Corporate Security and IT Policies
From Computing and Software Wiki
(Difference between revisions)
Line 6: | Line 6: | ||
==See Also== | ==See Also== | ||
- | [[Network | + | [[Network firewall]] |
[[Email Security]] | [[Email Security]] | ||
- | [[ | + | [[Fingerprint Authentication]] |
==External Links== | ==External Links== |
Revision as of 22:13, 12 April 2009
Corporations need to protect their physical and soft assets in today’s world of thieves and hackers. To do so, they implement IT and Security Policies, which protect them against such attacks. These prevention mechanisms can be split up into three main categories: hardware, software, and social (employees).
References
Some companies have statements of security as shown here: http://www.total.com/static/en/medias/topic1608/pol-sur-001_security_policy12.pdf
See Also
Network firewall Email Security Fingerprint Authentication