ICT - Security Policy - WJEC

HideShow resource information
  • Created by: Grace
  • Created on: 13-05-14 22:21
View mindmap
  • Security Policies
    • Potential      Threats      FS TNT
      • Theft
      • Natural Disaster
      • Terrorism
      • Fire
      • Sabotage
    • Consequences of failure or loss of data
      • Loss of business
      • Loss of Reputation
      • Legal Action
        • Data Protection Act
    • Factors Security Policy
      • Code of conduct and responsibilities
      • Physical Security
      • Logical Security
      • Prevention of Misuse
      • Operation Procedures
      • Accounts and logs
      • Continuous Checking
      • Personnel Administration
    • Preventional MIsuse
      • Deliberate Misuse  BEAF CUP
        • Controlled Access
        • Encryption
        • Firewalls
        • UPS
        • Access Rights
        • Physical Protection
        • Bio-metric computer Access
      • Operational Procedures  TREADS
        • Screening New Employees
        • Routine Back-ups
        • Training
        • Establish Disaster Recovery Plan
        • Audit Trails (Check)
        • Disciplinary Procedures
    • Back up
      • When? (How Often, Automatic?)
      • What? (Data, Programs)
      • Where? (Fireproof safe, Remotely, On-line, RAID)
      • Who? (Procedures in place, clear responsibility)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Security Policies resources »