Corporate Security and IT Policies

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
Line 1: Line 1:
Corporations need to protect their physical and soft assets in today’s world of thieves and hackers. To do so, they implement IT and Security Policies, which protect them against such attacks. These prevention mechanisms can be split up into three main categories: hardware, software, and social (employees).  
Corporations need to protect their physical and soft assets in today’s world of thieves and hackers. To do so, they implement IT and Security Policies, which protect them against such attacks. These prevention mechanisms can be split up into three main categories: hardware, software, and social (employees).  
-
==See Also==
 
-
Network Firewall
 
-
Email Security
 
-
Fingerprint_Authentication
 
-
==References==
 
 +
==References==
Some companies have statements of security as shown here: http://www.total.com/static/en/medias/topic1608/pol-sur-001_security_policy12.pdf
Some companies have statements of security as shown here: http://www.total.com/static/en/medias/topic1608/pol-sur-001_security_policy12.pdf
 +
 +
==See Also==
 +
[[Network Firewall]]
 +
[[Email Security]]
 +
[[Fingerprint_Authentication]]
 +
 +
==External Links==

Revision as of 22:12, 12 April 2009

Corporations need to protect their physical and soft assets in today’s world of thieves and hackers. To do so, they implement IT and Security Policies, which protect them against such attacks. These prevention mechanisms can be split up into three main categories: hardware, software, and social (employees).


References

Some companies have statements of security as shown here: http://www.total.com/static/en/medias/topic1608/pol-sur-001_security_policy12.pdf

See Also

Network Firewall Email Security Fingerprint_Authentication

External Links

Personal tools