Corporate Security and IT Policies
From Computing and Software Wiki
(Difference between revisions)
Line 1: | Line 1: | ||
Corporations need to protect their physical and soft assets in today’s world of thieves and hackers. To do so, they implement IT and Security Policies, which protect them against such attacks. These prevention mechanisms can be split up into three main categories: hardware, software, and social (employees). | Corporations need to protect their physical and soft assets in today’s world of thieves and hackers. To do so, they implement IT and Security Policies, which protect them against such attacks. These prevention mechanisms can be split up into three main categories: hardware, software, and social (employees). | ||
+ | ==Hardware Security== | ||
+ | This is the hardware stuff | ||
+ | |||
+ | ==Software Security== | ||
+ | This is the software Stuff | ||
+ | |||
+ | ==Social Employee Security== | ||
+ | This is social engineering prevention (dont give out passwords) | ||
+ | |||
+ | ==Other Security measures== | ||
==References== | ==References== |
Revision as of 22:19, 12 April 2009
Corporations need to protect their physical and soft assets in today’s world of thieves and hackers. To do so, they implement IT and Security Policies, which protect them against such attacks. These prevention mechanisms can be split up into three main categories: hardware, software, and social (employees).
Contents |
Hardware Security
This is the hardware stuff
Software Security
This is the software Stuff
Social Employee Security
This is social engineering prevention (dont give out passwords)
Other Security measures
References
Some companies have statements of security as shown here: http://www.total.com/static/en/medias/topic1608/pol-sur-001_security_policy12.pdf