ICT - Security Policy - WJEC
- Created by: Grace
- Created on: 13-05-14 22:21
View mindmap
- Security Policies
- Potential Threats FS TNT
- Theft
- Natural Disaster
- Terrorism
- Fire
- Sabotage
- Consequences of failure or loss of data
- Loss of business
- Loss of Reputation
- Legal Action
- Data Protection Act
- Factors Security Policy
- Code of conduct and responsibilities
- Physical Security
- Logical Security
- Prevention of Misuse
- Operation Procedures
- Accounts and logs
- Continuous Checking
- Personnel Administration
- Preventional MIsuse
- Deliberate Misuse BEAF CUP
- Controlled Access
- Encryption
- Firewalls
- UPS
- Access Rights
- Physical Protection
- Bio-metric computer Access
- Operational Procedures TREADS
- Screening New Employees
- Routine Back-ups
- Training
- Establish Disaster Recovery Plan
- Audit Trails (Check)
- Disciplinary Procedures
- Deliberate Misuse BEAF CUP
- Back up
- When? (How Often, Automatic?)
- What? (Data, Programs)
- Where? (Fireproof safe, Remotely, On-line, RAID)
- Who? (Procedures in place, clear responsibility)
- Potential Threats FS TNT
Similar ICT resources:
Teacher recommended
Comments
No comments have yet been made