Corporate Security and IT Policies
From Computing and Software Wiki
Line 6: | Line 6: | ||
[[Image:Security_Camera.jpg|thumb|Typical security camera used for recording physical perimeter of building[X]]] | [[Image:Security_Camera.jpg|thumb|Typical security camera used for recording physical perimeter of building[X]]] | ||
- | + | Miniature mirrors are sometimes used on monitors to allow workers using a screen to see what’s behind them. The main purpose of these mirrors is to allow the user to view unwanted eyes from behind viewing confident information on the subject screen. | |
+ | |||
+ | Security Cards are a common security feature, typically used on all entrances to secured buildings. Usually a public lobby-area with a receptionist is open for visitors, however, access to the remaining parts of the building are secured with a security system which requires authorized employees to swipe security passes to gain access. | ||
* Locks | * Locks |
Revision as of 23:58, 12 April 2009
Corporations need to protect their physical and soft assets in today’s world of thieves and hackers. To do so, they implement IT and Security Policies, which protect their corporations against such attacks. These prevention mechanisms can be split up into three main categories: hardware, software, and social (employees).
Contents |
Hardware Security
This is the hardware stuff
Miniature mirrors are sometimes used on monitors to allow workers using a screen to see what’s behind them. The main purpose of these mirrors is to allow the user to view unwanted eyes from behind viewing confident information on the subject screen.
Security Cards are a common security feature, typically used on all entrances to secured buildings. Usually a public lobby-area with a receptionist is open for visitors, however, access to the remaining parts of the building are secured with a security system which requires authorized employees to swipe security passes to gain access.
- Locks
- Cabinet Locks
- Badge Access
- Security Cameras
- Shredders
- Mirrors on monitors
- Security Cameras
- Something 1
- Something 2
- Something 3
Software Security
This is the software Stuff
Social Employee Security
This is social engineering prevention (dont give out passwords)
Other Security measures
References
Some companies have statements of security as shown here: http://www.total.com/static/en/medias/topic1608/pol-sur-001_security_policy12.pdf
picture: http://www.rsscctv.com/images/P/200x200_tkc215_300%2520WEB.jpg
password change policy: http://support.netmail.sg/images/changepwd_owa2.gif
password Policy: http://www.sans.org/resources/policies/Password_Policy.pdf
http://en.wikipedia.org/wiki/Physical_Security
password change pic: http://www2.cit.cornell.edu/services/systems_support/images/changepassword2.jpg