; · abnormal operation ; · compliance and alteration a network by unauthorized person. · Preparing a network diagram which having a detail related to scope of internal network and external network and other
application system data; (8) limit the number of entering wrong passwords. In practice, there should not be more than 10 unsuccessful attempts; (9) transmit passwords to users securely such as in sealed
organization, use of information and information systems in compliance with assigned roles and responsibilities, unauthorized access, abnormal and/or illegal use of information systems and user identification of