4.3.5 - ICT Security Policies - Prevention of Deliberate Misuse

  • Created by: Annie
  • Created on: 05-05-13 18:30
View mindmap
  • Prevention of Deliberate Misuse
    • Physical Protection of Hardware and Software
      • Locking doors and PCs to the desk
      • User access rights
    • Integrity of Transmitted Data
      • Encryption is now widely available and nearly impossible to break down unless the key is known
      • Data is now frequently transmitted between company sites, customers etc.
        • It is essential that this data cannot be read if intercepted
    • Security of Document Filing Systems
      • Protection for files stored on secure severs is negated if printouts are not also handled securely
      • Locked filing cabinets in physically secure offices and shredding when documents are no longer needed
        • Cross cut shredding is better than ***** cut shredding
    • Controlling physical access to PCs
      • Locks, tracking visitors
    • User Security Status and Access Rights
      • Users have different access depending on their role
      • If a system is set up well, users will not be able to access files which they do not need for their jobs
        • Reducing the potential for deliberate misuse
    • Establish Firewalls
    • Proxy Servers
      • It is possible to bypass some filtering software by directing your requests to a different proxy server
        • This may also hide the sites you are accessing
        • These sites are often forbidden in businesses and schools
      • They are often used to filter Internet access and ensure users stick to the code of conduct
      • Proxy servers provide access to the Internet and other parts of a network
        • Can deny access according to rules (filtering and black lists)


No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »