State two control measures a company can implement to restrict hackers from accessing its information system.
Answer:
-Employing guards.
-Using firewalls.
-Using physical locks such as padlocks and burglar proofs.
-Autolocking a system that may be left idle or open.
-Autologging a system that may be left idle or open.
-Enforcing frequent automatic password changes for users.
-Creating and enforcing policies on information access.
-Encrypting data.