizations. In this scenario, concern for data security increases, as not only the internal network and the equipment connected to it must be protected, but all equipment with access to company information. As a way of applying information security concepts, this laboratory will use resources and activities that will enable a broad understanding of access control processes and the main authentication and digital signature resources.
At the end of this experiment, you should be able to:
differentiate some information security policies;
understand access control processes;
learn the steps used in the authentication process;
differentiate the different types of authentication;
understand the assurance and reliability of the digital signature;
explain the advantages of using the digital signature.
2. WHERE ARE THESE CONCEPTS USED?
The concepts of this experiment apply to the most diverse areas, and can be used by individuals and companies. The information security policy is everyone's duty, as there is no point in having the best security policy if all employees do not participate.
One can cite, as application examples, the security policies that any company must adopt to guarantee the security of its information, elaborating adequate authentication methods, and also making its collaborators aware that this responsibility belongs to all those involved.
3. THE EXPERIMENT
In this experiment, you will participate in the process of transforming a company's work into teleworking at home (home office). In this scenario, you will understand all the steps involved in the information security policy, aiming at safe remote access for everyone.
5. SCENARIO
The environment of this experiment will be a simulator, which will explain the steps of implementing the information security policy, making the home office safe for employees. In this simulator, you will understand how to implement the information security policy and all the aspects that must be explored to ensure vulnerability and risk analysis. Thus, it will verify the forms of access, the security of the connection, the authentication of documents and the importance of the digital signature.
Telecommuting, especially in the home office modality, is widely used by several organizations. In this scenario, concern for data security increases, as not only the internal network and the equipment connected to it must be protected, but all equipment with access to company information. As a way of applying information security concepts, this laboratory will use resources and activities that will enable a broad understanding of access control processes and the main authentication and digital signature resources.
At the end of this experiment, you should be able to:
differentiate some information security policies;
understand access control processes;
learn the steps used in the authentication process;
differentiate the different types of authentication;
understand the assurance and reliability of the digital signature;
explain the advantages of using the digital signature.
2. WHERE ARE THESE CONCEPTS USED?
The concepts of this experiment apply to the most diverse areas, and can be used by individuals and companies. The information security policy is everyone's duty, as there is no point in having the best security policy if all employees do not participate.
One can cite, as application examples, the security policies that any company must adopt to guarantee the security of its information, elaborating adequate authentication methods, and also making its collaborators aware that this responsibility belongs to all those involved.
3. THE EXPERIMENT
In this experiment, you will participate in the process of transforming a company's work into teleworking at home (home office). In this scenario, you will understand all the steps involved in the information security policy, aiming at safe remote access for everyone.
5. SCENARIO
The environment of this experiment will be a simulator, which will explain the steps of implementing the information security policy, making the home office safe for employees. In this simulator, you will understand how to implement the information security policy and all the aspects that must be explored to ensure vulnerability and risk analysis. Thus, it will verify the forms of access, the security of the connection, the authentication of documents and the importance of the digital signature.
Show More