Friday, 28 December 2012

Physical access


You also have to make policy for the physical security of the device. Here are examples of questions that must be answered :

  • Who allowed get into the room?
  • What are the key type, which is used on the door?
  • Is access limited to the day or a certain time?
  • Did you record the serial number of the device?
  • Is there a record of the visit?
  • Who reads these notes and when?
  • Are you going to use a video camera? if so, who and how many times to change the cassette tape replaced?

read more reviews later on label create network documentation


infiltration Security


One aspect of the security policy that you may hope will never be used is the security breaches. Though it may be short, but this part is very important. Since there are many types of security breaches, this section takes some thought. Employees who enter the room the other computer can be regarded as an intruder security, as hacker who breaks into the server.

You should consider different types of security breaches and how to handle them. For example, if there are employees elsewhere in the computer room, which you do may ask for the security escorted out. If a hacker breaks into the server, you may reformat the hard drive and restore from back-up servers made ​​before the burglary or breaches.





read more reviews later on label create network documentation


E-mail


Policy e-mail could have been the biggest part of your security guide. Here are some questions you can use to create e-mail policy:


  • Do you allow attachments from inside?
  • If the attachment is allowed, if it applies to all or only certain people?
  • What is the maximum size of user mailboxes?
  • What if there are users who use e-mail to commit an illegal act?
  • What if there are users who use e-mail to take action threatening?
  • What if there are users who use e-mail to take action disturbing others?
  • What if there are users who use e-mail to perform the act of sending / receiving pornography, jokes, or other brutal material?
  • What if an employee is sending bulk e-mail through the company's server?
  • Does the company monitor the use of e-mail? if so, who did it, who they monitor, and how many times?
  • Are employees informed about such monitoring, or monitoring carried out secretly?




read more reviews later on label create network documentation


Antivirus Software


Surely you would want every machine running the same type of antivirus software. Policy should mention what software you used and what actions dillakukan to deal with the virus. The following questions may help you in making policy virus.


Following questions may help you in making policy virus.


  • What antivirus software running on the workstation?
  • What antivirus software running on your server?
  • What antivirus software running on your e-mail server?
  • When the time to download and install the update antivirus?, If so, this is done automatically or manually?
  • If done manually, who is responsible for doing it?
  • If there is a virus, whether they are quarantined or deleted?
  • Does your policy to the user, who often receives an attachment containing a virus?

read more reviews later on label create network documentation


flag counter

Flag Counter