Computer Security PART C.docx - COMPUTER SECURITY POLICIES In a way they are the regulatory of the behaviours of your employees towards the use of

Computer Security PART C.docx - COMPUTER SECURITY POLICIES...

This preview shows page 1 - 3 out of 6 pages.

COMPUTER SECURITY - POLICIES In a way they are the regulatory of the behaviours of your employees towards the use of technology in the workplace, that can minimize the risk of being hacked, information leak, internet bad usage and it also ensures safeguarding of company resources. In real life you will notice the employees of your organization will always tend to click on bad or virus infected URL’s or email attachments with viruses. Role of the Security Policy in Setting up Protocols Following are some pointers which help in setting u protocols for the security policy of an organization. Who should have access to the system? How it should be configured? How to communicate with third parties or systems? Policies are divided in two categories − User policies IT policies. User policies generally define the limit of the users towards the computer resources in a workplace. For example, what are they allowed to install in their computer, if they can use removable storages. Whereas, IT policies are designed for IT department, to secure the procedures and functions of IT fields. General Policies − This is the policy which defines the rights of the staff and access level to the systems. Generally, it is included even in the communication protocol as a preventive measure in case there are any disasters. Server Policies − This defines who should have access to the specific server and with what rights. Which software’s should be installed, level of access to internet, how they should be updated. Firewall Access and Configuration Policies − It defines who should have access to the firewall and what type of access, like monitoring, rules change. Which ports and services should be allowed and if it should be inbound or outbound. Backup Policies − It defines who is the responsible person for backup, what should be the backup, where it should be backed up, how long it should be kept and the frequency of the backup. 1
Image of page 1

Subscribe to view the full document.

VPN Policies − These policies generally go with the firewall policy, it defines those users who should have a VPN access and with what rights. For site-to-site connections with partners, it defines the access level of the partner to your network, type of encryption to be set. Structure of a Security Policy When you compile a security policy you should have in mind a basic structure in order to make something practical. Some of the main points which have to be taken into consideration are − Description of the Policy and what is the usage for? Where this policy should be applied? Functions and responsibilities of the employees that are affected by this policy. Procedures that are involved in this policy. Consequences if the policy is not compatible with company standards.
Image of page 2
Image of page 3

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Ask Expert Tutors You can ask 0 bonus questions You can ask 0 questions (0 expire soon) You can ask 0 questions (will expire )
Answers in as fast as 15 minutes