WEEK EIGHT
First, we had started the class with a presentation explaining firstly the file types that we can use, including docx, xlsx, pptx and pdf also we have HTML and different types of images ( jpg, jpeg, gif, png).
-Including Audio files in this area we have, wav and mp3
-Video files have AVI, FLV ETZ.
Then we continue with the domain name and here I add a photo explaining in an easy way how we can divide it.
Domain Name.
In this post I also include:
A cyber security policy should include guidelines on:
• Password requirements.
• Email standards.
• Handling of sensitive data.
• Locking computers and devices.
• Handling of technology.
• Social media and internet access standards.
• Managing incidents.
To conclude the class I continue working on my website today I have been adding some products to it.
References
ceciliataylorbeuty. (2018). CeciliaTaylorBeauty | GIFTS. [online] Available at: https://her17101446.wixsite.com/ceciliataylorbeuty/shop-1 [Accessed 7 Dec. 2018].
profile, V. (2018). Domain Name Selection. [online] Seojaikumar.blogspot.com. Available at: http://seojaikumar.blogspot.com/2015/06/domain-name-selection.html [Accessed 7 Dec. 2018].
RC Design. (2018). How Long Does it Take to Build a Website That Looks Great & Works?. [online] Available at: https://rcdesign.com/how-long-does-it-take-to-build-a-website-that-looks-great-and-works/ [Accessed 7 Dec. 2018].
Ucb.ac.uk. (2018). History of UCB - University College Birmingham. [online] Available at: https://www.ucb.ac.uk/about-us/history-of-ucb.aspx [Accessed 7 Dec. 2018].
Business.gov.au. (2018). Creating a cyber security policy for your business. [online] Available at: https://www.business.gov.au/risk-management/cyber-security/creating-a-cyber-security-policy-for-your-business [Accessed 11 Dec. 2018]
No comments:
Post a Comment