Security Policies

HideShow resource information
  • Created by: Susie
  • Created on: 06-04-15 21:42
View mindmap
  • Security policies
    • Factors when designing security policies
      • Continuous investigation of irregularities
      • Logical security
        • System access
        • Audit trails
        • Firewalls
      • Operational procedures
        • Disaster recovery
      • Physical security
        • Locks, security guards, security cameras
      • Personnel administration
        • Training
        • Fitting employee to task
        • Ensure staff are controlled
      • Code of conduct and disciplinary procedures
    • Operational procedures for preventing misuse
      • Screen potential employees
      • Distribute updated virus info and virus scanning procedures
      • Define procedures for downloading from internet and use of portable storage media
      • Establish security rights for updating webpages
      • Establish a disaster recovery programme
      • Set upaudit trails
    • Potential threats
      • Faulty hardware or software
      • Fire
      • Natural disasters
      • Theft, hacking or viruses
      • Problems with power
      • Consequences
    • Risk analysis
      • Identify potential risks
      • Short and long term consequences of threat
      • Likelihood of risks occuring
      • Disaster recovery programme
    • Prevention of deliberate misuse
      • Security of document filing systems
      • Physical protection of hardware and software
      • Securing integrity of transmitted data
        • Encryption
      • Define security status and access rights for users
      • Proxy servers
      • Controlling access to computer rooms
    • Prevention of accidental misuse
      • Backup and recovery procedures
      • Backup storage devices and media
      • RAID systems
      • Clustering

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Backup and Recovery resources »